Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HiCommand Suite Common Component Version: 05-51-01
JISEC-CC-CRP-C0096
EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
ISCB-5-RPT-C053-CR-v1a
name HiCommand Suite Common Component Version: 05-51-01 EzIdentityTM mSignTM (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentityTM Authentication Platform v4.0.0.2
category Access Control Devices and Systems Products for Digital Signatures
scheme JP MY
not_valid_after 07.10.2013 01.09.2019
not_valid_before 30.05.2007 27.12.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C053-CR-v1a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EZMCOM%20EzIdentity%20Security%20Target%20v1.1.pdf
manufacturer Hitachi, Ltd. EZMCOM Inc.
manufacturer_web https://www.hitachi.com/ https://www.ezmcom.com/
security_level EAL2+, ALC_FLR.1 EAL2
dgst 1a3d494b8e6e9a5d 80a30e9889a58515
heuristics/cert_id JISEC-CC-CRP-C0096 ISCB-5-RPT-C053-CR-v1a
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 01, 05, 51 4.0.0.2, 2.0.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0096
  • certification_date: 01.05.2007
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2+ALC_FLR.1
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0096_eimg.pdf
    • description: PRODUCT DESCRIPTION TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as HiCommand Device Manager, HiCommand Replication Monitor and HiCommand Tiered Storage Manager. HiCommand Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE has the following security functions. - Identification/authentication - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: HiCommand Suite Common Component
    • product_type: IT Product (Foundational Module Software)
    • report_link: https://www.ipa.go.jp/en/security/c0096_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0096_est.pdf
    • toe_version: 05-51-01
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2007-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106_01.html'})]
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106.html
  • toe_japan_name: HiCommand Suite Common Component 05-51-01
  • toe_overseas_link: None
  • toe_overseas_name: HiCommand Suite Common Component 05-70-01
maintenance_updates
pdf_data/report_filename c0096_erpt.pdf ISCB-5-RPT-C053-CR-v1a.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0096-01: 1
    • Certification No. C0096: 1
  • MY:
    • ISCB-5-RPT-C053-CR-v1a: 41
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL2: 9
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
  • FCO:
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.4: 1
    • FCS_COP: 5
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 1
    • FIA_ATD: 2
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 2
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT.1: 1
  • FTA:
    • FTA_SSL.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.TOKEN: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 5
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-3: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • PKCS:
    • PKCS#1: 3
    • PKCS#5: 2
  • RFC:
    • RFC 2898: 2
    • RFC 4226: 2
    • RFC 6287: 2
    • RFC 6328: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • 11 All of the underlying hardware and the operating systems used by both mSign and EzIdentity are out of scope for this evaluation. 12 Figure 1 identifies the major architectural components that comprise the: 1
    • Ref [6]) are out of scope for this evaluation: 1
    • by both mSign and EzIdentity as described in Section 1.4.3 of the Security Target (Ref [6]) are out of scope for this evaluation. 23 The assurance gained via evaluation applies specifically to the TOE in the: 1
    • out of scope: 2
pdf_data/report_metadata
  • /CreationDate: D:20081212094836+09'00'
  • /ModDate: D:20081212094836+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 107748
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20140106141939+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: EZMCOM Inc
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C053-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20140106142000+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C053
  • /Released: 27 December 2013
  • /ST Date: 18 November 2013
  • /ST Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target
  • /ST Version: v1.1
  • /SourceModified: D:20140106061916
  • /Sponsor: EZMCOM Inc
  • /Subject: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.0.2
  • /TOE Name: EzIdentity™ mSign™ and EzIdentity™ Authentication Platform
  • /TOE Version: EzIdentity™ mSign™ (Android v2.0.0.1 & iOS v2.0.0.1) and EzIdentity™ Authentication Platform v4.0.02
  • /Title: C053 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 398084
  • pdf_hyperlinks: mailto:[email protected], http://www.cybersecurity.my/mycc, http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 42
pdf_data/st_filename c0096_est.pdf EZMCOM EzIdentity Security Target v1.1.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 4
  • EAL:
    • EAL2: 9
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 1
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 4
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 12
    • FIA_SOS.1.1: 1
    • FIA_TAB: 5
    • FIA_TAB.1: 7
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 5
    • FPT_ITC.1.1: 1
    • FPT_RVM: 1
    • FPT_RVM.1: 15
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 2
  • FAU:
    • FAU_GEN.1: 5
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FCO:
    • FCO_NRO.1: 6
    • FCO_NRO.1.1: 1
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 1
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.1: 13
    • FCS_CKM.2: 4
    • FCS_CKM.4: 23
    • FCS_CKM.4.1: 1
    • FCS_COP: 28
    • FCS_COP.1: 5
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 5
    • FDP_IFF: 2
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 8
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 4
    • FIA_UAU.2: 9
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 6
    • FMT_MSA.1: 3
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 12
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FTA:
    • FTA_SSL.1: 5
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.TOKEN: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 7
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 7
    • OE.SECURE_CHAN: 1
    • OE.SECURE_CHANNEL: 6
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
  • A:
    • A.ADMIN: 2
    • A.DATACONTROL: 2
    • A.OS: 2
    • A.PHYSICAL: 2
    • A.TIMESTAMP: 3
    • A.UPDATE: 2
  • O:
    • O.-CONTROL: 1
    • O.COMMSEC: 4
    • O.CONTROL: 3
    • O.CRYPT: 4
    • O.KEYPROTECT: 3
    • O.MODIFY: 4
  • OE:
    • OE.ADMIN: 2
    • OE.ENVIRONMENT: 3
    • OE.INSTALL: 1
    • OE.OPSYS: 2
    • OE.TIMESTAMP: 2
    • OE.UPDATE: 2
  • T:
    • T.COMINT: 3
    • T.MODIFY: 3
    • T.TSFDATA: 3
    • T.UNAUTHORISED_A: 1
    • T.UNAUTHORISED_ACCESS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 6
    • Microsoft Corporation: 1
  • Microsoft:
    • Microsoft: 1
  • STMicroelectronics:
    • STM: 1
  • Thales:
    • Thales: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • TDES: 7
      • Triple-DES: 7
  • constructions:
    • MAC:
      • HMAC: 5
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 2
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-2: 1
    • FIPS 180-3: 1
    • FIPS 46-3: 1
    • FIPS PUB 180-3: 1
  • PKCS:
    • PKCS#1: 6
    • PKCS#5: 3
  • RFC:
    • RFC 2898: 2
    • RFC 4226: 2
    • RFC 6287: 2
    • RFC 6328: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Please note that the RSA encryption and decryption operations performed on the EzIdentity are out of scope for this evaluation. COMMERCIAL-IN-CONFIDENCE 13 of 43 2 Conformance Claim (ASE_CCL.1) The ST and: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Hitachi, Ltd.
  • /CreationDate: D:20081205141328
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:20081205141328
  • /Producer: PrimoPDF
  • /Subject: HSCC-ST
  • /Title: HiCommand Suite Common Component ST
  • pdf_file_size_bytes: 381919
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /Author: Soshinee Govindasamy
  • /CreationDate: D:20131121122329+08'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131121122329+08'00'
  • /Producer: Microsoft® Word 2010
  • /Title: EzIdentity™ mSign™ & EzIdentity™ Authentication Platform Security Target EAL2 Security Target
  • pdf_file_size_bytes: 928180
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different