Canon imageRUNNER ADVANCE C5000 Series 2600.1 model Version 1.0

CSV information ?

Status archived
Valid from 29.03.2011
Valid until 17.03.2015
Scheme 🇯🇵 JP
Manufacturer Canon Inc.
Category Multi-Function Devices
Security level ALC_FLR.2, EAL3+

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0287

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES

Vendor
Microsoft

Security level
EAL3, EAL3 augmented
Claims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN
Security Assurance Requirements (SAR)
ALC_FLR.2
Certificates
CRP-C0287-01, Certification No. C0287

Certification process
out of scope, of the print job contains an identification and authentication mechanism, that mechanism is out of scope of this evaluation. In terms of this evaluation, only Microsoft Internet Explorer 6 SP1, for use as the Web browser for operating the TOE. Any and all other Web browsers and versions are out of scope of this evaluation. 1.2 Conduct of Evaluation Evaluation Facility conducted IT security evaluation, MFP, created by the submitted print jobs. As such, the following security functions are considered out of scope of this evaluation. 1) The TOE supports various print protocols for the submission of print jobs, protocols have their own identification and authentication mechanisms, and those mechanisms are out of scope of this evaluation. Examples of this include the identification and authentication mechanism in the

Standards
FIPS PUB 186-2, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004

File metadata

Title CRP-e
Author IPA/JISEC
Creation date D:20110630165749+09'00'
Modification date D:20110630170428+09'00'
Pages 34
Creator Word 用 Acrobat PDFMaker 8.1
Producer Acrobat Distiller 8.3.0 (Windows)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
ECDH, DH
Hash functions
SHA-1

Vendor
Microsoft, Microsoft Corporation

Security level
EAL3, EAL 3, EAL3 augmented, EAL 3 augmented
Claims
D.DOC, D.FUNC, D.PROT, D.CONF, O.HDD, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.INTERFACE, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.AUDIT, OE.PHYISCAL
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, APE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FDP_ACC.1, FDP_ACF.1, FDP_RIP.1, FDP_IFF, FDP_IFC, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.1.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FPT_CIP_EXP, FPT_FDI_EXP, FPT_STM.1, FPT_TST.1, FPT_CIP_EXP.1, FPT_FDI_EXP.1, FPT_PHP.1, FPT_CIP_EXP.1.1, FPT_CIP_EXP.1.2, FPT_FDI_EXP.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_STM.1.1, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3

Side-channel analysis
physical tampering, malfunction

Standards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 186-2

File metadata

Title 文書ID:
Author Satoshi HIROTA
Creation date D:20110623065012Z
Modification date D:20110630170507+09'00'
Pages 68
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0287

Extracted SARs

ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2

Similar certificates

Name Certificate ID
Canon imageRUNNER ADVANCE 4000 Series 2600.1 model Version: 1.0 JISEC-CC-CRP-C0329 Compare
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model Version:1.0 JISEC-CC-CRP-C0377 Compare
Canon imageRUNNER ADVANCE 6200 Series 2600.1 model (EX) Version:1.0 JISEC-CC-CRP-C0393 Compare
Canon imageRUNNER ADVANCE 8200 Series 2600.1 model (EX) Version:1.0 JISEC-CC-CRP-C0392 Compare
Canon imageRUNNER ADVANCE C9200 PRO Series / C7200 Series 2600.1 model (EX) Version:1.1 JISEC-CC-CRP-C0397 Compare
Canon imageRUNNER ADVANCE C2200 Series 2600.1 model Version:1.1 JISEC-CC-CRP-C0394 Compare
Canon imageRUNNER ADVANCE C3300 Series 2600.1 model 1.0 JISEC-CC-CRP-C0495 Compare
Canon imageRUNNER ADVANCE C350/C250 Series 2600.1 model 1.0 JISEC-CC-CRP-C0497 Compare
Canon imageRUNNER ADVANCE 8500 Series 2600 model 1.0 JISEC-CC-CRP-C0520 Compare
Canon imageRUNNER ADVANCE 6500 Series 2600 model 1.0 JISEC-CC-CRP-C0519 Compare
Canon imageRUNNER ADVANCE C356/C256 Series 2600 model 1.0 JISEC-CC-CRP-C0586-01-2018 Compare
Canon imageRUNNER ADVANCE C355/C255 Series 2600 model 1.0 JISEC-CC-CRP-C0560 Compare
Canon imageRUNNER ADVANCE C35900KG/C3500 Series 2600 model 1.0 JISEC-CC-CRP-C0556 Compare
Canon imageRUNNER ADVANCE 45900KG/4500 Series 2600 model 1.0 JISEC-CC-CRP-C0561 Compare
Canon imageRUNNER ADVANCE C75900KG/C7500 Series 2600 model 1.0 JISEC-CC-CRP-C0559 Compare
Canon imageRUNNER ADVANCE C55900KG/C5500 Series 2600 model 1.0 JISEC-CC-CRP-C0534 Compare
Canon imageRUNNER ADVANCE C5200 Series 2600.1 model 1.3 JISEC-CC-CRP-C0447 Compare
Canon imageRUNNER ADVANCE 500/400 Series 2600.1 model 1.3 JISEC-CC-CRP-C0448 Compare
Showing 5 out of 18.

Scheme data ?

Cert Id JISEC-CC-CRP-C0287
Supplier Canon Inc.
Toe Overseas Name Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.1 (Certification of this product has been revoked 2015-03)
Expiration Date 01.03.2015
Claim EAL3+ ALC_FLR.2 PP
Certification Date 01.03.2011
Toe Overseas Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0287_it0294.html
Toe Japan Name Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.0
Enhanced
Product Canon imageRUNNER ADVANCE C5000 Series 2600.1 model
Toe Version 1.0
Product Type Multifunction Product
Cc Version 3.1
Assurance Level EAL3 Augmented with ALC_FLR.2
Protection Profile IEEE Std 2600.1-2009
Vendor Canon Inc.
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Description PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1â„¢-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0287', 'toe_overseas_name': 'Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.1 (Certification of this product has been revoked 2015-03)', 'expiration_date': '2015-03-01', 'claim': 'EAL3+ ALC_FLR.2 PP', 'certification_date': '2011-03-01', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0287_it0294.html', 'toe_japan_name': 'Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.0', 'enhanced': {'__update__': {'product': 'Canon imageRUNNER ADVANCE C5000 Series 2600.1 model', 'toe_version': '1.0', 'cc_version': '3.1', 'protection_profile': 'IEEE Std 2600.1-2009', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'description': 'PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1â„¢-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.'}, '__delete__': ['certification_date', 'cert_link']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0459', 'supplier': 'Canon Inc.', 'toe_overseas_name': 'Canon imageRUNNER ADVANCE C5000 Series 2600.1 model\n 1.3', 'expiration_date': '2020-01', 'claim': 'EAL3+\n ALC_FLR.2\n PP', 'certification_date': '2014-12', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0459_it4514.html', 'toe_japan_name': 'Canon imageRUNNER ADVANCE C5000 Series 2600.1 model\n 1.3', 'enhanced': {'product': 'Canon imageRUNNER ADVANCE C5000 \n Series 2600.1 model', 'toe_version': '1.3', 'product_type': 'Multifunction Product', 'certification_date': '2014-12-25', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL3 Augmented with ALC_FLR.2', 'protection_profile': 'IEEE Std 2600.1â„¢-2009', 'vendor': 'Canon Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Information Security Evaluation Office', 'cert_link': 'https://www.ipa.go.jp/en/security/c0459_eimg.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1â„¢-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. \n \n TOE security functionality \n The TOE embodies the following security functions. \n \n \n \n - \n User Authentication Function \n \n \n \n Function for identifying and authenticating the user. \n \n \n - \n Function Use Restriction Function \n \n \n \n Function for restricting the use of the MFP depending on the authority of the user. \n \n \n - \n Job Output Restriction Function \n \n \n \n Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. \n \n \n - \n Forward Received Jobs Function \n \n \n \n Function for restricting the machine from forwarding received data directly to the LAN. \n \n \n - \n HDD Data Erase Function \n \n \n \n Function for erasing unnecessary data from the hard disk by overwriting the data. \n \n \n - \n HDD Data Encryption Function \n \n \n \n Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. \n \n \n - \n LAN Data Protection Function \n \n \n \n Function for protecting all IP packets that are communicated with an IT device. \n \n \n - \n Self-Test Function \n \n \n \n Function for testing the integrity of the executable code at startup. \n \n \n - \n Audit Log Function \n \n \n \n Function for generating audit logs on security events and allowing them to be viewed by the administrator. \n \n \n - \n Management Function \n \n \n \n Function for restricting device settings that influence security to be made only by the administrator.'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'af4a8d4a98b5e41410e7c008df62f985427619466fab27ecd478147d955afab2', 'txt_hash': '6ce89c153b32161e956d40d960f0331b1c51360a54b272ff63c55605b2c19b49'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'dae308e642035f6efb4e1731cf3cd5bd76b07512317b767ee0b8b66dcf0587bc', 'txt_hash': '4f1af31d046bcdc7bbdf6e204c56fee493bf6a0ebbd309a821d22fe9344f04c3'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 626101, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 34, '/Author': 'IPA/JISEC', '/Company': 'IPA', '/CreationDate': "D:20110630165749+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 8.1', '/Manager': 'IPA', '/ModDate': "D:20110630170428+09'00'", '/Producer': 'Acrobat Distiller 8.3.0 (Windows)', '/Title': 'CRP-e', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1200786, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 68, '/Author': 'Satoshi HIROTA', '/CreationDate': 'D:20110623065012Z', '/Creator': 'Microsoft® Office Word 2007', '/ModDate': "D:20110630170507+09'00'", '/Producer': 'Microsoft® Office Word 2007', '/Title': '文書ID:', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0287-01': 1, 'Certification No. C0287': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, 'vendor': {'Microsoft': {'Microsoft': 3}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-2': 1}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 4, 'of the print job contains an identification and authentication mechanism, that mechanism is out of scope of this evaluation. In terms of this evaluation, only Microsoft Internet Explorer 6 SP1': 1, 'for use as the Web browser for operating the TOE. Any and all other Web browsers and versions are out of scope of this evaluation. 1.2 Conduct of Evaluation Evaluation Facility conducted IT security evaluation': 1, 'MFP, created by the submitted print jobs. As such, the following security functions are considered out of scope of this evaluation. 1) The TOE supports various print protocols for the submission of print jobs': 1, 'protocols have their own identification and authentication mechanisms, and those mechanisms are out of scope of this evaluation. Examples of this include the identification and authentication mechanism in the': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 8, 'EAL 3': 2, 'EAL3 augmented': 7, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 11, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_ECD': 2}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.2': 6, 'FAU_STG.1': 8, 'FAU_STG.4': 6, 'FAU_GEN': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_COP.1': 25, 'FCS_CKM.1': 24, 'FCS_CKM.2': 13, 'FCS_CKM.4': 12, 'FCS_COP.1.1': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1}, 'FDP': {'FDP_ACC.1': 49, 'FDP_ACF.1': 34, 'FDP_RIP.1': 6, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_IFC.1': 4, 'FDP_ACC.1.1': 4, 'FDP_ACF.1.1': 4, 'FDP_ACF.1.2': 4, 'FDP_ACF.1.3': 4, 'FDP_ACF.1.4': 4, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6}, 'FIA': {'FIA_ATD.1': 9, 'FIA_UAU.1': 13, 'FIA_UID.1': 22, 'FIA_USB.1': 7, 'FIA_AFL.1': 7, 'FIA_SOS.1': 6, 'FIA_UAU.7': 7, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA.1': 23, 'FMT_MSA.3': 25, 'FMT_MTD.1': 18, 'FMT_SMF.1': 25, 'FMT_SMR.1': 33, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MTD.1.1': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_CIP_EXP': 2, 'FPT_FDI_EXP': 3, 'FPT_STM.1': 9, 'FPT_TST.1': 6, 'FPT_CIP_EXP.1': 16, 'FPT_FDI_EXP.1': 11, 'FPT_PHP.1': 6, 'FPT_CIP_EXP.1.1': 2, 'FPT_CIP_EXP.1.2': 3, 'FPT_FDI_EXP.1.1': 2, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_SSL.3': 15, 'FTA_SSL.3.1': 2}, 'FTP': {'FTP_ITC.1': 12, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 12, 'D.FUNC': 6, 'D.PROT': 6, 'D.CONF': 8}, 'O': {'O.HDD': 9, 'O.DOC': 18, 'O.FUNC': 9, 'O.PROT': 9, 'O.CONF': 18, 'O.USER': 15, 'O.INTERFACE': 9, 'O.SOFTWARE': 8, 'O.AUDIT': 8}, 'T': {'T.DOC': 6, 'T.FUNC': 3, 'T.PROT': 3, 'T.CONF': 6}, 'A': {'A.ACCESS': 3, 'A.USER': 3, 'A.ADMIN': 6}, 'OE': {'OE.AUDIT_STORAGE': 4, 'OE.AUDIT_ACCESS': 4, 'OE.INTERFACE': 4, 'OE.PHYSICAL': 2, 'OE.USER': 14, 'OE.ADMIN': 8, 'OE.AUDIT': 4, 'OE.PHYISCAL': 2}}, 'vendor': {'Microsoft': {'Microsoft': 3, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}}, 'FF': {'DH': {'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 3, 'FIPS PUB 46-3': 1, 'FIPS PUB 186-2': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0287_erpt.pdf.
    • The st_filename property was set to c0287_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0287.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_est.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Canon imageRUNNER ADVANCE C5000 Series 2600.1 model Version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Multi-Function Devices",
  "cert_link": null,
  "dgst": "dd424fd022726329",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0287",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0",
        "2600.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0287",
      "certification_date": "2011-03-01",
      "claim": "EAL3+ ALC_FLR.2 PP",
      "enhanced": {
        "assurance_level": "EAL3 Augmented with ALC_FLR.2",
        "cc_version": "3.1",
        "description": "PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1\u2122-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption \u0026 Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "Canon imageRUNNER ADVANCE C5000 Series 2600.1 model",
        "product_type": "Multifunction Product",
        "protection_profile": "IEEE Std 2600.1-2009",
        "toe_version": "1.0",
        "vendor": "Canon Inc."
      },
      "expiration_date": "2015-03-01",
      "supplier": "Canon Inc.",
      "toe_japan_name": "Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.0",
      "toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0287_it0294.html",
      "toe_overseas_name": "Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.1 (Certification of this product has been revoked 2015-03)"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Canon Inc.",
  "manufacturer_web": "https://www.canon.com/",
  "name": "Canon imageRUNNER ADVANCE C5000 Series 2600.1 model Version 1.0",
  "not_valid_after": "2015-03-17",
  "not_valid_before": "2011-03-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0287_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0287-01": 1,
          "Certification No. C0287": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ACCESS": 1,
          "A.ADMIN": 2,
          "A.USER": 1
        },
        "T": {
          "T.CONF": 4,
          "T.DOC": 4,
          "T.FUNC": 2,
          "T.PROT": 2
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL3": 4,
          "EAL3 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "MFP, created by the submitted print jobs. As such, the following security functions are considered out of scope of this evaluation. 1) The TOE supports various print protocols for the submission of print jobs": 1,
          "for use as the Web browser for operating the TOE. Any and all other Web browsers and versions are out of scope of this evaluation. 1.2 Conduct of Evaluation Evaluation Facility conducted IT security evaluation": 1,
          "of the print job contains an identification and authentication mechanism, that mechanism is out of scope of this evaluation. In terms of this evaluation, only Microsoft Internet Explorer 6 SP1": 1,
          "out of scope": 4,
          "protocols have their own identification and authentication mechanisms, and those mechanisms are out of scope of this evaluation. Examples of this include the identification and authentication mechanism in the": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2,
          "CCMB-2009-07-004": 2
        },
        "FIPS": {
          "FIPS PUB 186-2": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "IPA/JISEC",
      "/Company": "IPA",
      "/CreationDate": "D:20110630165749+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 8.1",
      "/Manager": "IPA",
      "/ModDate": "D:20110630170428+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 8.3.0 (Windows)",
      "/Title": "CRP-e",
      "pdf_file_size_bytes": 626101,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 34
    },
    "st_filename": "c0287_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECDH": {
            "ECDH": 2
          }
        },
        "FF": {
          "DH": {
            "DH": 2
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 3,
          "A.ADMIN": 6,
          "A.USER": 3
        },
        "D": {
          "D.CONF": 8,
          "D.DOC": 12,
          "D.FUNC": 6,
          "D.PROT": 6
        },
        "O": {
          "O.AUDIT": 8,
          "O.CONF": 18,
          "O.DOC": 18,
          "O.FUNC": 9,
          "O.HDD": 9,
          "O.INTERFACE": 9,
          "O.PROT": 9,
          "O.SOFTWARE": 8,
          "O.USER": 15
        },
        "OE": {
          "OE.ADMIN": 8,
          "OE.AUDIT": 4,
          "OE.AUDIT_ACCESS": 4,
          "OE.AUDIT_STORAGE": 4,
          "OE.INTERFACE": 4,
          "OE.PHYISCAL": 2,
          "OE.PHYSICAL": 2,
          "OE.USER": 14
        },
        "T": {
          "T.CONF": 6,
          "T.DOC": 6,
          "T.FUNC": 3,
          "T.PROT": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.3": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_FLR.2": 11,
          "ALC_LCD.1": 1
        },
        "APE": {
          "APE_ECD": 2
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 2,
          "EAL 3 augmented": 1,
          "EAL3": 8,
          "EAL3 augmented": 7
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 2,
          "FAU_GEN.1": 13,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 8,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 6,
          "FAU_SAR.2.1": 1,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 1,
          "FAU_STG.4": 6,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 24,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 13,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 12,
          "FCS_COP.1": 25,
          "FCS_COP.1.1": 2
        },
        "FDP": {
          "FDP_ACC.1": 49,
          "FDP_ACC.1.1": 4,
          "FDP_ACF.1": 34,
          "FDP_ACF.1.1": 4,
          "FDP_ACF.1.2": 4,
          "FDP_ACF.1.3": 4,
          "FDP_ACF.1.4": 4,
          "FDP_IFC": 1,
          "FDP_IFC.1": 4,
          "FDP_IFF": 1,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 9,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU": 1,
          "FIA_UAU.1": 13,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.7": 7,
          "FIA_UID.1": 22,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 7,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA.1": 23,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 25,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_MTD.1": 18,
          "FMT_MTD.1.1": 2,
          "FMT_SMF.1": 25,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 33,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_CIP_EXP": 2,
          "FPT_CIP_EXP.1": 16,
          "FPT_CIP_EXP.1.1": 2,
          "FPT_CIP_EXP.1.2": 3,
          "FPT_FDI_EXP": 3,
          "FPT_FDI_EXP.1": 11,
          "FPT_FDI_EXP.1.1": 2,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_STM.1": 9,
          "FPT_STM.1.1": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_SSL.3": 15,
          "FTA_SSL.3.1": 2
        },
        "FTP": {
          "FTP_ITC.1": 12,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 1,
          "physical tampering": 4
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS PUB 186-2": 4,
          "FIPS PUB 197": 3,
          "FIPS PUB 46-3": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 3,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Satoshi HIROTA",
      "/CreationDate": "D:20110623065012Z",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20110630170507+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Title": "\u6587\u66f8ID\uff1a",
      "pdf_file_size_bytes": 1200786,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 68
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf",
        "pp_name": "U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.1\u2122-200..."
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3+",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "af4a8d4a98b5e41410e7c008df62f985427619466fab27ecd478147d955afab2",
      "txt_hash": "6ce89c153b32161e956d40d960f0331b1c51360a54b272ff63c55605b2c19b49"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "dae308e642035f6efb4e1731cf3cd5bd76b07512317b767ee0b8b66dcf0587bc",
      "txt_hash": "4f1af31d046bcdc7bbdf6e204c56fee493bf6a0ebbd309a821d22fe9344f04c3"
    }
  },
  "status": "archived"
}