Canon imagePRESS C800/C700/C700L/C600 2600.1 model 1.0
CSV information ?
Status | archived |
---|---|
Valid from | 21.12.2015 |
Valid until | 21.12.2020 |
Scheme | 🇯🇵 JP |
Manufacturer | Canon Inc. |
Category | Multi-Function Devices |
Security level | EAL3+, ALC_FLR.2 |
Protection profiles |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AESProtocols
IPsecVendor
MicrosoftSecurity level
EAL3, EAL3 augmentedClaims
T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMINSecurity Assurance Requirements (SAR)
ALC_FLR.2Certificates
CRP-C0494-01, Certification No. C0494Standards
FIPS PUB 186-2, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Creation date: | D:20160713084305+09'00' |
---|---|
Modification date: | D:20160713155453+09'00' |
Pages: | 35 |
Creator: | Microsoft® Word 2010 |
Producer: | Microsoft® Word 2010 |
References
No references.
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DESAsymmetric Algorithms
ECDH, DHHash functions
SHA-1Vendor
Microsoft, Microsoft CorporationSecurity level
EAL3, EAL 3, EAL3 augmented, EAL 3 augmentedClaims
D.DOC, D.FUNC, D.PROT, D.CONF, D.DOC_, O.HDD, O.DOC, O.FUNC, O.PROT, O.CONF, O.USER, O.INTERFACE, O.SOFTWARE, O.AUDIT, T.DOC, T.FUNC, T.PROT, T.CONF, A.ACCESS, A.USER, A.ADMIN, OE.AUDIT_STORAGE, OE.AUDIT_ACCESS, OE.INTERFACE, OE.PHYSICAL, OE.USER, OE.ADMIN, OE.AUDITSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, APE_ECD, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_GEN, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FAU_GENA, FCS_COP.1, FCS_CKM.1, FCS_COP, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_ACF, FDP_RIP.1, FDP_IFF, FDP_IFC, FDP_IFC.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACE.1, FDP_ACG.1, FDP_ACE, FDP_RIP, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_USB.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.1.1, FMT_MSA, FMT_MSA.3, FMT_MTD.1, FMT_MTD, FMT_MTD.1.1, FMT_SME, FMT_SMEI, FMT_SMR.1, FMT_MSA.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_SMF, FMT_SMR, FMT_SMEF.1, FPT_CIP_EXP, FPT_STM.1, FPT_TST.1, FPT_FDI_EXP.1, FPT_PHP.1, FPT_CIP_EXP.1, FPT_CIP_EXP.1.1, FPT_CIP_EXP.1.2, FPT_FDI_EXP, FPT_FDI_EXP.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_STM.1.1, FPT_FDI, FPT_STM, FTA_SSL.3, FTA_SSL.3.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Side-channel analysis
physical tampering, malfunctionStandards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 186-2File metadata
Title: | Canon imagePRESS C800/C700/C700L/C600 2600.1 model Security Target |
---|---|
Author: | Canon Inc. |
Creation date: | D:20160704144811+09'00' |
Modification date: | D:20160704144816+09'00' |
Pages: | 65 |
Creator: | PScript5.dll Version 5.2.2 |
Producer: | Adobe LiveCycle PDFGenerator |
References
No references.
Heuristics ?
Extracted SARs
ADV_FSP.3, ASE_TSS.1, ATE_FUN.1, ATE_DPT.1, ALC_CMC.3, ASE_CCL.1, ALC_FLR.2, ASE_INT.1, ADV_TDS.2, AVA_VAN.2, ALC_LCD.1, ALC_CMS.3, ASE_REQ.2, ASE_SPD.1, ALC_DEL.1, AGD_PRE.1, AGD_OPE.1, ASE_OBJ.2, ATE_IND.2, ASE_ECD.1, ATE_COV.2, ADV_ARC.1Scheme data ?
Cert Id | C0494 | |
---|---|---|
Supplier | Canon Inc. | |
Toe Overseas Name | Canon imagePRESS C800/C700/C700L/C600 2600.1 model1.0 | |
Claim | EAL3+ALC_FLR.2 | |
Certification Date | 2015-12 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0494_it4495.html | |
Toe Japan Name | Canon imagePRESS C800/C700/C700L/C600 2600.1 model1.0 | |
Enhanced | ||
Product | Canon imagePRESS C800/C700/C700L/C600 2600.1 model | |
Toe Version | 1.0 | |
Product Type | Multifunction Product | |
Certification Date | 2015-12-21 | |
Cc Version | 3.1 Release4 | |
Assurance Level | EAL3 Augmented with ALC_FLR.2 | |
Protection Profile | IEEE Std 2600.1™-2009 | |
Vendor | Canon Inc. | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Information Security Evaluation Office | |
Report Link | https://www.ipa.go.jp/en/security/c0494_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0494_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0494_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. TOE Security functions The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator. |
References ?
No references are available for this certificate.
Updates ?
-
27.07.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_garbage property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The st_pdf_hash property was set to
01aa73fd5e666d941adac336ddc4892e21e5bf16298359f0817485a07457891a
. - The st_txt_hash property was set to
01d008622cc569411381092fd8807860fb06896ce73314a9e3473fc2af746cbb
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1304238, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 65, '/Author': 'Canon Inc.', '/CreationDate': "D:20160704144811+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': '', '/ModDate': "D:20160704144816+09'00'", '/Producer': 'Adobe LiveCycle PDFGenerator', '/Subject': '', '/Title': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 8, 'EAL 3': 2, 'EAL3 augmented': 7, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 11, 'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_ECD': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 6, 'FAU_GEN.2': 6, 'FAU_SAR.1': 6, 'FAU_SAR.2': 6, 'FAU_STG.1': 6, 'FAU_STG.4': 6, 'FAU_GEN': 5, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_GENA': 1}, 'FCS': {'FCS_COP.1': 20, 'FCS_CKM.1': 25, 'FCS_COP': 5, 'FCS_CKM.2': 12, 'FCS_CKM.4': 11, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM': 1}, 'FDP': {'FDP_ACC': 20, 'FDP_ACC.1': 21, 'FDP_ACF.1': 14, 'FDP_ACF': 13, 'FDP_RIP.1': 5, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_IFC.1': 3, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACE.1': 1, 'FDP_ACG.1': 1, 'FDP_ACE': 1, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 9, 'FIA_UAU.1': 10, 'FIA_UID.1': 20, 'FIA_USB.1': 7, 'FIA_AFL.1': 7, 'FIA_SOS.1': 5, 'FIA_UAU.7': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU': 4, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.1.1': 1}, 'FMT': {'FMT_MSA': 13, 'FMT_MSA.3': 19, 'FMT_MTD.1': 10, 'FMT_MTD': 7, 'FMT_MTD.1.1': 3, 'FMT_SME': 1, 'FMT_SMEI': 1, 'FMT_SMR.1': 29, 'FMT_MSA.1': 9, 'FMT_SMF.1': 23, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMF': 2, 'FMT_SMR': 4, 'FMT_SMEF.1': 2}, 'FPT': {'FPT_CIP_EXP': 2, 'FPT_STM.1': 6, 'FPT_TST.1': 6, 'FPT_FDI_EXP.1': 9, 'FPT_PHP.1': 6, 'FPT_CIP_EXP.1': 15, 'FPT_CIP_EXP.1.1': 2, 'FPT_CIP_EXP.1.2': 3, 'FPT_FDI_EXP': 2, 'FPT_FDI_EXP.1.1': 2, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_STM.1.1': 1, 'FPT_FDI': 1, 'FPT_STM': 1}, 'FTA': {'FTA_SSL.3': 15, 'FTA_SSL.3.1': 2}, 'FTP': {'FTP_ITC.1': 11, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'D': {'D.DOC': 12, 'D.FUNC': 8, 'D.PROT': 6, 'D.CONF': 9, 'D.DOC_': 1}, 'O': {'O.HDD': 5, 'O.DOC': 8, 'O.FUNC': 5, 'O.PROT': 4, 'O.CONF': 8, 'O.USER': 10, 'O.INTERFACE': 4, 'O.SOFTWARE': 5, 'O.AUDIT': 3}, 'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 2, 'A.USER': 3, 'A.ADMIN': 4}, 'OE': {'OE.AUDIT_STORAGE': 3, 'OE.AUDIT_ACCESS': 3, 'OE.INTERFACE': 2, 'OE.PHYSICAL': 2, 'OE.USER': 10, 'OE.ADMIN': 5, 'OE.AUDIT': 2}}, 'vendor': {'Microsoft': {'Microsoft': 2, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}}, 'FF': {'DH': {'DH': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 3, 'FIPS PUB 46-3': 1, 'FIPS PUB 186-2': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0494_est.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
17.07.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_garbage property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_download_ok property was set to
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'cert_id': 'C0494', 'supplier': 'Canon Inc.', 'toe_overseas_name': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model1.0', 'claim': 'EAL3+ALC_FLR.2', 'certification_date': '2015-12', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0494_it4495.html', 'toe_japan_name': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model1.0', 'enhanced': {'product': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model', 'toe_version': '1.0', 'product_type': 'Multifunction Product', 'certification_date': '2015-12-21', 'cc_version': '3.1 Release4', 'assurance_level': 'EAL3 Augmented with ALC_FLR.2', 'protection_profile': 'IEEE Std 2600.1™-2009', 'vendor': 'Canon Inc.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc.\n Information Security Evaluation Office', 'report_link': 'https://www.ipa.go.jp/en/security/c0494_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0494_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0494_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP. \n \n TOE Security functions \n The TOE embodies the following security functions. \n \n \n \n - \n User Authentication Function \n \n \n \n Function for identifying and authenticating the user. \n \n \n - \n Function Use Restriction Function \n \n \n \n Function for restricting the use of the MFP depending on the authority of the user. \n \n \n - \n Job Output Restriction Function \n \n \n \n Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. \n \n \n - \n Forward Received Jobs Function \n \n \n \n Function for restricting the machine from forwarding received data directly to the LAN. \n \n \n - \n HDD Data Erase Function \n \n \n \n Function for erasing unnecessary data from the hard disk by overwriting the data. \n \n \n - \n HDD Data Encryption Function \n \n \n \n Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. \n \n \n - \n LAN Data Protection Function \n \n \n \n Function for protecting all IP packets that are communicated with an IT device. \n \n \n - \n Self-Test Function \n \n \n \n Function for testing the integrity of the executable code at startup. \n \n \n - \n Audit Log Function \n \n \n \n Function for generating audit logs on security events and allowing them to be viewed by the administrator. \n \n \n - \n Management Function \n \n \n \n Function for restricting device settings that influence security to be made only by the administrator.'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The st_txt_hash property was set to
01d008622cc569411381092fd8807860fb06896ce73314a9e3473fc2af746cbb
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL3 augmented': 7, 'EAL 3 augmented': 1}, '__update__': {'EAL3': 8, 'EAL 3': 2}}}}, 'cc_sar': {'__insert__': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_ECD': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, '__update__': {'ALC': {'__insert__': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1}, '__update__': {'ALC_FLR.2': 11}, '__delete__': ['ALC_FLR']}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_GEN.2': 6, 'FAU_SAR.2': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_GENA': 1}, '__update__': {'FAU_GEN.1': 6, 'FAU_SAR.1': 6, 'FAU_STG.1': 6, 'FAU_STG.4': 6, 'FAU_GEN': 5}, '__delete__': ['FAU_SAR', 'FAU_STG']}, 'FCS': {'__insert__': {'FCS_CKM.1': 25, 'FCS_CKM.4': 11, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1}, '__update__': {'FCS_COP.1': 20, 'FCS_CKM': 1, 'FCS_CKM.2': 12, 'FCS_COP': 5}}, 'FDP': {'__insert__': {'FDP_IFC': 1, 'FDP_IFC.1': 3, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_RIP.1.1': 1, 'FDP_ITC.2': 6, 'FDP_ACE.1': 1, 'FDP_ACG.1': 1, 'FDP_ACE': 1}, '__update__': {'FDP_ACC.1': 21, 'FDP_ACF.1': 14, 'FDP_RIP.1': 5, 'FDP_ACC': 20, 'FDP_ITC.1': 6, 'FDP_ACF': 13}}, 'FIA': {'__insert__': {'FIA_UAU.7': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_SOS.1.1': 1}, '__update__': {'FIA_ATD.1': 9, 'FIA_UID.1': 20, 'FIA_UAU.1': 10, 'FIA_AFL.1': 7, 'FIA_SOS.1': 5, 'FIA_UAU': 4, 'FIA_USB.1': 7}, '__delete__': ['FIA_UID', 'FIA_ATD', 'FIA_USB', 'FIA_AFL']}, 'FMT': {'__insert__': {'FMT_MTD.1.1': 3, 'FMT_SME': 1, 'FMT_SMEI': 1, 'FMT_SMR.1': 29, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMEF.1': 2}, '__update__': {'FMT_MSA.1': 9, 'FMT_MSA.3': 19, 'FMT_MTD.1': 10, 'FMT_SMF.1': 23, 'FMT_MSA': 13, 'FMT_MTD': 7, 'FMT_SMR': 4, 'FMT_SMF': 2}}, 'FPT': {'__insert__': {'FPT_FDI_EXP.1': 9, 'FPT_CIP_EXP.1': 15, 'FPT_CIP_EXP.1.1': 2, 'FPT_CIP_EXP.1.2': 3, 'FPT_FDI_EXP.1.1': 2, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_STM.1.1': 1}, '__update__': {'FPT_STM.1': 6, 'FPT_CIP_EXP': 2, 'FPT_FDI_EXP': 2, 'FPT_FDI': 1, 'FPT_PHP.1': 6, 'FPT_TST.1': 6}, '__delete__': ['FPT_CIP', 'FPT_PHP', 'FPT_TST']}, 'FTA': {'__insert__': {'FTA_SSL.3.1': 2}, '__update__': {'FTA_SSL.3': 15}, '__delete__': ['FTA_SSL']}, 'FTP': {'__insert__': {'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}, '__update__': {'FTP_ITC.1': 11}, '__delete__': ['FTP_ITC']}}}, 'cc_claims': {'__update__': {'D': {'__insert__': {'D.DOC_': 1}, '__update__': {'D.DOC': 12, 'D.PROT': 6, 'D.FUNC': 8, 'D.CONF': 9}, '__delete__': ['D.P', 'D.PRO', 'D.D', 'D.C', 'D.F', 'D.DO', 'D.FU', 'D.CO']}, 'O': {'__update__': {'O.HDD': 5, 'O.DOC': 8, 'O.FUNC': 5, 'O.PROT': 4, 'O.CONF': 8, 'O.USER': 10, 'O.SOFTWARE': 5, 'O.AUDIT': 3}, '__delete__': ['O.DO', 'O.FU', 'O.CO', 'O.US', 'O.SO', 'O.HD', 'O.SOFTWAR', 'O.INTERFAC', 'O.INTER', 'O.SOFTW']}, 'T': {'__update__': {'T.CONF': 4}, '__delete__': ['T.D', 'T.F', 'T.PR', 'T.CO', 'T.LOGGING', 'T.NO_ALT', 'T.LOGGED']}, 'A': {'__update__': {'A.ACCESS': 2, 'A.USER': 3}, '__delete__': ['A.ACC', 'A.ADM', 'A.ACCE']}, 'OE': {'__insert__': {'OE.PHYSICAL': 2}, '__update__': {'OE.USER': 10, 'OE.AUDIT_STORAGE': 3, 'OE.AUDIT_ACCESS': 3, 'OE.AUDIT': 2, 'OE.ADMIN': 5}, '__delete__': ['OE.A', 'OE.IN', 'OE.PH', 'OE.US', 'OE.AD', 'OE.PHYISCAL', 'OE.AUDIT_S', 'OE.AUDIT_A', 'OE.INTERFA', 'OE.PHYSICA']}}, '__delete__': ['R']}, 'vendor': {'Microsoft': {'Microsoft': 2, 'Microsoft Corporation': 1}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 4}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 2}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 2}}}}}}, 'side_channel_analysis': {'FI': {'physical tampering': 4, 'malfunction': 1}}, 'standard_id': {'__update__': {'FIPS': {'FIPS PUB 197': 3, 'FIPS PUB 46-3': 1, 'FIPS PUB 186-2': 4}}}}
data.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values added. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_garbage property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
01aa73fd5e666d941adac336ddc4892e21e5bf16298359f0817485a07457891a
. - The st_txt_hash property was set to
15b5f412d259a611a341bcb91fb08f80465b846f3f61aaf1f933703a0b442f4c
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 1304238, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 65, '/Author': 'Canon Inc.', '/CreationDate': "D:20160704144811+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': '', '/ModDate': "D:20160704144816+09'00'", '/Producer': 'Adobe LiveCycle PDFGenerator', '/Subject': '', '/Title': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 7, 'EAL 3': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_FLR.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 3, 'FAU_SAR.1': 2, 'FAU_STG.1': 3, 'FAU_STG.4': 1, 'FAU_GEN': 3, 'FAU_SAR': 2, 'FAU_STG': 1}, 'FCS': {'FCS_COP.1': 11, 'FCS_CKM': 11, 'FCS_CKM.2': 1, 'FCS_COP': 4}, 'FDP': {'FDP_ACC.1': 9, 'FDP_ACF.1': 8, 'FDP_RIP.1': 2, 'FDP_IFF': 1, 'FDP_ACC': 7, 'FDP_ITC.1': 3, 'FDP_ACF': 3, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 3, 'FIA_UID.1': 6, 'FIA_UID': 2, 'FIA_UAU.1': 3, 'FIA_AFL.1': 2, 'FIA_SOS.1': 2, 'FIA_UAU': 2, 'FIA_ATD': 1, 'FIA_USB': 2, 'FIA_AFL': 1, 'FIA_USB.1': 1}, 'FMT': {'FMT_MSA.1': 3, 'FMT_MSA.3': 2, 'FMT_MTD.1': 4, 'FMT_SMF.1': 3, 'FMT_MSA': 14, 'FMT_MTD': 2, 'FMT_SMR': 7, 'FMT_SMF': 1}, 'FPT': {'FPT_STM.1': 4, 'FPT_CIP_EXP': 1, 'FPT_FDI_EXP': 1, 'FPT_CIP': 2, 'FPT_FDI': 3, 'FPT_PHP.1': 1, 'FPT_TST.1': 1, 'FPT_PHP': 2, 'FPT_STM': 1, 'FPT_TST': 1}, 'FTA': {'FTA_SSL.3': 4, 'FTA_SSL': 2}, 'FTP': {'FTP_ITC.1': 3, 'FTP_ITC': 6}}, 'cc_claims': {'D': {'D.DOC': 6, 'D.P': 1, 'D.PRO': 2, 'D.D': 1, 'D.C': 1, 'D.F': 1, 'D.PROT': 3, 'D.FUNC': 3, 'D.CONF': 3, 'D.DO': 2, 'D.FU': 1, 'D.CO': 1}, 'O': {'O.HDD': 7, 'O.DO': 1, 'O.FU': 1, 'O.CO': 1, 'O.US': 1, 'O.SO': 1, 'O.HD': 1, 'O.DOC': 14, 'O.FUNC': 7, 'O.PROT': 7, 'O.CONF': 14, 'O.USER': 12, 'O.SOFTWARE': 4, 'O.AUDIT': 5, 'O.INTERFACE': 4, 'O.SOFTWAR': 1, 'O.INTERFAC': 2, 'O.INTER': 1, 'O.SOFTW': 1}, 'T': {'T.D': 1, 'T.F': 1, 'T.PR': 1, 'T.CO': 1, 'T.LOGGING': 2, 'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 3, 'T.NO_ALT': 1, 'T.LOGGED': 1}, 'A': {'A.ACC': 1, 'A.ADM': 1, 'A.ACCESS': 1, 'A.ADMIN': 4, 'A.USER': 1, 'A.ACCE': 1}, 'R': {'R.TRAINING': 1, 'R.AUTHORIZ': 1}, 'OE': {'OE.A': 1, 'OE.IN': 1, 'OE.PH': 1, 'OE.US': 1, 'OE.AD': 1, 'OE.USER': 12, 'OE.AUDIT_STORAGE': 2, 'OE.AUDIT_ACCESS': 2, 'OE.AUDIT': 3, 'OE.PHYISCAL': 2, 'OE.INTERFACE': 2, 'OE.ADMIN': 6, 'OE.AUDIT_S': 1, 'OE.AUDIT_A': 1, 'OE.INTERFA': 1, 'OE.PHYSICA': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}}, 'FF': {'DH': {'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0494_est.pdf
.
- The st_download_ok property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_garbage property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0494_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
True
. - The report_convert_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was updated.
- The report_pdf_hash property was set to
6d8cfda2209efbbc3068333f66da24b9b59b26a7bdfea2ac110092fd6d323424
. - The report_txt_hash property was set to
4b168d40122676c2cea1096854b497775c29ba6d9c26f627de3f64aedb58ed7b
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 501708, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 35, '/CreationDate': "D:20160713084305+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20160713155453+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0494-01': 1, 'Certification No. C0494': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 4}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.DOC': 2, 'T.FUNC': 1, 'T.PROT': 1, 'T.CONF': 2}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 8}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-2': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0494_erpt.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
C0494
.
- The report_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The report_download_ok property was set to
False
. - The st_convert_garbage property was set to
True
. - The st_convert_ok property was set to
True
. - The report_convert_ok property was set to
False
. - The st_extract_ok property was set to
True
. - The report_extract_ok property was set to
False
. - The errors property was updated, with the
[[1, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0494_erpt.pdf, code: nok']]
values inserted. - The st_pdf_hash property was set to
01aa73fd5e666d941adac336ddc4892e21e5bf16298359f0817485a07457891a
. - The report_pdf_hash property was set to
None
. - The st_txt_hash property was set to
15b5f412d259a611a341bcb91fb08f80465b846f3f61aaf1f933703a0b442f4c
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1304238, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 65, '/Author': 'Canon Inc.', '/CreationDate': "D:20160704144811+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': '', '/ModDate': "D:20160704144816+09'00'", '/Producer': 'Adobe LiveCycle PDFGenerator', '/Subject': '', '/Title': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
None
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The report_keywords property was set to
None
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 7, 'EAL 3': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1, 'ALC_FLR.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 3, 'FAU_SAR.1': 2, 'FAU_STG.1': 3, 'FAU_STG.4': 1, 'FAU_GEN': 3, 'FAU_SAR': 2, 'FAU_STG': 1}, 'FCS': {'FCS_COP.1': 11, 'FCS_CKM': 11, 'FCS_CKM.2': 1, 'FCS_COP': 4}, 'FDP': {'FDP_ACC.1': 9, 'FDP_ACF.1': 8, 'FDP_RIP.1': 2, 'FDP_IFF': 1, 'FDP_ACC': 7, 'FDP_ITC.1': 3, 'FDP_ACF': 3, 'FDP_RIP': 1}, 'FIA': {'FIA_ATD.1': 3, 'FIA_UID.1': 6, 'FIA_UID': 2, 'FIA_UAU.1': 3, 'FIA_AFL.1': 2, 'FIA_SOS.1': 2, 'FIA_UAU': 2, 'FIA_ATD': 1, 'FIA_USB': 2, 'FIA_AFL': 1, 'FIA_USB.1': 1}, 'FMT': {'FMT_MSA.1': 3, 'FMT_MSA.3': 2, 'FMT_MTD.1': 4, 'FMT_SMF.1': 3, 'FMT_MSA': 14, 'FMT_MTD': 2, 'FMT_SMR': 7, 'FMT_SMF': 1}, 'FPT': {'FPT_STM.1': 4, 'FPT_CIP_EXP': 1, 'FPT_FDI_EXP': 1, 'FPT_CIP': 2, 'FPT_FDI': 3, 'FPT_PHP.1': 1, 'FPT_TST.1': 1, 'FPT_PHP': 2, 'FPT_STM': 1, 'FPT_TST': 1}, 'FTA': {'FTA_SSL.3': 4, 'FTA_SSL': 2}, 'FTP': {'FTP_ITC.1': 3, 'FTP_ITC': 6}}, 'cc_claims': {'D': {'D.DOC': 6, 'D.P': 1, 'D.PRO': 2, 'D.D': 1, 'D.C': 1, 'D.F': 1, 'D.PROT': 3, 'D.FUNC': 3, 'D.CONF': 3, 'D.DO': 2, 'D.FU': 1, 'D.CO': 1}, 'O': {'O.HDD': 7, 'O.DO': 1, 'O.FU': 1, 'O.CO': 1, 'O.US': 1, 'O.SO': 1, 'O.HD': 1, 'O.DOC': 14, 'O.FUNC': 7, 'O.PROT': 7, 'O.CONF': 14, 'O.USER': 12, 'O.SOFTWARE': 4, 'O.AUDIT': 5, 'O.INTERFACE': 4, 'O.SOFTWAR': 1, 'O.INTERFAC': 2, 'O.INTER': 1, 'O.SOFTW': 1}, 'T': {'T.D': 1, 'T.F': 1, 'T.PR': 1, 'T.CO': 1, 'T.LOGGING': 2, 'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 3, 'T.NO_ALT': 1, 'T.LOGGED': 1}, 'A': {'A.ACC': 1, 'A.ADM': 1, 'A.ACCESS': 1, 'A.ADMIN': 4, 'A.USER': 1, 'A.ACCE': 1}, 'R': {'R.TRAINING': 1, 'R.AUTHORIZ': 1}, 'OE': {'OE.A': 1, 'OE.IN': 1, 'OE.PH': 1, 'OE.US': 1, 'OE.AD': 1, 'OE.USER': 12, 'OE.AUDIT_STORAGE': 2, 'OE.AUDIT_ACCESS': 2, 'OE.AUDIT': 3, 'OE.PHYISCAL': 2, 'OE.INTERFACE': 2, 'OE.ADMIN': 6, 'OE.AUDIT_S': 1, 'OE.AUDIT_A': 1, 'OE.INTERFA': 1, 'OE.PHYSICA': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}}, 'FF': {'DH': {'DH': 3}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
None
. - The st_filename property was set to
c0494_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The st_download_ok property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_garbage property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0494_erpt.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0494_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
11.11.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_txt_hash property was set to
15b5f412d259a611a341bcb91fb08f80465b846f3f61aaf1f933703a0b442f4c
.
The PDF extraction data was updated.
- The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL3': 7, 'EAL 3': 1}, '__delete__': ['EAL3 augmented', 'EAL 3 augmented']}}}, 'cc_sar': {'__update__': {'ALC': {'__insert__': {'ALC_FLR': 1}, '__update__': {'ALC_FLR.2': 1}, '__delete__': ['ALC_CMC.3', 'ALC_CMS.3', 'ALC_DEL.1', 'ALC_LCD.1']}}, '__delete__': ['ADV', 'AGD', 'ATE', 'AVA', 'APE', 'ASE']}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAR': 2, 'FAU_STG': 1}, '__update__': {'FAU_SAR.1': 2, 'FAU_STG.1': 3, 'FAU_STG.4': 1, 'FAU_GEN.1': 3, 'FAU_GEN': 3}, '__delete__': ['FAU_GEN.2', 'FAU_SAR.2', 'FAU_GEN.1.1', 'FAU_SAR.1.1', 'FAU_SAR.1.2', 'FAU_SAR.2.1', 'FAU_STG.1.1', 'FAU_STG.1.2', 'FAU_STG.3', 'FAU_STG.4.1', 'FAU_GENA', 'FAU_GEN.1.2', 'FAU_GEN.2.1']}, 'FCS': {'__update__': {'FCS_COP.1': 11, 'FCS_CKM.2': 1, 'FCS_COP': 4, 'FCS_CKM': 11}, '__delete__': ['FCS_CKM.1', 'FCS_CKM.2.1', 'FCS_CKM.4', 'FCS_CKM.1.1', 'FCS_COP.1.1']}, 'FDP': {'__update__': {'FDP_ACC.1': 9, 'FDP_ACC': 7, 'FDP_ACF': 3, 'FDP_RIP.1': 2, 'FDP_ACF.1': 8, 'FDP_ITC.1': 3}, '__delete__': ['FDP_IFC.1', 'FDP_ACE.1', 'FDP_ACG.1', 'FDP_IFC', 'FDP_ACF.1.1', 'FDP_ACF.1.2', 'FDP_ACF.1.3', 'FDP_ACF.1.4', 'FDP_ACC.1.1', 'FDP_ITC.2', 'FDP_RIP.1.1', 'FDP_ACE']}, 'FIA': {'__insert__': {'FIA_UID': 2, 'FIA_ATD': 1, 'FIA_USB': 2, 'FIA_AFL': 1}, '__update__': {'FIA_UAU.1': 3, 'FIA_UID.1': 6, 'FIA_AFL.1': 2, 'FIA_ATD.1': 3, 'FIA_USB.1': 1, 'FIA_UAU': 2, 'FIA_SOS.1': 2}, '__delete__': ['FIA_UAU.7', 'FIA_AFL.1.1', 'FIA_AFL.1.2', 'FIA_ATD.1.1', 'FIA_SOS.1.1', 'FIA_USB.1.1', 'FIA_USB.1.2', 'FIA_USB.1.3', 'FIA_UAU.1.1', 'FIA_UAU.1.2', 'FIA_UID.1.1', 'FIA_UID.1.2']}, 'FMT': {'__update__': {'FMT_MSA': 14, 'FMT_MSA.1': 3, 'FMT_SMF.1': 3, 'FMT_MSA.3': 2, 'FMT_MTD.1': 4, 'FMT_SMR': 7, 'FMT_MTD': 2, 'FMT_SMF': 1}, '__delete__': ['FMT_SMR.1', 'FMT_MTD.1.1', 'FMT_MSA.1.1', 'FMT_MSA.3.1', 'FMT_MSA.3.2', 'FMT_SMR.1.1', 'FMT_SMR.1.2', 'FMT_SME', 'FMT_SMEI', 'FMT_SMEF.1', 'FMT_SMF.1.1']}, 'FPT': {'__insert__': {'FPT_CIP': 2, 'FPT_PHP': 2, 'FPT_TST': 1}, '__update__': {'FPT_TST.1': 1, 'FPT_STM.1': 4, 'FPT_PHP.1': 1, 'FPT_CIP_EXP': 1, 'FPT_FDI': 3, 'FPT_FDI_EXP': 1}, '__delete__': ['FPT_CIP_EXP.1', 'FPT_FDI_EXP.1', 'FPT_FDI_EXP.1.1', 'FPT_TST.1.1', 'FPT_TST.1.2', 'FPT_TST.1.3', 'FPT_CIP_EXP.1.1', 'FPT_CIP_EXP.1.2', 'FPT_PHP.1.1', 'FPT_PHP.1.2', 'FPT_STM.1.1']}, 'FTA': {'__insert__': {'FTA_SSL': 2}, '__update__': {'FTA_SSL.3': 4}, '__delete__': ['FTA_SSL.3.1']}, 'FTP': {'__insert__': {'FTP_ITC': 6}, '__update__': {'FTP_ITC.1': 3}, '__delete__': ['FTP_ITC.1.3', 'FTP_ITC.1.1', 'FTP_ITC.1.2']}}}, 'cc_claims': {'__insert__': {'R': {'R.TRAINING': 1, 'R.AUTHORIZ': 1}}, '__update__': {'D': {'__insert__': {'D.P': 1, 'D.PRO': 2, 'D.D': 1, 'D.C': 1, 'D.F': 1, 'D.DO': 2, 'D.FU': 1, 'D.CO': 1}, '__update__': {'D.DOC': 6, 'D.FUNC': 3, 'D.PROT': 3, 'D.CONF': 3}, '__delete__': ['D.DOC_']}, 'O': {'__insert__': {'O.DO': 1, 'O.FU': 1, 'O.CO': 1, 'O.US': 1, 'O.SO': 1, 'O.HD': 1, 'O.SOFTWAR': 1, 'O.INTERFAC': 2, 'O.INTER': 1, 'O.SOFTW': 1}, '__update__': {'O.USER': 12, 'O.SOFTWARE': 4, 'O.AUDIT': 5, 'O.HDD': 7, 'O.DOC': 14, 'O.FUNC': 7, 'O.PROT': 7, 'O.CONF': 14}}, 'T': {'__insert__': {'T.D': 1, 'T.F': 1, 'T.PR': 1, 'T.CO': 1, 'T.LOGGING': 2, 'T.NO_ALT': 1, 'T.LOGGED': 1}, '__update__': {'T.CONF': 3}}, 'A': {'__insert__': {'A.ACC': 1, 'A.ADM': 1, 'A.ACCE': 1}, '__update__': {'A.ACCESS': 1, 'A.USER': 1}}, 'OE': {'__insert__': {'OE.A': 1, 'OE.IN': 1, 'OE.PH': 1, 'OE.US': 1, 'OE.AD': 1, 'OE.PHYISCAL': 2, 'OE.AUDIT_S': 1, 'OE.AUDIT_A': 1, 'OE.INTERFA': 1, 'OE.PHYSICA': 1}, '__update__': {'OE.USER': 12, 'OE.ADMIN': 6, 'OE.AUDIT': 3, 'OE.AUDIT_ACCESS': 2, 'OE.AUDIT_STORAGE': 2}, '__delete__': ['OE.PHYSICAL']}}}, 'vendor': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 3}}}}}}, 'asymmetric_crypto': {'__update__': {'ECC': {'__update__': {'ECDH': {'__update__': {'ECDH': 1}}}}, 'FF': {'__update__': {'DH': {'__update__': {'DH': 3}}}}}}, 'side_channel_analysis': {}, 'standard_id': {'__update__': {'FIPS': {'FIPS PUB 186': 1}}}}
data.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
values discarded.
- The st_txt_hash property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'EAL3+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': True, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'c0494_erpt.pdf', 'st_filename': 'c0494_est.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0494-01': 1}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 4}}}}, 'cc_claims': {'__update__': {'T': {'T.DOC': 2, 'T.FUNC': 1, 'T.PROT': 1, 'T.CONF': 2}, 'A': {'A.ACCESS': 1, 'A.USER': 1, 'A.ADMIN': 2}}, '__delete__': ['D', 'R', 'OT']}, 'tee_name': {}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.2': 11}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAR.1': 6, 'FAU_STG.1': 6, 'FAU_GEN': 5}}, 'FCS': {'__insert__': {'FCS_COP': 5, 'FCS_CKM': 1}, '__update__': {'FCS_COP.1': 20, 'FCS_CKM.1': 25, 'FCS_CKM.2': 12}}, 'FDP': {'__insert__': {'FDP_ACC': 20, 'FDP_ACF': 13, 'FDP_RIP': 1}, '__update__': {'FDP_ACC.1': 21, 'FDP_ACF.1': 14, 'FDP_RIP.1': 5}}, 'FIA': {'__update__': {'FIA_UID.1': 20, 'FIA_ATD.1': 9, 'FIA_USB.1': 7, 'FIA_UAU': 4}}, 'FMT': {'__insert__': {'FMT_SMR': 4, 'FMT_MTD': 7, 'FMT_SME': 1, 'FMT_SMF': 2}, '__update__': {'FMT_MSA': 13, 'FMT_MSA.1': 9, 'FMT_SMR.1': 29, 'FMT_SMF.1': 23, 'FMT_MSA.3': 19, 'FMT_MTD.1.1': 3, 'FMT_SMEF.1': 2}}, 'FPT': {'__insert__': {'FPT_STM': 1}, '__update__': {'FPT_STM.1': 6, 'FPT_TST.1': 6, 'FPT_FDI': 1}}, 'FTA': {'__update__': {'FTA_SSL.3': 15}}}}, 'cc_claims': {'__update__': {'D': {'__update__': {'D.CONF': 9}, '__delete__': ['D.ACCESS.AUTHORISED', 'D.ACCESS.AUTHORIZATION', 'D.CONF.NO', 'D.FUNC.NO_ALT', 'D.I', 'D.ACCESS.AUT']}, 'O': {'__insert__': {'O.USER': 10, 'O.INTERFACE': 4, 'O.AUDIT': 3, 'O.HDD': 5, 'O.DOC': 8, 'O.FUNC': 5, 'O.PROT': 4, 'O.CONF': 8}, '__delete__': ['O.USER.AUTHORIZED', 'O.INTERFACE.MANAGED', 'O.AUDIT.LOGGED', 'O.HDD.ACCESS.AUTHORISED', 'O.DOC.NO_ALLT', 'O.DOC.NO_ALT', 'O.FUNC.NO_ALT', 'O.PROT.NO_ALT', 'O.CONF.NO_DIS', 'O.CONF.NO_ALT', 'O.CONF.NO', 'O.DOC.NO_DIS', 'O.DOC.NO']}, 'T': {'T.DOC': 4, 'T.FUNC': 2, 'T.PROT': 2, 'T.CONF': 4}, 'A': {'A.ACCESS': 2, 'A.USER': 3, 'A.ADMIN': 4}, 'OE': {'OE.PHYSICAL': 2, 'OE.USER': 10, 'OE.ADMIN': 5, 'OE.AUDIT': 2, 'OE.AUDIT_ACCESS': 3, 'OE.AUDIT_STORAGE': 3, 'OE.INTERFACE': 2}}, '__delete__': ['R', 'OT', 'OP', 'SA']}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'asymmetric_crypto': {'__update__': {'FF': {'__update__': {'DH': {'__update__': {'DH': 2}}}}}}, 'cipher_mode': {}, 'tee_name': {}}
data.
The computed heuristics were updated.
- The cert_id property was set to
C0494
.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_txt_hash property was set to
e792abdc967de49903982a17190829625b1b54c585acd6a65323d159f534401b
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0494-01': 70, 'Certification No. C0494': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 4, 'EAL3 augmented': 3}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 3}}, 'cc_sfr': {}, 'cc_claims': {'D': {'D.ACCESS.AUTHORIZATION': 4}, 'T': {'T.DOC.DIS': 2, 'T.DOC.ALT': 2, 'T.FUNC.ALT': 2, 'T.PROT.ALT': 2, 'T.CONF.DIS': 2, 'T.CONF.ALT': 2, 'T.LOGGING': 2}, 'A': {'A.ACCESS.MANAGED': 1, 'A.USER.TRAINING': 1, 'A.ADMIN.TRAINING': 1, 'A.ADMIN.TRUST': 1}, 'R': {'R.AUTHORIZATION': 2, 'R.TRAINING': 1}, 'OT': {'OT.ALT': 2}}, 'vendor': {'Microsoft': {'Microsoft': 2}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'IPsec': {'IPsec': 8}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-2': 1}, 'CC': {'CCMB-2012-09-001': 2, 'CCMB-2012-09-002': 2, 'CCMB-2012-09-003': 2, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 8, 'EAL 3': 2, 'EAL3 augmented': 7, 'EAL 3 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_TDS.2': 1, 'ADV_ARC.1': 1, 'ADV_FSP.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_FLR.2': 10, 'ALC_LCD.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'APE': {'APE_ECD': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.2': 6, 'FAU_STG.1': 8, 'FAU_GEN.1': 6, 'FAU_STG.4': 6, 'FAU_GEN.1.1': 1, 'FAU_GEN': 2, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1, 'FAU_GENA': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1}, 'FCS': {'FCS_COP.1': 21, 'FCS_CKM.1': 26, 'FCS_CKM.2': 13, 'FCS_CKM.2.1': 1, 'FCS_CKM.4': 11, 'FCS_CKM.1.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACC.1': 20, 'FDP_IFC.1': 3, 'FDP_ACE.1': 1, 'FDP_ACG.1': 1, 'FDP_IFF': 1, 'FDP_IFC': 1, 'FDP_ACF.1': 15, 'FDP_RIP.1': 6, 'FDP_ACF.1.1': 3, 'FDP_ACF.1.2': 3, 'FDP_ACF.1.3': 3, 'FDP_ACF.1.4': 3, 'FDP_ACC.1.1': 2, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_RIP.1.1': 1, 'FDP_ACE': 1}, 'FIA': {'FIA_UAU.1': 10, 'FIA_UID.1': 23, 'FIA_UAU.7': 6, 'FIA_AFL.1': 7, 'FIA_ATD.1': 11, 'FIA_USB.1': 8, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 5, 'FIA_SOS.1.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_MSA.1': 10, 'FMT_SMR.1': 31, 'FMT_SMF.1': 20, 'FMT_MSA.3': 22, 'FMT_MTD.1': 10, 'FMT_MTD.1.1': 4, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMEI': 1, 'FMT_SMEF.1': 4, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_CIP_EXP.1': 15, 'FPT_FDI_EXP.1': 9, 'FPT_STM.1': 7, 'FPT_PHP.1': 6, 'FPT_TST.1': 5, 'FPT_FDI_EXP.1.1': 2, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1, 'FPT_CIP_EXP.1.1': 2, 'FPT_CIP_EXP.1.2': 3, 'FPT_PHP.1.1': 1, 'FPT_PHP.1.2': 1, 'FPT_CIP_EXP': 2, 'FPT_FDI': 2, 'FPT_FDI_EXP': 2, 'FPT_STM.1.1': 1}, 'FTA': {'FTA_SSL.3': 18, 'FTA_SSL.3.1': 2}, 'FTP': {'FTP_ITC.1': 11, 'FTP_ITC.1.3': 1, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1}}, 'cc_claims': {'D': {'D.ACCESS.AUTHORISED': 7, 'D.DOC': 12, 'D.FUNC': 8, 'D.PROT': 6, 'D.CONF': 8, 'D.ACCESS.AUTHORIZATION': 3, 'D.DOC_': 1, 'D.CONF.NO': 1, 'D.FUNC.NO_ALT': 1, 'D.I': 5, 'D.ACCESS.AUT': 1}, 'O': {'O.USER.AUTHORIZED': 11, 'O.INTERFACE.MANAGED': 5, 'O.SOFTWARE': 5, 'O.AUDIT.LOGGED': 3, 'O.HDD.ACCESS.AUTHORISED': 5, 'O.DOC.NO_ALLT': 1, 'O.DOC.NO_ALT': 3, 'O.FUNC.NO_ALT': 6, 'O.PROT.NO_ALT': 5, 'O.CONF.NO_DIS': 2, 'O.CONF.NO_ALT': 3, 'O.CONF.NO': 4, 'O.DOC.NO_DIS': 3, 'O.DOC.NO': 1}, 'T': {'T.LOGGED': 5, 'T.NO_ALT': 7, 'T.DOC.DIS': 3, 'T.DOC.ALT': 3, 'T.FUNC.ALT': 3, 'T.PROT.ALT': 3, 'T.CONF.DIS': 2, 'T.CONF.ALT': 3, 'T.LOGGING': 3, 'T.REVIEWED': 4}, 'A': {'A.I': 7, 'A.ACCESS.MANAGED': 2, 'A.USER.TRAINING': 3, 'A.ADMIN.TRAINING': 2, 'A.ADMIN.TRUST': 3, 'A.ACCESS.MANAG': 1, 'A.ADMIN.TRAININ': 1}, 'R': {'R.AUTHORIZED': 23, 'R.AUTHORIZATION': 2, 'R.TRAINING': 3, 'R.TRAINED': 4, 'R.I': 8, 'R.AUTHORIZ': 1}, 'OT': {'OT.NO_ALT': 7, 'OT.ALT': 3}, 'OP': {'OP.I': 5}, 'OE': {'OE.PHYSICAL.MANAGED': 2, 'OE.USER.AUTHORIZED': 10, 'OE.USER.TRAINED': 4, 'OE.ADMIN.TRAINED': 4, 'OE.ADMIN.TRUSTED': 3, 'OE.AUDIT.REVIEWED': 4, 'OE.AUDIT_ACCESS.AUTHORIZED': 4, 'OE.AUDIT_STORAGE.PROTECTED': 4, 'OE.INTERFACE.MANAGED': 4, 'OE.PHYISCAL.MANAGED': 2, 'OE': 1, 'OE.ADMIN.TRUST': 1}, 'SA': {'SA.I': 7}}, 'vendor': {'STMicroelectronics': {'STM': 10}, 'Microsoft': {'Microsoft': 2, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 4}}, 'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 2}}, 'FF': {'DH': {'DH': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 2}, 'GCM': {'GCM': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'physical tampering': 4, 'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-2': 4, 'FIPS PUB 197': 3, 'FIPS PUB 46-3': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}]}
values added.
- The st_txt_hash property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '6d8cfda2209efbbc3068333f66da24b9b59b26a7bdfea2ac110092fd6d323424', 'st_pdf_hash': '01aa73fd5e666d941adac336ddc4892e21e5bf16298359f0817485a07457891a', 'report_txt_hash': '4b168d40122676c2cea1096854b497775c29ba6d9c26f627de3f64aedb58ed7b', 'st_txt_hash': '15b5f412d259a611a341bcb91fb08f80465b846f3f61aaf1f933703a0b442f4c'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 2}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 3, '3DES': 2}, 'rules_asymmetric_crypto': {'ECDH': 1, 'DH': 4}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1}, 'rules_crypto_schemes': {'SSL': 2}, 'rules_randomness': {}, 'rules_tee': {'SE': 5}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ALC_FLR', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 501708, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 35, '/CreationDate': "D:20160713084305+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20160713155453+09'00'", '/Producer': 'Microsoft® Word 2010'}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1304238, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 65, '/Author': 'Canon Inc.', '/CreationDate': "D:20160704144811+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Keywords': '', '/ModDate': "D:20160704144816+09'00'", '/Producer': 'Adobe LiveCycle PDFGenerator', '/Subject': '', '/Title': 'Canon imagePRESS C800/C700/C700L/C600 2600.1 model Security Target'}
. - The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['2600.1', '1.0']}
. - The cert_id property was set to
CRP-C0494-01
.
- The st_extract_ok property was set to
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'IEEE Standard for a Protection Profile in Operational Environment A', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['IEEE 2600.1â„¢-2009', 'IEEE 2600.1™-2009']}}]}
.
- The new value is
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Canon imagePRESS C800/C700/C700L/C600 2600.1 model 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Multi-Function Devices",
"cert_link": null,
"dgst": "863d91c6a2b8e77a",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "C0494",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2600.1",
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0494",
"certification_date": "2015-12",
"claim": "EAL3+ALC_FLR.2",
"enhanced": {
"assurance_level": "EAL3 Augmented with ALC_FLR.2",
"cc_version": "3.1 Release4",
"cert_link": "https://www.ipa.go.jp/en/security/c0494_eimg.pdf",
"certification_date": "2015-12-21",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1\u2122-2009 defined as the Protection Profile for MFP. \n \n TOE Security functions \n The TOE embodies the following security functions. \n \n \n \n - \n User Authentication Function \n \n \n \n Function for identifying and authenticating the user. \n \n \n - \n Function Use Restriction Function \n \n \n \n Function for restricting the use of the MFP depending on the authority of the user. \n \n \n - \n Job Output Restriction Function \n \n \n \n Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. \n \n \n - \n Forward Received Jobs Function \n \n \n \n Function for restricting the machine from forwarding received data directly to the LAN. \n \n \n - \n HDD Data Erase Function \n \n \n \n Function for erasing unnecessary data from the hard disk by overwriting the data. \n \n \n - \n HDD Data Encryption Function \n \n \n \n Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption \u0026 Mirroring Board with the correct MFP. \n \n \n - \n LAN Data Protection Function \n \n \n \n Function for protecting all IP packets that are communicated with an IT device. \n \n \n - \n Self-Test Function \n \n \n \n Function for testing the integrity of the executable code at startup. \n \n \n - \n Audit Log Function \n \n \n \n Function for generating audit logs on security events and allowing them to be viewed by the administrator. \n \n \n - \n Management Function \n \n \n \n Function for restricting device settings that influence security to be made only by the administrator.",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc.\n Information Security Evaluation Office",
"product": "Canon imagePRESS C800/C700/C700L/C600 2600.1 model",
"product_type": "Multifunction Product",
"protection_profile": "IEEE Std 2600.1\u2122-2009",
"report_link": "https://www.ipa.go.jp/en/security/c0494_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0494_est.pdf",
"toe_version": "1.0",
"vendor": "Canon Inc."
},
"supplier": "Canon Inc.",
"toe_japan_name": "Canon imagePRESS C800/C700/C700L/C600 2600.1 model1.0",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0494_it4495.html",
"toe_overseas_name": "Canon imagePRESS C800/C700/C700L/C600 2600.1 model1.0"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Canon Inc.",
"manufacturer_web": "https://www.canon.com/",
"name": "Canon imagePRESS C800/C700/C700L/C600 2600.1 model 1.0",
"not_valid_after": "2020-12-21",
"not_valid_before": "2015-12-21",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "c0494_erpt.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0494-01": 1,
"Certification No. C0494": 1
}
},
"cc_claims": {
"A": {
"A.ACCESS": 1,
"A.ADMIN": 2,
"A.USER": 1
},
"T": {
"T.CONF": 2,
"T.DOC": 2,
"T.FUNC": 1,
"T.PROT": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 4
}
},
"cc_security_level": {
"EAL": {
"EAL3": 4,
"EAL3 augmented": 3
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"IPsec": {
"IPsec": 8
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 2,
"CCMB-2012-09-002": 2,
"CCMB-2012-09-003": 2,
"CCMB-2012-09-004": 2
},
"FIPS": {
"FIPS PUB 186-2": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20160713084305+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20160713155453+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 501708,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 35
},
"st_filename": "c0494_est.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECDH": {
"ECDH": 2
}
},
"FF": {
"DH": {
"DH": 2
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 2,
"A.ADMIN": 4,
"A.USER": 3
},
"D": {
"D.CONF": 9,
"D.DOC": 12,
"D.DOC_": 1,
"D.FUNC": 8,
"D.PROT": 6
},
"O": {
"O.AUDIT": 3,
"O.CONF": 8,
"O.DOC": 8,
"O.FUNC": 5,
"O.HDD": 5,
"O.INTERFACE": 4,
"O.PROT": 4,
"O.SOFTWARE": 5,
"O.USER": 10
},
"OE": {
"OE.ADMIN": 5,
"OE.AUDIT": 2,
"OE.AUDIT_ACCESS": 3,
"OE.AUDIT_STORAGE": 3,
"OE.INTERFACE": 2,
"OE.PHYSICAL": 2,
"OE.USER": 10
},
"T": {
"T.CONF": 4,
"T.DOC": 4,
"T.FUNC": 2,
"T.PROT": 2
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.3": 1,
"ADV_TDS.2": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.3": 1,
"ALC_CMS.3": 1,
"ALC_DEL.1": 1,
"ALC_FLR.2": 11,
"ALC_LCD.1": 1
},
"APE": {
"APE_ECD": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 3": 2,
"EAL 3 augmented": 1,
"EAL3": 8,
"EAL3 augmented": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 5,
"FAU_GEN.1": 6,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_GENA": 1,
"FAU_SAR.1": 6,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 6,
"FAU_SAR.2.1": 1,
"FAU_STG.1": 6,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 6,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 25,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 12,
"FCS_CKM.2.1": 1,
"FCS_CKM.4": 11,
"FCS_COP": 5,
"FCS_COP.1": 20,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 20,
"FDP_ACC.1": 21,
"FDP_ACC.1.1": 2,
"FDP_ACE": 1,
"FDP_ACE.1": 1,
"FDP_ACF": 13,
"FDP_ACF.1": 14,
"FDP_ACF.1.1": 3,
"FDP_ACF.1.2": 3,
"FDP_ACF.1.3": 3,
"FDP_ACF.1.4": 3,
"FDP_ACG.1": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 3,
"FDP_IFF": 1,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP": 1,
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 9,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 5,
"FIA_SOS.1.1": 1,
"FIA_UAU": 4,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 6,
"FIA_UID.1": 20,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 13,
"FMT_MSA.1": 9,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 19,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_MTD": 7,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 3,
"FMT_SME": 1,
"FMT_SMEF.1": 2,
"FMT_SMEI": 1,
"FMT_SMF": 2,
"FMT_SMF.1": 23,
"FMT_SMF.1.1": 1,
"FMT_SMR": 4,
"FMT_SMR.1": 29,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_CIP_EXP": 2,
"FPT_CIP_EXP.1": 15,
"FPT_CIP_EXP.1.1": 2,
"FPT_CIP_EXP.1.2": 3,
"FPT_FDI": 1,
"FPT_FDI_EXP": 2,
"FPT_FDI_EXP.1": 9,
"FPT_FDI_EXP.1.1": 2,
"FPT_PHP.1": 6,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_STM": 1,
"FPT_STM.1": 6,
"FPT_STM.1.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTA": {
"FTA_SSL.3": 15,
"FTA_SSL.3.1": 2
},
"FTP": {
"FTP_ITC.1": 11,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1,
"physical tampering": 4
}
},
"standard_id": {
"FIPS": {
"FIPS PUB 186-2": 4,
"FIPS PUB 197": 3,
"FIPS PUB 46-3": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 4
}
},
"DES": {
"3DES": {
"3DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 2,
"Microsoft Corporation": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Canon Inc.",
"/CreationDate": "D:20160704144811+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/Keywords": "",
"/ModDate": "D:20160704144816+09\u002700\u0027",
"/Producer": "Adobe LiveCycle PDFGenerator",
"/Subject": "",
"/Title": "Canon imagePRESS C800/C700/C700L/C600 2600.1 model Security Target",
"pdf_file_size_bytes": 1304238,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 65
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL3+",
"pp_ids": {
"_type": "Set",
"elements": [
"IEEE 2600.1\u0026trade;-2009",
"IEEE 2600.1\u00e2\u201e\u00a2-2009"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_hcd_br_v1.0.pdf",
"pp_name": "IEEE Standard for a Protection Profile in Operational Environment A"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0494_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL3+",
"ALC_FLR.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0494_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "6d8cfda2209efbbc3068333f66da24b9b59b26a7bdfea2ac110092fd6d323424",
"report_txt_hash": "4b168d40122676c2cea1096854b497775c29ba6d9c26f627de3f64aedb58ed7b",
"st_convert_garbage": true,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "01aa73fd5e666d941adac336ddc4892e21e5bf16298359f0817485a07457891a",
"st_txt_hash": "01d008622cc569411381092fd8807860fb06896ce73314a9e3473fc2af746cbb"
},
"status": "archived"
}