name |
Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03 |
MetaPKI |
category |
Other Devices and Systems |
Key Management Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
09.09.2005 |
06.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0036_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-81fr.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-81en.pdf |
manufacturer |
Canon Inc. |
BULL S.A. |
manufacturer_web |
|
https://www.bull.com |
security_level |
EAL3 |
EAL3+, AVA_VAN.3, ALC_FLR.3 |
dgst |
fd7107359fa94ec9 |
d131eb2df51a5ee2 |
heuristics/cert_id |
JISEC-CC-CRP-C0036 |
ANSSI-CC-2012/81 |
heuristics/cert_lab |
[] |
AMOSSYS |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2014-2103, CVE-2014-3402, CVE-2014-3406, CVE-2011-4022, CVE-2013-1218, CVE-2013-1243 |
heuristics/indirect_transitive_cves |
{} |
CVE-2014-2103, CVE-2014-3402, CVE-2014-3406, CVE-2011-4022, CVE-2013-1218, CVE-2013-1243 |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
heuristics/extracted_versions |
2.03 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
Certificate Number: 2012/81 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2009/56 |
heuristics/report_references/indirectly_referenced_by |
{} |
Certificate Number: 2012/81 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2009/56 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0036
- certification_date: 01.01.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0036_eimg.pdf
- description: PRODUCT DESCRIPTION This product is a software program to be installed for use on the Canon iR4570/iR3570/iR2870/iR2270 -series multifunction products (hereafter referred to collectively as the “multifunction product”). The multifunction product is a digital copier that offers the combined functionality of Copy, Send (Universal Send), Fax Reception, Mail Box, Print, Remote UI (a Web browser interface for operating the multifunction product), plus many others. When the Copy, Send (Universal Send), Fax Reception (fax/I-fax reception) or Print function is used, temporary image data is created on the hard drive of the multifunction product. Also, when the Mail Box function is used (for document storage) or the Fax Reception function is used (for “in-memory reception” of faxes/I-faxes or forwarding of faxes/I-faxes), image data is stored in the receiving inbox that is on the multifunction product. Furthermore, when the Remote UI function is used, image data is exchanged over the network between the Web browser on the user's PC and the multifunction product. By installing this product, security enhancements are added to the multifunction product, helping counter the threat of disclosure of temporary image data created on the hard drive, permanent image data stored in the inboxes, and image data that is transmitted over the Remote UI communication path.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2
- product_type: IT Product ( data protection function in digital MFD )
- report_link: https://www.ipa.go.jp/en/security/c0036_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0036_est.pdf
- toe_version: Version 2.03
- vendor: Canon Inc.
- expiration_date: 01.10.2013
- supplier: Canon Inc.
- toe_japan_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0036_it5070.html
- toe_overseas_name: Canon iR4570/iR3570/iR2870/iR2270 Series iR Security Kit-B2 Version 2.03
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0036_ecvr.pdf |
ANSSI-CC_2012-81fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 3 augmenté ALC_FLR.3, AVA_VAN.3
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2012/81
- cert_item: MetaPKI
- cert_item_version: Version 9.2.5
- cert_lab: Amossys 4 bis allée du bâtiment, 35000 Rennes, France
- developer: BULL Rue Jean Jaures, 78340 Les Clayes sous Bois, France Commanditaire BULL Rue Jean Jaures, 78340 Les Clayes sous Bois, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0036: 1
|
- FR:
- ANSSI-2009-56: 1
- ANSSI-2010-09: 1
- ANSSI-CC-2012/81: 16
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 3
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- PKCS:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20060123172731+09'00'
- /ModDate: D:20060123172731+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 14795
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate: D:20121206132257+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20121206132257+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 221661
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
|
ANSSI-CC-cible_2012-81en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 1
- EAL 3 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 5
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_SEL.1: 3
- FAU_SEL.1.1: 1
- FAU_STG.1: 5
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 3
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO.2: 1
- FCO_NRO_CIMC.3: 6
- FCO_NRO_CIMC.3.1: 1
- FCO_NRO_CIMC.3.2: 1
- FCO_NRO_CIMC.3.3: 1
- FCO_NRO_CIMC.4: 4
- FCO_NRO_CIMC.4.1: 1
- FCO_NRO_CIMC.4.2: 1
- FCS:
- FCS_CKM.4: 2
- FCS_CKM_CIMC.5: 4
- FCS_CKM_CIMC.5.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ACF_CIMC.2: 4
- FDP_ACF_CIMC.2.1: 1
- FDP_ACF_CIMC.2.2: 1
- FDP_ACF_CIMC.3: 4
- FDP_ACF_CIMC.3.1: 1
- FDP_CIMC_BKP.1: 6
- FDP_CIMC_BKP.1.1: 1
- FDP_CIMC_BKP.1.2: 1
- FDP_CIMC_BKP.1.3: 1
- FDP_CIMC_BKP.1.4: 1
- FDP_CIMC_BKP.2: 4
- FDP_CIMC_BKP.2.1: 1
- FDP_CIMC_BKP.2.2: 1
- FDP_CIMC_CER.1: 5
- FDP_CIMC_CER.1.1: 1
- FDP_CIMC_CER.1.2: 1
- FDP_CIMC_CER.1.3: 1
- FDP_CIMC_CER.1.4: 1
- FDP_CIMC_CRL.1: 4
- FDP_CIMC_CRL.1.1: 1
- FDP_CIMC_CSE.1: 4
- FDP_CIMC_CSE.1.1: 1
- FDP_CIMC_OCSP.1: 4
- FDP_CIMC_OCSP.1.1: 1
- FDP_ETC_CIMC.4: 1
- FDP_ETC_CIMC.5: 5
- FDP_ETC_CIMC.5.1: 1
- FDP_ITT.1: 5
- FDP_ITT.1.1: 1
- FDP_SDI_CIMC.3: 4
- FDP_SDI_CIMC.3.1: 1
- FDP_SDI_CIMC.3.2: 1
- FDP_UCT.1: 3
- FDP_UCT.1.1: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 3
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MOF_CIMC.2: 1
- FMT_MOF_CIMC.3: 8
- FMT_MOF_CIMC.3.1: 1
- FMT_MOF_CIMC.3.2: 1
- FMT_MOF_CIMC.3.3: 1
- FMT_MOF_CIMC.3.4: 1
- FMT_MOF_CIMC.4: 1
- FMT_MOF_CIMC.5: 8
- FMT_MOF_CIMC.5.1: 1
- FMT_MOF_CIMC.5.2: 1
- FMT_MOF_CIMC.5.3: 1
- FMT_MOF_CIMC.6: 8
- FMT_MOF_CIMC.6.1: 1
- FMT_MOF_CIMC.6.2: 1
- FMT_MOF_CIMC.6.3: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 2
- FMT_MTD_CIMC.4: 5
- FMT_MTD_CIMC.4.1: 1
- FMT_MTD_CIMC.5: 6
- FMT_MTD_CIMC.5.1: 1
- FMT_MTD_CIMC.6: 1
- FMT_MTD_CIMC.7: 6
- FMT_MTD_CIMC.7.1: 1
- FMT_SMF.1: 5
- FMT_SMR.1: 1
- FMT_SMR.2: 19
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_CIMC_TSP.1: 5
- FPT_CIMC_TSP.1.1: 1
- FPT_CIMC_TSP.1.2: 1
- FPT_CIMC_TSP.1.3: 1
- FPT_CIMC_TSP.1.4: 1
- FPT_ITC.1: 5
- FPT_ITC.1.1: 1
- FPT_ITT.1: 3
- FPT_ITT.1.1: 1
- FPT_RVM.1: 3
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140: 1
- FIPS 140-1: 13
- PKCS:
- PKCS#11: 1
- PKCS#12: 8
- PKCS#5: 2
- RFC:
- RFC 2560: 7
- RFC 5280: 5
- RFC-5280: 1
- RFC-5820: 1
- RFC3161: 2
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- wich allows to redirect all logs produced by MetaPKI to Syslog server. This functionality is out of scope of TOE. 1.3.2 Technical Architecture The TOE design is very modular and flexible, the functional: 1
|
pdf_data/st_metadata |
|
- /Author:
- /CreationDate: D:20121205142435+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20121205142435+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 521962
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 72
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |