| name |
Canon MFP Security Chip Version: 2.00 |
Check Point VPN-1/FireWall-1© NG on Nokia IPSO |
| category |
Other Devices and Systems |
Boundary Protection Devices and Systems |
| scheme |
JP |
UK |
| status |
archived |
archived |
| not_valid_after |
30.06.2014 |
05.03.2013 |
| not_valid_before |
17.06.2009 |
01.09.2003 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0215_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP193.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0215_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/LFA_T193v1-8.pdf |
| manufacturer |
Canon Inc. |
Nokia Corporation |
| manufacturer_web |
https://www.canon.com/ |
https://www.nokia.com/ |
| security_level |
EAL3 |
EAL4 |
| dgst |
f62e92eccdc04aa0 |
d065eb9ccbe2c14c |
| heuristics/cert_id |
JISEC-CC-CRP-C0215 |
CRP193 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1 |
| heuristics/extracted_versions |
2.00 |
1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0215
- certification_date: 01.06.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0215_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the Canon MFP Security Chip and will be provided to end users as part of a HDD data encryption kit. The TOE allows protecting hard drives in Canon MFPs and printers from disclosure of confidential information due to theft, without sacrificing the extensibility, versatility, convenience and performance of Canon MFPs and printers. The TOE provides the following functions for protecting hard drives: - Hard drive data encryption - Cryptographic key management - Device identification and authentication TOE security functions Same as above.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Canon MFP Security Chip
- product_type: IT product(cryptographic security chip)
- report_link: https://www.ipa.go.jp/en/security/c0215_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0215_est.pdf
- toe_version: 2.00
- vendor: Canon Inc.
- expiration_date: 01.06.2014
- revalidations: [frozendict({'date': '2011-03', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0215_it8217_02.html'})]
- supplier: Canon Inc.
- toe_japan_name: Canon MFP Security Chip 2.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0215_it8217.html
- toe_overseas_name: Canon MFP Security Chip 2.01
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0215_erpt.pdf |
CRP193.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0215-01: 1
- Certification No. C0215: 1
|
- UK:
- CERTIFICATION REPORT No. P193: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL1: 1
- EAL4: 25
- EAL7: 1
- ITSEC:
- ITSEC E3: 1
- ITSEC E3 Assurance: 1
- ITSEC E3 Evaluation: 1
- ITSEC E3 Secure: 1
- ITSEC E3 and: 3
- ITSEC E3 evaluation: 1
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- T:
- T.HDD_ACCESS: 1
- T.WRONG_BOARD: 4
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- ISO:
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- PKCS:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20120509161007+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120509161037+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 766108
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 20
|
- /Author: racook
- /CreationDate: D:20031001145710Z
- /Creator: LFA_T193_P193_CertRep_10 - Microsoft Word
- /ModDate: D:20131119171437Z
- /Producer: Acrobat PDFWriter 5.0 for Windows NT
- /Title: LFA_T193_P193_CertRep_10.DOC
- pdf_file_size_bytes: 113666
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
| pdf_data/st_filename |
c0215_est.pdf |
LFA_T193v1-8.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- ITSEC:
- ITSEC E3 Certification: 1
- ITSEC E3 System: 1
- ITSEC E3 or: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 4
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 4
- ADV_HLD.2: 4
- ADV_RCR.1: 4
- AGD:
- AGD_ADM.1: 4
- AGD_USR.1: 4
- ALC:
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 4
- ATE_FUN.1: 4
- ATE_IND.2: 4
- AVA:
- AVA_MSU.1: 4
- AVA_SOF: 1
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 6
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FIA:
- FIA_SOS.2: 4
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 15
- FIA_UAU.4: 14
- FIA_UAU.4.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 16
- FMT:
- FPT:
- FPT_RMV.1: 1
- FPT_RVM.1: 18
- FPT_RVM.1.1: 1
- FPT_SEP.1: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 13
- FAU_SAR.1.1: 2
- FAU_SAR.1.2: 2
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 2
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 36
- FDP_IFC.1.1: 4
- FDP_IFF.1: 33
- FDP_IFF.1.1: 4
- FDP_IFF.1.2: 4
- FDP_IFF.1.3: 6
- FDP_IFF.1.4: 4
- FDP_IFF.1.5: 4
- FDP_IFF.1.6: 4
- FDP_ITT.1: 13
- FDP_ITT.1.1: 2
- FIA:
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 3
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 2
- FMT_MSA.1: 27
- FMT_MSA.1.1: 4
- FMT_MSA.2: 3
- FMT_MSA.3: 25
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMR.1: 10
- FPT:
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 11
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 2
- FTP_ITC.1.3: 2
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.BOARD_AUTH: 7
- O.CRYPTO: 8
- OE:
- T:
- T.HDD_ACCESS: 3
- T.WRONG_BOARD: 2
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- FIPS:
- FIPS 186-2: 1
- FIPS PUB 197: 3
|
- FIPS:
- FIPS PUB 180-1: 1
- FIPS PUB 197: 1
- FIPS PUB 46-2: 4
- PKCS:
- RFC:
- RFC 1321: 2
- RFC 1777: 1
- RFC 1778: 1
- RFC 2104: 2
- RFC 2246: 1
- RFC 2404: 1
- RFC 2405: 1
- RFC 2409: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- these dependencies are addressed by the correct implementation of the standard protocols, which is out of scope of the evaluation Common Criteria EAL4 Evaluation VPN-1/Firewall-1 Next Generation (Feature Pack 2: 1
|
| pdf_data/st_metadata |
- /Author: Canon Inc.
- /CreationDate: D:20120424203211+09'00'
- /Creator: PScript5.dll Version 5.2
- /Keywords:
- /ModDate: D:20120424203211+09'00'
- /Producer: Adobe LiveCycle PDFG 7.2
- /Subject: Security Chip for Canon MFPs/Printers
- /Title: Canon MFP Security Chip Security Target
- pdf_file_size_bytes: 326854
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: ingber
- /CreationDate: D:20030717214842Z
- /Creator: ADOBEPS4.DRV Version 4.52
- /ModDate: D:20031001150027+02'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - CC_Security_Target_NG_FP2 v1.8 for Nokia.doc
- pdf_file_size_bytes: 274699
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 47
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |