name |
Symfoware Server Enterprise Extended Edition 8.0.1(with patch T000132QP-01 and T000133QP-01) |
Voltage SecureMail Suite 2.0 |
category |
Databases |
Other Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
07.09.2012 |
not_valid_before |
22.11.2006 |
29.05.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0067_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-st.pdf |
manufacturer |
Fujitsu Limited |
Voltage Security |
manufacturer_web |
|
https://www.voltage.com/ |
security_level |
EAL1 |
EAL2 |
dgst |
02423e7a081b050e |
71199d48be16022d |
heuristics/cert_id |
JISEC-CC-CRP-C0067 |
CCEVS-VR-0029-2007 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_FSP.1, ADV_HLD.1, ATE_COV.1, AGD_ADM.1, AGD_USR.1, AVA_VLA.1, ATE_FUN.1, AVA_SOF.1, ADV_RCR.1, ADV_SPM.1, ATE_IND.2 |
heuristics/extracted_versions |
8.0.1 |
2.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0067
- certification_date: 01.11.2006
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symfoware Server runs on Red Hat Enterprise Linux AS v.4 for Itanium with patch Update2.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Symfoware Server Enterprise Extended Edition
- product_type: IT Product (Database)
- toe_version: 8.0.1 (with patch T000132QP-01 and T000133QP-01)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0067_it6098.html
- toe_japan_name: Symfoware Server Enterprise Extended Edition 8.0.1 (with patch T000132QP-01 and T000133QP-01)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0067_ecvr.pdf |
st_vid10129-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-07-0029
- cert_item: ® TM Voltage Security, Inc. Palo Alto, CA Voltage SecureMail Suite 2.0
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0067: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL2: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 2
- FCS_CKM.4: 1
- FCS_COP: 5
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS: 1
- A.AUDIT_BACKUP: 1
- A.EXTSRVPROT: 1
- A.LOCATE: 1
- A.LOWEXP: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SECURE_COMMS: 1
- A.USERDOCS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061122205322+09'00'
- /ModDate: D:20061122205322+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 11669
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20070606103547-07'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /ModDate: D:20070606145721-04'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070606173502
- /Title: D
- /_AdHocReviewCycleID: 301627650
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Rose Ignacio
- /_EmailSubject: Voltage VID 10129 Validation Report
- pdf_file_size_bytes: 223595
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
|
st_vid10129-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ADO:
- ADO_DEL.1: 10
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 15
- ADV_RCR.1: 8
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_USR: 1
- AGD_USR.1: 13
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_SOF.1: 11
- AVA_VLA.1: 12
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN_EXP: 30
- FAU_GEN_EXP.1: 4
- FAU_GEN_EXP.2: 9
- FAU_GEN_EXP.2.1: 1
- FAU_SAR_EXP: 26
- FAU_SAR_EXP.1: 6
- FAU_SAR_EXP.3: 9
- FAU_SAR_EXP.3.1: 1
- FCO:
- FCO_NRO_EXP.1: 9
- FCO_NRO_EXP.1.1: 1
- FCO_NRO_EXP.1.2: 1
- FCO_NRO_EXP.1.3: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 17
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 33
- FCS_CKM_EXP.1: 4
- FCS_COP: 17
- FCS_COP.1: 25
- FCS_COP_EXP.1: 10
- FCS_COP_EXP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_SAR_EXP: 1
- FIA:
- FIA_UAU_EXP: 53
- FIA_UAU_EXP.2: 5
- FIA_UID: 5
- FIA_UID_EXP: 68
- FIA_UID_EXP.2: 5
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 37
- FMT_MSA.2.1: 1
- FMT_MTD_EXP: 19
- FMT_MTD_EXP.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.2: 1
- FMT_SMR_EXP: 21
- FMT_SMR_EXP.1: 9
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_RVM.1: 1
- FPT_RVM_EXP: 17
- FPT_RVM_EXP.1: 2
- FPT_SEP.1: 1
- FPT_SEP_EXP: 17
- FPT_SEP_EXP.1: 4
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS: 4
- A.AUDIT: 2
- A.AUDIT_BACKUP: 2
- A.EXTSRVPROT: 4
- A.LOCATE: 2
- A.LOWEXP: 2
- A.NO_EVIL: 2
- A.PHYSICAL: 4
- A.SECURE_COMMS: 2
- A.USERDOCS: 4
- O:
- O.ACCESS: 8
- O.ACCOUN: 4
- O.ALGS: 6
- O.AUDREC: 4
- O.DESTROY: 6
- O.GUIDAN: 6
- O.IDENTITY: 6
- O.KEYGEN: 4
- O.MANAGE: 8
- O.MEDIAT: 4
- O.PART_SEL_PRO: 6
- O.PROOF: 4
- O.SECUREKEYS: 6
- O.SECURE_COM: 5
- OE:
- OE.ACCOUN: 5
- OE.ADMTRA: 9
- OE.DOMAIN_SEP: 5
- OE.GENPUR: 5
- OE.MANAGE: 9
- OE.MEDIAT: 5
- OE.NOEVIL: 8
- OE.NO_BYPASS: 5
- OE.PHYSEC: 10
- OE.TIME: 6
- T:
- T.AUDACC: 4
- T.BYPASS: 2
- T.COMPROMISE: 2
- T.MISUSE: 4
- T.NOAUTH: 4
- T.SPOOF: 2
- T.USAGE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 9
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- PKCS:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |