| name |
Canon MFP Security Chip 1.00 |
HP BladeSystem c7000 and c3000 Enclosure with Onboard Administrator (running firmware version 3.71), Virtual Connect (running firmware version 4.01), and HP Integrated Lights-Out 3 (version 1.50) |
| category |
Other Devices and Systems |
Other Devices and Systems |
| scheme |
JP |
CA |
| status |
archived |
archived |
| not_valid_after |
07.10.2013 |
09.12.2018 |
| not_valid_before |
07.07.2006 |
21.10.2013 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-209%20cert%20signed%20v1.0e.doc |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0050_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-209%20CR%20v1.1e.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-209%20ST%20v1.16.pdf |
| manufacturer |
Canon Inc. |
Hewlett-Packard Company |
| manufacturer_web |
|
https://www.hp.com |
| security_level |
EAL3 |
EAL4+, ALC_FLR.2 |
| dgst |
d4ca034eb499b4b6 |
6fdb29937100b8c5 |
| heuristics/cert_id |
JISEC-CC-CRP-C0050 |
383-4-209 |
| heuristics/cert_lab |
[] |
CANADA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ADV_TDS.3, AVA_VAN.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
1.00 |
3.71, 4.01, 1.50 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0050
- certification_date: 01.07.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0050_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the Canon MFP Security Chip and will be provided to end users as part of a security kit. The TOE allows protecting hard drives in Canon MFPs and printers from disclosure of confidential information due to theft, without sacrificing the extensibility, versatility, convenience and performance of Canon MFPs and printers. The TOE provides the following functions for protecting hard drives: - Hard drive data encryption - Cryptographic key management - Device identification and authentication
- evaluation_facility: Japan Electronics and Information Technology IndustriesAssociation, Information Technology security center (JEITA ITSC)
- product: Canon MFP Security Chip
- product_type: IT Product ( cryptographic security chip )
- report_link: https://www.ipa.go.jp/en/security/c0050_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0050_est.pdf
- toe_version: 1.00
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0050_it5069.html
- toe_japan_name: Canon MFP Security Chip 1.00
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
383-4-209 cert signed v1.0e.doc |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0050_ecvr.pdf |
383-4-209 CR v1.1e.pdf |
| pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-209-CR
- cert_lab: CANADA
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0050: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 2
- EAL 4+: 1
- EAL4+: 1
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 186-2: 2
- FIPS 197: 1
- FIPS 198: 1
- FIPS 46-3: 1
- ISO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20060707112902+09'00'
- /ModDate: D:20060707112902+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12465
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: cpclark
- /CCEF: CGI IT Security Evaluation & Test Facility
- /CR date: 09 December 2013
- /CR version: 1.1
- /Certificate date: 09 December 2013
- /Company: CSEC-CSTC
- /CreationDate: D:20160427080307-04'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Developer name: Hewlett-Packard Development Company, L.P.
- /Document number: 383-4-209-CR
- /ETR title, version, date: EAL4+ Common Criteria Evaluation of HP BladeSystem c7000 and c3000 Enclosure with Onboard Administrator (running firmware version 3.7), Virtual Connect (running firmware version 4.01), and HP Integrated Lights-Out (version 1.5), v1.0, October 21, 2013
- /Evaluation completion date: 21 October 2013
- /ModDate: D:20160427080313-04'00'
- /Producer: Adobe PDF Library 11.0
- /ST Title: Hewlett-Packard Development Company, L.P. BladeSystem c7000 and c3000 Security Target
- /ST date: 9 December 2013
- /ST version: 1.16
- /SourceModified: D:20160427115942
- /Sponsor: Hewlett-Packard Development Company, L.P.
- /TOE Version: 5.0
- /TOE name and version: HP BladeSystem c7000 and c3000 Enclosure with Onboard Administrator (running firmware version 3.71), Virtual Connect (running firmware version 4.01), and HP Integrated Lights-Out 3 (version 1.50)
- /TOE short name: HP BladeSystem
- /Title: EAL 2 Evaluation of <TOE name and version>
- pdf_file_size_bytes: 124779
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
|
383-4-209 ST v1.16.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL4+: 4
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 20
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 10
- FCS_CKM.4.1: 1
- FCS_COP.1: 8
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 23
- FDP_ACF.1: 14
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_IFC.1: 20
- FDP_IFF.1: 27
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 12
- FDP_RIP.1.1: 2
- FIA:
- FIA_SOS.1: 14
- FIA_UAU.1: 1
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UID.1: 16
- FIA_UID.2: 10
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA.1: 20
- FMT_MSA.3: 24
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 36
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 1
- FPT_PHP.2: 6
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_RCV.1: 1
- FPT_RCV.2: 6
- FPT_RCV.2.1: 1
- FPT_RCV.2.2: 1
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FPT_TST.1: 18
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.CRYPTO: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.PROTECT: 2
- O:
- O.ACCESS: 4
- O.ADMIN: 8
- O.AUDIT: 4
- O.AUTHENTICATE: 10
- O.FAILURE_OR_TAMPER: 6
- O.FLOWS: 4
- OE:
- OE.CLIENTS: 5
- OE.OS: 3
- OE.PROTECT: 3
- T:
- T.FAILURE: 2
- T.FLOWS: 2
- T.IMPROPER_CONFIG: 2
- T.MASQUERADE: 2
- T.TAMPER: 2
- T.UNAUTH: 2
- T.WEAKCIPHERS: 2
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 6
- FIPS 180-3: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS21: 1
- FIPS26: 1
- FIPS42: 1
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Nathan Lee
- /CreationDate: D:20160419155429-04'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20160419155429-04'00'
- /Producer: Microsoft® Word 2013
- /Subject: BladeSystem c7000 and c3000
- /Title: Security Target
- pdf_file_size_bytes: 1333687
- pdf_hyperlinks: http://www.corsec.com/, mailto:[email protected], http://www.hp.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |