name |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 1.04 |
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
21.02.2005 |
11.07.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0020_it4029_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-50fr.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-50en.pdf |
manufacturer |
Canon Inc. |
Gemalto - Infineon Technologies AG |
manufacturer_web |
|
https://www.gemalto.com/ |
security_level |
EAL2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
cb316569ccee2a79 |
623e0ce934d1f19c |
heuristics/cert_id |
JISEC-CC-CRP-C0020 |
ANSSI-CC-2014/50 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
1.04 |
1.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/49, ANSSI-CC-2014/14, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/14, ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/49, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0020
- certification_date: 01.02.2005
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- description: PRODUCT DESCRIPTION This product is a software program to be installed for use on the Canon iR4570/iR3570/iR2870/iR2270-series multifunction products (hereafter referred to collectively as the “multifunction product”). The multifunction product is an office machine with the combined functionality of copying, sending (Universal Send), fax reception, Mail Box, printing, and so forth. When the copying, sending (Universal Send), fax reception (fax/I-fax reception) or printing function is used, temporary image data is created on the hard drive of the multifunction product. Also, when the Mail Box function is used (for document storage) or the fax reception function is used (for “in-memory reception” of faxes/I-faxes or forwarding of faxes/I-faxes), image data is stored in a specified inbox on the multifunction product. By installing this product, security enhancements are added to the multifunction product, helping counter the threat of disclosure of temporary image data on the hard drive and image data in the inboxes.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
- product: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2
- product_type: IT Product (data protection function in digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0020_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0020_est.pdf
- toe_version: Version 1.04
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2005-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0020_it4029_01.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 1.04
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0020_it4029.html
- toe_overseas_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 1.07
|
|
heuristics/st_references/directly_referenced_by |
{} |
OCSI/CERT/SYS/06/2017/RC, OCSI/CERT/CCL/02/2020/RC |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0695-2011 |
heuristics/st_references/indirectly_referenced_by |
{} |
OCSI/CERT/SYS/06/2017/RC, OCSI/CERT/CCL/02/2020/RC |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0695-2011 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0020_it4029_ecvr.pdf |
ANSSI-CC_2014-50fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/50
- cert_item: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device – Part 2: Device with key generation, Référence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la référence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device – Part 3: Device with key import, Référence : prEN 14169-3:2012, Version 1.0.2, certifié sous la référence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3]). Protection profiles for secure signature creation device – Part 4: Extension for device with key generation and trusted communication with certificate generation application, Référence : prEN 14169-4:2012, Version 1.0.1, certifié sous la référence BSI-CC-PP-0071-2012 (voir [PP-SSCD-Part4]). Protection profiles for secure signature creation device – Part 5: Extension for device with key generation and trusted communication with signature creation application, Référence : prEN 14169-5:2012, Version 1.0.1, certifié sous la référence BSI-CC-PP-0072-2012 (voir [PP-SSCD-Part5]). Protection profiles for secure signature creation device – Part 6: Extension for device with key import and trusted communication with signature creation application, Référence : prEN 14169-6:2013, Version 1.0.4, certifié sous la référence BSI-CC-PP-0076-2013 (voir [PP-SSCD-Part6]). Rapport de certification ANSSI-CC-2014/50 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0020: 1
|
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/14: 2
- ANSSI-CC-2014/49: 3
- ANSSI-CC-2014/50: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP- 0071-2012: 1
- BSI-CC-PP- 0072-2012: 1
- BSI-CC-PP- 0075-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0072-2012: 2
- BSI-CC-PP-0075-2012: 2
- BSI-CC-PP-0076-: 1
- BSI-CC-PP-0076-2013: 2
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 1
- other:
- PP-SSCD-: 5
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 2
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies: 5
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20050223102600+09'00'
- /ModDate: D:20050223102600+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13527
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Duquesnoy
- /CreationDate: D:20140711150029+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140711150029+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2014_50fr.doc
- pdf_file_size_bytes: 234712
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
|
ANSSI-CC-cible_2014-50en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 33
- PP-SSCD-KI: 25
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 5
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 2
- FCS_COP: 8
- FCS_COP.1: 2
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 14
- FDP_ACC.1.1: 4
- FDP_ACF: 4
- FDP_ACF.1: 6
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_DAU: 4
- FDP_DAU.1: 1
- FDP_DAU.2.1: 1
- FDP_DAU.2.2: 1
- FDP_IFC.1: 9
- FDP_ITC: 2
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 3
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 5
- FIA_API.1: 8
- FIA_API.1.1: 2
- FIA_UAU: 5
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 3
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD: 4
- FMT_MTD.1.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 7
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 2
- FTP_ITC.1.1: 4
- FTP_ITC.1.2: 4
- FTP_ITC.1.3: 4
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CGA: 2
- A.CSP: 3
- A.SCA: 2
- OE:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20140131160737+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140807095336+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 652503
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 45
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |