Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sm@rtSIM CX Virgo v1.0
CRP297
Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
JISEC-CC-CRP-C0198
name Sm@rtSIM CX Virgo v1.0 Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme UK JP
not_valid_after 03.08.2021 08.04.2014
not_valid_before 03.08.2016 24.12.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP297v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/STlite297v2.2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0198_est.pdf
manufacturer G+D Mobile Security GmbH Canon Inc.
manufacturer_web https://www.gi-de.com/de/de/mobile-security/ https://www.canon.com/
security_level EAL4+, ALC_DVS.2, AVA_VAN.5 EAL3
dgst fd1f25a8ebc12dd4 8279b5ee82292487
heuristics/cert_id CRP297 JISEC-CC-CRP-C0198
heuristics/extracted_sars ALC_DVS.2, AVA_VAN.5 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1
heuristics/extracted_versions 1.0 1.00
heuristics/report_references/directly_referencing BSI-DSZ-CC-0915-2016 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0915-2016 {}
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0198
  • certification_date: 01.12.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cert_link: https://www.ipa.go.jp/en/security/c0198_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is optional software which adds security features to Canon iR3225/iR3230/iR3235/iR3245 series digital multifunction products. Installing this TOE replaces the system software (e.g., control software) on any of the aforementioned digital multi-function devices. As a basic function of the TOE, it controls functions of the MFP such as Copy, Print, Fax Reception, Mail Box and so on, and temporarily stores image data created during copying, printing, and other document handling operations on the HDD. In most standard multifunction products, such temporary image data is deleted only logically after use, i.e., upon completion of copying or printing, and residual information of deleted image data is not erased at all, being left exposed to the risk of reuse. TOE security functions This TOE comes with a security feature called the HDD Data Erase function, which completely deletes the HDD data, thereby eliminating any risk of the residual information of temporary image data from being reused. The TOE additionally includes the System Administrator Identification and Authentication function and the System Management function, for managing the HDD Data Erase function.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Canon iR3225/iR3230/ iR3235/iR3245 Series HDD Data Erase Kit-B2
    • product_type: IT product(data erase function in digital MFP)
    • report_link: https://www.ipa.go.jp/en/security/c0198_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0198_est.pdf
    • toe_version: Version 1.00
    • vendor: Canon Inc.
  • expiration_date: 01.04.2014
  • supplier: Canon Inc.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0198_it8218.html
  • toe_overseas_name: Canon iR3225/iR3230/iR3235/iR3245 Series HDD Data Erase Kit-B2 Version 1.00
heuristics/st_references/directly_referencing BSI-DSZ-CC-0915-2016 {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0915-2016 {}
heuristics/protection_profiles 9399bd94f9925b16 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf {}
pdf_data/report_filename CRP297v1.0.pdf c0198_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0915-2016: 2
  • UK:
    • CRP297: 1
  • JP:
    • CRP-C0198-01: 1
    • Certification No. C0198: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL1: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL7: 1
  • EAL:
    • EAL3: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_DVS.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.ADMIN_PWD: 1
    • A.NETWORK: 1
  • T:
    • T.HDD_ACCESS: 1
pdf_data/report_keywords/vendor
  • Broadcom:
    • Broadcom: 7
  • GD:
    • Giesecke & Devrient: 14
  • Microsoft:
    • Microsoft: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC17065:2012: 2
  • SCP:
    • SCP02: 1
    • SCP03: 1
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_metadata
  • /CreationDate: D:20120425153253+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20120425153352+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 587707
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 21
pdf_data/st_filename STlite297v2.2.pdf c0198_est.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0915-2016: 1
