name |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 |
vinCERTcore, versión 4.0.5.5733 |
category |
Other Devices and Systems |
Products for Digital Signatures |
scheme |
JP |
ES |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
24.04.2023 |
not_valid_before |
09.09.2005 |
24.04.2018 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-CCRA.pdf |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0036_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-INF-2264%20v2.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2016-01-ST-v1.12.pdf |
manufacturer |
Canon Inc. |
Víntegris, SL. |
manufacturer_web |
|
https://www.vintegris.com/ |
security_level |
EAL3 |
EAL4+, ALC_FLR.2 |
dgst |
fd7107359fa94ec9 |
1c5f79388b3fab19 |
heuristics/cert_id |
JISEC-CC-CRP-C0036 |
2016-01-INF-2264 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AGD_OPE.1, ASE_ECD.1, ADV_FSP.4, ATE_DPT.1, ADV_TDS.3, ALC_DEL.1, ALC_CMS.4, ALC_DVS.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ATE_COV.2, ATE_FUN.1, AGD_PRE.1, AVA_VAN.3, ALC_TAT.1, ALC_FLR.2 |
heuristics/extracted_versions |
2.03 |
4.0.5.5733 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0036
- certification_date: 01.01.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0036_eimg.pdf
- description: PRODUCT DESCRIPTION This product is a software program to be installed for use on the Canon iR4570/iR3570/iR2870/iR2270 -series multifunction products (hereafter referred to collectively as the “multifunction product”). The multifunction product is a digital copier that offers the combined functionality of Copy, Send (Universal Send), Fax Reception, Mail Box, Print, Remote UI (a Web browser interface for operating the multifunction product), plus many others. When the Copy, Send (Universal Send), Fax Reception (fax/I-fax reception) or Print function is used, temporary image data is created on the hard drive of the multifunction product. Also, when the Mail Box function is used (for document storage) or the Fax Reception function is used (for “in-memory reception” of faxes/I-faxes or forwarding of faxes/I-faxes), image data is stored in the receiving inbox that is on the multifunction product. Furthermore, when the Remote UI function is used, image data is exchanged over the network between the Web browser on the user's PC and the multifunction product. By installing this product, security enhancements are added to the multifunction product, helping counter the threat of disclosure of temporary image data created on the hard drive, permanent image data stored in the inboxes, and image data that is transmitted over the Remote UI communication path.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2
- product_type: IT Product ( data protection function in digital MFD )
- report_link: https://www.ipa.go.jp/en/security/c0036_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0036_est.pdf
- toe_version: Version 2.03
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- supplier: Canon Inc.
- toe_japan_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0036_it5070.html
- toe_overseas_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
|
2016-01-CCRA.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20180404121729+02'00'
- pdf_file_size_bytes: 746055
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0036_ecvr.pdf |
2016-01-INF-2264 v2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0036: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 2
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 1
- FAU_GEN.2: 1
- FAU_SAR.1: 1
- FAU_SAR.3: 1
- FCS:
- FDP:
- FDP_ACC: 2
- FDP_ACF: 2
- FDP_ETC.1: 1
- FDP_ETC.2: 1
- FDP_ITC.2: 1
- FDP_ROL.1: 1
- FDP_UIT: 2
- FIA:
- FIA_AFL.1: 1
- FIA_UAU.1: 1
- FIA_UAU.6: 1
- FIA_USB.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA: 1
- FMT_MSA.3: 1
- FMT_SMR.2: 1
- FPT:
- FTA:
- FTA_SSL.3: 1
- FTA_TSE.1: 1
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the vinCERTweb: 1
- factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
- out of scope: 4
- to manage the certificate creation flow in the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: •: 1
- using the related functionalities on vinCERTweb. It’s required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20060123172731+09'00'
- /ModDate: D:20060123172731+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 14795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: .
- /CreationDate: D:20180322165059+01'00'
- /Creator: PDFCreator Version 1.3.2
- /Keywords:
- /ModDate: D:20180322165059+01'00'
- /Producer: GPL Ghostscript 9.05
- /Subject:
- /Title: 2016-01-INF-2264 v2
- pdf_file_size_bytes: 1304805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
|
2016-01-ST-v1.12.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4+: 3
- EAL4: 7
- EAL4 augmented: 4
- EAL4+: 4
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 9
- FAU_GEN.2.1: 1
- FAU_SAA: 1
- FAU_SAA.1: 6
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 4
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.2: 4
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 6
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 51
- FDP_ACC.1: 10
- FDP_ACF: 52
- FDP_ACF.1: 13
- FDP_ETC: 1
- FDP_ETC.1: 22
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 21
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_ITC: 1
- FDP_ITC.1: 17
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 29
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.1: 11
- FDP_ROL: 1
- FDP_ROL.1: 4
- FDP_ROL.1.2: 1
- FDP_SDI: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 5
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 6
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 22
- FMT_MSA.1: 3
- FMT_MSA.3: 17
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 3
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 4
- FMT_SMR.2: 11
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_STM.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 28
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 3
- FTA_SSL.4.1: 1
- FTA_TSE: 1
- FTA_TSE.1: 16
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 20
- FTP_ITC.1.1: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 1
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 140-2: 4
- ISO:
- PKCS:
- PKCS #12: 1
- PKCS#11: 1
- PKCS#12: 6
- PKCS#5: 1
- RFC:
- RFC2986: 1
- RFC5246: 1
- RFC7292: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- are stored in vinCERTcore. Digital signatures are always performed remotely in the vinCERTcore HSM (out of scope of evaluation). Password protected key usage is also supported. The vinCERTagent and the: 1
- factor and second factor authentication mechanisms. Both vinCERTweb and vinCERTagent connects (out of scope of ST) to this subsystem to allow end-user authentication to the TOE. HSM subsystem is responsible: 1
- out of scope: 4
- to manage the certificate creation flowin the system using the external vinCERTweb product (out of scope of evaluation) and storing them in the HSM. The operative can be performed in two different ways: 1
- using the related functionalities on vinCERTweb. It's required a vinCERTagent software (out of scope of evaluation) installed for digital signature purposes. This agent is compatible with CSP and: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20180305120726+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180305120726+01'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 15342857
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 97
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
True |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |