Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Canon MFP Security Chip 1.00
JISEC-CC-CRP-C0050
ID-One EPass 64 v2.0 with BAC and AA
ANSSI-CC-2008/12
name Canon MFP Security Chip 1.00 ID-One EPass 64 v2.0 with BAC and AA
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 01.09.2019
not_valid_before 07.07.2006 26.05.2008
report_link https://www.commoncriteriaportal.org/files/epfiles/c0050_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_12en.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/ https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-dcssi2008_12.pdf
manufacturer Canon Inc. Oberthur Card Systems
manufacturer_web https://www.oberthur.com/
security_level EAL3 EAL4+, ADV_IMP.2, ALC_DVS.2
dgst d4ca034eb499b4b6 88a067a03ddcdc15
heuristics/cert_id JISEC-CC-CRP-C0050 ANSSI-CC-2008/12
heuristics/cert_lab [] SERMA
heuristics/extracted_sars {} ALC_DVS.2, ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, ADV_SPM.1
heuristics/extracted_versions 1.00 2.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2008/16
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2008/16
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0050
  • certification_date: 01.07.2006
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0050_eimg.pdf
    • description: PRODUCT DESCRIPTION The TOE is the Canon MFP Security Chip and will be provided to end users as part of a security kit. The TOE allows protecting hard drives in Canon MFPs and printers from disclosure of confidential information due to theft, without sacrificing the extensibility, versatility, convenience and performance of Canon MFPs and printers. The TOE provides the following functions for protecting hard drives: - Hard drive data encryption - Cryptographic key management - Device identification and authentication
    • evaluation_facility: Japan Electronics and Information Technology IndustriesAssociation, Information Technology security center (JEITA ITSC)
    • product: Canon MFP Security Chip
    • product_type: IT Product ( cryptographic security chip )
    • report_link: https://www.ipa.go.jp/en/security/c0050_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0050_est.pdf
    • toe_version: 1.00
    • vendor: Canon Inc.
  • expiration_date: 01.10.2013
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0050_it5069.html
  • toe_japan_name: Canon MFP Security Chip 1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
protection_profile_links {} {}
pdf_data/report_filename c0050_ecvr.pdf dcssi-2008_12en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2
    • cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
    • cert_id: DCSSI-2008/12
    • cert_item: ID-One EPass 64 v2.0 with BAC and AA
    • cert_item_version: Reference of the application: ePass 64k v2 (BAC AA EAC) v2.0 with patch « Optional Code r3.0 for ID One ePass 64K » v3.0 Reference of the microcontroller with embedded software: P5CD080UA/T0B16100
    • cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
    • developer: Oberthur Technologies 71-73, Rue des Hautes Pâtures – 92726 Nanterre Cedex, France NXP Semiconductors GmbH Box 54 02 40, D-22502 Hamburg, Germany Sponsor Oberthur Technologies 71-73, Rue des Hautes Pâtures – 92726 Nanterre Cedex, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: BSI-PP-0017 version 1.0 Common Criteria Protection Profile - Machine Readable Travel Document with “ICAO Application”, Basic Access Control
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0050: 1
  • DE:
    • BSI-DSZ-CC-0410: 1
    • BSI-DSZ-CC-0410-2007: 1
  • FR:
    • DCSSI-2008/12: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 1
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 2
    • NXP Semiconductors: 3
  • Oberthur:
    • Oberthur: 1
    • Oberthur Technologies: 10
pdf_data/report_keywords/eval_facility
  • Serma:
    • Serma Technologies: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 2
    • AIS34: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20060707112902+09'00'
  • /ModDate: D:20060707112902+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 12465
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Mathieu Robert
  • /CreationDate: D:20080526180728+02'00'
  • /Creator: Acrobat PDFMaker 5.0 pour Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20080526180731+03'00'
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Subject: ID-One EPass 64 v2.0 with BAC and AA
  • /Title: DCSSI-2008/12
  • pdf_file_size_bytes: 253194
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 16
pdf_data/st_filename cible-dcssi2008_12.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 2
    • EAL4+: 3
    • EAL5+: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_XXX: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_IMP.2: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM: 1
  • ALC:
    • ALC_DVS.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 21
    • FCS_CKM.2: 3
    • FCS_CKM.4: 19
    • FCS_COP: 14
    • FCS_COP.1: 26
    • FCS_RND: 9
    • FCS_RND.1: 10
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 23
    • FDP_ACF: 6
    • FDP_ACF.1: 20
    • FDP_DAU: 3
    • FDP_DAU.1: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 5
    • FDP_IFF: 1
    • FDP_ITC: 4
    • FDP_ITC.1: 13
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 11
    • FDP_UCT: 6
    • FDP_UCT.1: 7
    • FDP_UIT: 6
    • FDP_UIT.1: 7
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 6
    • FIA_UAU: 17
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 7
    • FIA_UAU.5: 4
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 2
    • FIA_UAU.6: 6
    • FIA_UID.1: 5
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 8
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 7
    • FMT_LIM.2.1: 1
    • FMT_MOF: 2
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 13
    • FMT_MSA.3: 3
    • FMT_MTD: 7
    • FMT_MTD.1: 17
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_TST.1.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 4
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.IC: 2
  • O:
    • O.CONFIG: 1
    • O.HW_AES: 1
    • O.IC: 2
    • O.MEM_ACCESS: 1
    • O.MF_FW: 1
    • O.RND: 4
    • O.SFR_ACCESS: 1
    • O.TOE: 2
  • OE:
    • OE.IC: 2
  • T:
    • T.TOE: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 10
  • Oberthur:
    • OBERTHUR: 11
    • Oberthur Card Systems: 1
    • Oberthur Technologies: 1
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 2
    • DES:
      • DES: 11
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 14
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 1
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 13
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 2
  • SCA:
    • DPA: 1
    • Physical Probing: 1
    • physical probing: 4
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 0002: 1
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 4
    • EF.DG15: 5
    • EF.SOD: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 3
  • ICAO:
    • ICAO: 10
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /Author: DominDUB
  • /CreationDate: D:20080415142502+02'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20080415144356+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: Microsoft Word - Public ST BAC.doc
  • pdf_file_size_bytes: 775637
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 101
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different