  • FR:
    • ANSSI-CC-PP-2010/03: 1
pdf_data/st_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03: 1
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 5: 2
    • EAL4: 2
    • EAL4 augmented: 2
  • EAL:
    • EAL3: 9
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_DVS.2: 7
  • AVA:
    • AVA_VAN.5: 7
  • ACM:
    • ACM_CAP.3: 4
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 4
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 4
    • ADV_HLD.2: 3
    • ADV_RCR.1: 4
  • AGD:
    • AGD_ADM.1: 4
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_FUN.1: 4
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 4
    • AVA_SOF.1: 3
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 12
    • FAU_ARP.1.1: 2
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 8
    • FCO_NRO.2: 15
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 2
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 2
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 4
    • FCS_COP: 11
    • FCS_COP.1: 11
    • FCS_COP.1.1: 5
    • FCS_PHP.3: 1
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 3
    • FDP_ACC.2: 9
    • FDP_ACF: 12
    • FDP_ACF.1: 28
    • FDP_IFC: 16
    • FDP_IFC.1: 3
    • FDP_IFC.2: 6
    • FDP_IFF: 16
    • FDP_IFF.1: 28
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 14
    • FDP_ITC.2: 15
    • FDP_ITT.1: 1
    • FDP_MSA.3: 1
    • FDP_RIP: 53
    • FDP_RIP.1: 23
    • FDP_ROL: 13
    • FDP_ROL.1: 11
    • FDP_SDC.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 3
    • FDP_SDI.2.2: 2
    • FDP_UIT: 10
    • FDP_UIT.1: 6
  • FIA:
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UAU: 6
    • FIA_UAU.1: 4
    • FIA_UAU.4: 2
    • FIA_UID: 15
    • FIA_UID.1: 6
    • FIA_UID.2: 2
    • FIA_USB: 4
    • FIA_USB.1: 6
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA: 61
    • FMT_MSA.1: 12
    • FMT_MSA.2: 3
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 2
    • FMT_MTD: 10
    • FMT_MTD.1: 2
    • FMT_MTD.3: 2
    • FMT_SMF: 21
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 2
    • FMT_SMR: 20
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO.1: 7
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_FLS: 24
    • FPT_FLS.1: 23
    • FPT_FLS.1.1: 3
    • FPT_PHP.3: 8
    • FPT_PHP.3.1: 2
    • FPT_RCV: 8
    • FPT_RCV.3: 11
    • FPT_TDC.1: 3
    • FPT_TDC.1.1: 2
    • FPT_TDC.1.2: 3
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 11
    • FTP_ITC.1: 9
  • FDP:
    • FDP_RIP.1: 9
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 10
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 10
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 3
    • A.APPS-PROVIDER: 5
    • A.CONTROLLING-AUTHORITY: 5
    • A.DELETION: 8
    • A.KEY-ESCROW: 5
    • A.PERSONALIZER: 5
    • A.PRODUCTION: 5
    • A.VERIFICATION: 3
    • A.VERIFICATION-AUTHORITY: 4
  • D:
    • D.API_DATA: 1
    • D.APP_CODE: 1
    • D.APP_C_DATA: 1
    • D.APP_I_DATA: 3
    • D.APP_KEYS: 6
    • D.APSD_KEYS: 5
    • D.CARD_MNGT_DATA: 1
    • D.CASD_KEYS: 4
    • D.CRYPTO: 4
    • D.GP_CODE: 1
    • D.ISD_KEYS: 3
    • D.JCS_CODE: 1
    • D.JCS_DATA: 1
    • D.PIN: 2
    • D.SEC_DATA: 2
    • D.VASD_KEYS: 4
  • O:
    • O.AES: 1
    • O.ALARM: 19
    • O.APPLET: 16
    • O.APPLI-AUTH: 7
    • O.CIPHER: 12
    • O.CODE_PKG: 14
    • O.DELETION: 10
    • O.DOMAIN-RIGHTS: 14
    • O.FIREWALL: 27
    • O.GLOBAL-ARRAYS-: 2
    • O.GLOBAL-ARRAYS-CONFID: 3
    • O.GLOBAL-ARRAYS-INTEG: 2
    • O.GLOBAL_ARRAYS_CONFID: 7
    • O.GLOBAL_ARRAYS_INTEG: 7
    • O.HMAC: 1
    • O.INPUT-VALIDATION: 1
    • O.INSTALL: 16
    • O.JAVAOBJECT: 41
    • O.KEY-MNGT: 12
    • O.LOAD: 19
    • O.NATIVE: 13
    • O.OBJ-DELETION: 6
    • O.OPERATE: 26
    • O.PIN-: 2
    • O.PIN-MNGT: 9
    • O.REALLOCATION: 11
    • O.REMOTE: 3
    • O.REMOTE_MTHD: 1
    • O.REMOTE_OBJ: 1
    • O.RESOURCES: 11
    • O.RMI_SERVICE: 1
    • O.RND: 2
    • O.ROR: 1
    • O.SCP: 88
    • O.SCP-IC: 1
    • O.SCP-SUPPORT: 3
    • O.SHA: 1
    • O.SID: 24
    • O.TDES: 1
    • O.TRANSACTION: 11
  • OE:
    • OE.AID-MANAGEMENT: 6
    • OE.AP-KEYS: 7
    • OE.APPLET: 8
    • OE.APPS-PROVIDER: 6
    • OE.BASIC-: 3
    • OE.BASIC-APPS-VALIDATION: 5
    • OE.CA-: 1
    • OE.CA-KEYS: 6
    • OE.CARD-: 5
    • OE.CARD-MANAGEMENT: 29
    • OE.CODE-: 4
    • OE.CODE-EVIDENCE: 17
    • OE.CONTROLLING-AUTHORITY: 6
    • OE.KEY-CHANGE: 7
    • OE.KEY-ESCROW: 6
    • OE.KEY-GENERATION: 7
    • OE.PERSONALIZER: 6
    • OE.PRODUCTION: 11
    • OE.QUOTAS: 6
    • OE.SCP: 24
    • OE.SECURE-APPS-CERTIFICATION: 2
    • OE.SECURITY-DOMAINS: 6
    • OE.SHARE-CONTROL: 8
    • OE.VA-KEYS: 9
    • OE.VERIFICATION: 39
    • OE.VERIFICATION-AUTHORITY: 6
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 1
    • OP.INSTANCE_FIELD: 3
    • OP.INVK_INTERFACE: 6
    • OP.INVK_VIRTUAL: 5
    • OP.INVOKE: 1
    • OP.JAVA: 6
    • OP.PUT: 5
    • OP.RET_RORD: 1
    • OP.THROW: 4
    • OP.TYPE_ACCESS: 4
  • OSP:
    • OSP.AID-MANAGEMENT: 4
    • OSP.APSD-KEYS: 6
    • OSP.BASIC-APPS-VALIDATION: 2
    • OSP.CASD-KEYS: 6
    • OSP.KEY-CHANGE: 6
    • OSP.KEY-GENERATION: 6
    • OSP.QUOTAS: 5
    • OSP.SECURE-APPS-CERTIFICATION: 2
    • OSP.SECURITY-DOMAINS: 6
    • OSP.SHARE-: 1
    • OSP.SHARE-CONTROL: 3
    • OSP.VASD-KEYS: 6
    • OSP.VERIFICATION: 9
  • R:
    • R.JAVA: 9
  • T:
    • T.CONFID-APPLI-DATA: 20
    • T.CONFID-JCS-: 2
    • T.CONFID-JCS-CODE: 7
    • T.CONFID-JCS-DATA: 9
    • T.DELETION: 5
    • T.EXE-CODE: 8
    • T.EXECODE: 1
    • T.INSTALL: 8
    • T.INTEG-: 1
    • T.INTEG-APPLI-: 7
    • T.INTEG-APPLI-CODE: 14
    • T.INTEG-APPLI-DATA: 21
    • T.INTEG-JCS-: 2
    • T.INTEG-JCS-CODE: 5
    • T.INTEG-JCS-DATA: 13
    • T.INTEG-USER-DATA: 12
    • T.LIFE_CYCLE: 5
    • T.NATIVE: 6
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 7
    • T.RESOURCES: 8
    • T.RNG: 1
    • T.SECURE-DELETION: 1
    • T.SECURE_DELETION: 9
    • T.SID: 18
    • T.UNAUTHORIZED_ACCESS: 5
    • T.UNAUTHORIZED_CARD-: 1
    • T.UNAUTHORIZED_CARD-MNGT: 1
    • T.UNAUTHORIZED_CARD_MNGT: 5
  • A:
    • A.ADMIN: 3
    • A.ADMIN_PWD: 1
    • A.NETWORK: 4
    • A.PWD_MANAGE: 1
  • O:
    • O.ADMIN_AUTH: 4
    • O.AUTH_BOX: 1
    • O.RESIDUAL: 5
  • OE:
    • OE.ADMIN: 2
    • OE.ADMIN_PWD: 2
    • OE.NETWORK: 2
  • T:
    • T.HDD: 1
    • T.HDD_ACCESS: 2
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 1
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 17
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 12
    • DES:
      • DES: 11
  • constructions:
    • MAC:
      • CMAC: 3
      • HMAC: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 1
      • SHA-512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 15
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 3
    • RNG: 2
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • CCM:
    • CCM: 5
  • ECB:
    • ECB: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • physical tampering: 4
  • SCA:
    • DPA: 2
    • Leak-Inherent: 2
    • physical probing: 2
  • other:
    • JIL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 197: 5
    • FIPS 46-3: 2
    • FIPS PUB 180-4: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 18031: 4
    • ISO/IEC 9797-: 1
    • ISO/IEC 9797-1: 3
  • NIST:
    • NIST SP 800-38: 1
    • SP 800-108: 1
  • RFC:
    • RFC 2104: 1
    • RFC2104: 1
  • SCP:
    • SCP02: 9
    • SCP03: 9
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 4
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.framework: 3
    • javacard.security: 13
  • javacardx:
    • javacardx.crypto: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this security target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Augmentation: ALC_DVS.2 and AVA_VAN.5
  • /Author: Giesecke & Devrient
  • /Company: Giesecke & Devrient GmbH
  • /CreationDate: D:20160801121713+02'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Keywords: Version 2.2/2016-08-01
  • /ModDate: D:20160801121746+02'00'
  • /Producer: Adobe PDF Library 10.0
  • /SourceModified: D:20160801101640
  • /State: Public
  • /Styles: supported
  • /Subject: SkySIM CX Virgo V1.0
  • /TOE_Configuration: Basic configuration
  • /TOE_HW_ST: BCM_SPS02 C0
  • /TOE_Name: SkySIM CX Virgo V1.0
  • /TemplVersion: 1.0
  • /Title: Security Target Lite
  • /conformance_claim: demonstrable
  • pdf_file_size_bytes: 908468
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 101
  • /Author: Satoshi Hirota
  • /CreationDate: D:20120307154318+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /Keywords:
  • /ModDate: D:20120307154318+09'00'
  • /Producer: Adobe LiveCycle PDFG 7.2
  • /Subject:
  • /Title: HDD Data Erase Kit-B1 Security Target
  • pdf_file_size_bytes: 290588
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different