Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HiCommand Suite Common Component Version: 05-51-01
JISEC-CC-CRP-C0096
Oberthur ID-One IAS-ECC v1.0.1 R1 : applet (v1121) loaded on Cosmo v7.0-a in standard configuration
ANSSI-CC-2010/37
name HiCommand Suite Common Component Version: 05-51-01 Oberthur ID-One IAS-ECC v1.0.1 R1 : applet (v1121) loaded on Cosmo v7.0-a in standard configuration
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 01.09.2019
not_valid_before 30.05.2007 29.06.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-37fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0096_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-37en.pdf
manufacturer Hitachi, Ltd. Oberthur Technologies / ATMEL Secure Microcontroller Solutions
manufacturer_web https://www.hitachi.com/ https://www.oberthur.com/
security_level EAL2+, ALC_FLR.1 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 1a3d494b8e6e9a5d 834fd30babf530bd
heuristics/cert_id JISEC-CC-CRP-C0096 ANSSI-CC-2010/37
heuristics/cert_lab [] THALES
heuristics/extracted_sars ADV_RCR.1, ADV_FSP.1, ALC_FLR.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 AGD_PRE.1, AVA_VAN.5, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1, ADV_FSP.2, ADV_IMP.1
heuristics/extracted_versions 01, 05, 51 1.0.1, 7.0
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2010/39, ANSSI-CC-2010/58, ANSSI-CC-2012/10
heuristics/report_references/directly_referencing {} ANSSI-CC-2009/46
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2010/39, ANSSI-CC-2010/58, ANSSI-CC-2013/70, ANSSI-CC-2012/10
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2009/11, ANSSI-CC-2009/46
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0096
  • certification_date: 01.05.2007
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2+ALC_FLR.1
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0096_eimg.pdf
    • description: PRODUCT DESCRIPTION TOE is a module that provides some kinds of storage management software that manage a plural of storage devices that are connected through SAN with common functions. Storage management software is such as HiCommand Device Manager, HiCommand Replication Monitor and HiCommand Tiered Storage Manager. HiCommand Suite is the general term for these software and TOE. TOE is provided customers as built-in module included in each software package. TOE has the following security functions. - Identification/authentication - Privilege information management (Privilege information is attached to each user's information and it decides each user's role for storage management software.) - Warning banner
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: HiCommand Suite Common Component
    • product_type: IT Product (Foundational Module Software)
    • report_link: https://www.ipa.go.jp/en/security/c0096_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0096_est.pdf
    • toe_version: 05-51-01
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2007-12', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106_01.html'})]
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0096_it6106.html
  • toe_japan_name: HiCommand Suite Common Component 05-51-01
  • toe_overseas_link: None
  • toe_overseas_name: HiCommand Suite Common Component 05-70-01
heuristics/st_references/directly_referencing {} ANSSI-CC-2009/36, ANSSI-CC-2009/48, ANSSI-CC-2009/46, ANSSI-CC-2009/47
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2009/48, ANSSI-CC-2009/10, ANSSI-CC-2009/36, BSI-DSZ-CC-0421-2008, ANSSI-CC-2009/11, ANSSI-CC-2009/46, ANSSI-CC-2009/47
heuristics/protection_profiles {} 9863a376f3bb4175, 40002c3611fc465f
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename c0096_erpt.pdf ANSSI-CC_2010-37fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1
    • cert_id: ANSSI-CC-2010/37
    • cert_item: Carte ID-One IAS-ECC v1.0.1 R1 : applet (version 1121) chargée sur Cosmo v7.0-a (composant Atmel) en configuration Standard
    • cert_item_version: Version applet 1121
    • cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
    • developer: Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France Atmel Secure Microcontroller Solutions Maxwell Building - Scottish Enterprise technology Park East Kilbride, G75 0QR - Ecosse, Royaume-Uni Commanditaire Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0096-01: 1
    • Certification No. C0096: 1
  • FR:
    • ANSSI-CC-2009_46: 6
    • ANSSI-CC-2010/37: 21
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0005-2002: 1
    • BSI-PP- 0006-2002: 2
    • BSI-PP-0005-2002: 3
    • BSI-PP-0006-2002: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
  • ADO:
    • ADO_DEL: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.TOKEN: 1
  • T:
    • T.ILLEGAL_ACCESS: 1
    • T.UNAUTHORISED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Oberthur:
    • Oberthur Technologies: 13
pdf_data/report_keywords/eval_facility
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • SCP:
    • SCP01: 2
    • SCP02: 1
    • SCP03: 1
pdf_data/report_metadata
  • /CreationDate: D:20081212094836+09'00'
  • /ModDate: D:20081212094836+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 107748
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /CreationDate: D:20101105153829+01'00'
  • /Keywords:
  • /ModDate: D:20101105153829+01'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • pdf_file_size_bytes: 200174
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename c0096_est.pdf ANSSI-CC-cible_2010-37en.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2009-36: 1
    • ANSSI-CC-2009-46: 1
    • ANSSI-CC-2009-47: 1
    • ANSSI-CC-2009-48: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0005-2002: 1
    • BSI-PP-0006-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
    • EAL2 augmented: 4
  • EAL:
    • EAL 4+: 2
    • EAL4: 4
    • EAL4 augmented: 3
    • EAL4+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.2: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE: 8
    • AGD_OPE.1: 1
    • AGD_PRE: 14
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 2
    • ALC_DVS.2: 8
    • ALC_FLR: 1
    • ALC_LCD: 1
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 12
    • FIA_SOS.1.1: 1
    • FIA_TAB: 5
    • FIA_TAB.1: 7
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 5
    • FPT_ITC.1.1: 1
    • FPT_RVM: 1
    • FPT_RVM.1: 15
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 3
    • FTA_TAB.1.1: 2
  • FAU:
    • FAU_ARP.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_CKM.4.1: 2
    • FCS_COP: 1
    • FCS_COP.1: 17
    • FCS_RNG: 3
    • FCS_RNG.1: 2
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 8
    • FDP_ACF: 1
    • FDP_ACF.1: 28
    • FDP_ETC: 1
    • FDP_ETC.1: 6
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_RIP: 1
    • FDP_RIP.1.1: 3
    • FDP_SDI: 1
    • FDP_SDI.2: 4
    • FDP_UCT: 1
    • FDP_UCT.1: 3
    • FDP_UIT: 1
    • FDP_UIT.1: 8
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1.1: 1
    • FIA_ATD: 1
    • FIA_UAU: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 3
    • FMT_MTD.1: 5
    • FMT_SMF: 1
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_FLS: 1
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3.1: 1
    • FPT_TEE: 2
    • FPT_TST: 1
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 8
    • FTP_ITC.1: 15
    • FTP_ITC.1.3: 2
    • FTP_TRP: 4
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.TOKEN: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 7
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 7
    • OE.SECURE_CHAN: 1
    • OE.SECURE_CHANNEL: 6
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
  • A:
    • A.CGA: 2
    • A.SCA: 2
  • D:
    • D.APPLI: 1
    • D.AUTH_CRYPTOGRAM: 1
    • D.AUTH_KEYS: 7
    • D.DTBS: 2
    • D.EPHEMERAL_KEYS: 4
    • D.ESERVICES_KEYS: 1
    • D.IDENTIFICATION_DATA: 1
    • D.RAD: 1
    • D.SCD: 1
    • D.SCD_ID: 1
    • D.SM_DATA: 1
    • D.STATE: 2
    • D.SVD: 1
    • D.TOE_AUTH_PRIVATE_KEYS: 1
    • D.TOE_AUTH_PUBLIC_KEYS: 1
    • D.VAD: 1
  • OE:
    • OE.HI_VAD: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 6
    • Microsoft Corporation: 1
  • Oberthur:
    • OBERTHUR: 10
    • Oberthur Technologies: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 30
  • FF:
    • DH:
      • DH: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 4
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • SPA: 1
    • Side channel: 1
    • timing attacks: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS PUB 180-2: 1
    • FIPS180-2: 1
  • PKCS:
    • PKCS #1: 6
    • PKCS#1: 4
    • PKCS#15: 2
    • PKCS#3: 3
  • SCP:
    • SCP02: 2
    • SCP03: 2
pdf_data/st_metadata
  • /Author: Hitachi, Ltd.
  • /CreationDate: D:20081205141328
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:20081205141328
  • /Producer: PrimoPDF
  • /Subject: HSCC-ST
  • /Title: HiCommand Suite Common Component ST
  • pdf_file_size_bytes: 381919
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 54
  • /Author: FERAUD
  • /CreationDate: D:20101006115204+02'00'
  • /Creator: PDFCreator Version 0.8.1
  • /ModDate: D:20100614114609+02'00'
  • /Producer: AFPL Ghostscript 8.50
  • /Title: FQR 110 4773 Ed3
  • pdf_file_size_bytes: 814040
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 104
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different