name |
Netscout nGeniusPULSE Server v3.2 |
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
CA |
JP |
status |
active |
archived |
not_valid_after |
05.10.2025 |
08.04.2014 |
not_valid_before |
05.10.2020 |
24.12.2008 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/504%20LSS%202019%20CT%20v1.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/504%20LSS%202019%20CR%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/504%20LSS%202019%20ST%20v1.6.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf |
manufacturer |
NetScout Systems, Inc. |
Hitachi, Ltd. |
manufacturer_web |
https://www.netscout.com/ |
https://www.hitachi.com/ |
security_level |
{} |
EAL2 |
dgst |
292833ba1bf2a183 |
96e36510c2c8ba64 |
heuristics/cert_id |
504-LSS-2019 |
JISEC-CC-CRP-C0200 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ASE_ECD.1, AGD_PRE.1, ASE_INT.1, ASE_OBJ.1, ASE_SPD.1, ASE_REQ.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ALC_CMS.1, AGD_OPE.1, ALC_CMC.1 |
ATE_FUN.1, ADV_FSP.1, AVA_VLA.1, AVA_SOF.1, AGD_USR.1, AGD_ADM.1, ATE_IND.2, ADV_RCR.1, ATE_COV.1, ADV_HLD.1 |
heuristics/extracted_versions |
3.2 |
60, 02, 32, 14, 00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 05.10.2020
- level: CPP_ND_V2.1
- product: Netscout nGeniusPULSE Server v3.2
- vendor: NETSCOUT Systems, Inc
|
- cert_id: JISEC-CC-CRP-C0200
- certification_date: 01.12.2008
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
- product_type: IT Product (Storage Control Software)
- report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
- toe_version: 60-02-32-00/00(R6-02A-14)
- vendor: Hitachi, Ltd.
- expiration_date: 01.04.2014
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
- toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.1.pdf |
{} |
pdf_data/cert_filename |
504 LSS 2019 CT v1.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20201007112611-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640451
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
504 LSS 2019 CR v1.0.pdf |
c0200_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0200-01: 1
- Certification No. C0200: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 1
- A.ILLEGAL_SOFT: 1
- A.NOEVIL: 1
- A.NOEVIL_MNT: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.ILLEGAL_XCNTL: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20090401163719+09'00'
- /ModDate: D:20090401163719+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 147813
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
504 LSS 2019 ST v1.6.pdf |
c0200_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- AVA:
|
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 21
- FAU_GEN.1: 8
- FAU_GEN.1.1: 2
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_GEN_EXT: 1
- FAU_GEN_EXT.1: 9
- FAU_GEN_EXT.1.1: 1
- FAU_STG: 1
- FAU_STG.1: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 10
- FAU_STG_EXT.1.1: 4
- FAU_STG_EXT.1.2: 2
- FAU_STG_EXT.1.3: 4
- FAU_STG_EXT.2: 5
- FAU_STG_EXT.2.1: 1
- FAU_STG_EXT.3: 7
- FAU_STG_EXT.3.1: 1
- FAU_STG_EXT.4: 5
- FAU_STG_EXT.4.1: 1
- FCO:
- FCO_CPC_EXT: 1
- FCO_CPC_EXT.1: 10
- FCO_CPC_EXT.1.1: 3
- FCO_CPC_EXT.1.2: 3
- FCO_CPC_EXT.1.3: 2
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 22
- FCS_CKM.2.1: 1
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 74
- FCS_COP.1: 7
- FCS_DTLS_EXT.1.1: 1
- FCS_DTLS_EXT.2.1: 1
- FCS_NTP_EXT: 1
- FCS_NTP_EXT.1: 6
- FCS_NTP_EXT.1.1: 1
- FCS_NTP_EXT.1.2: 1
- FCS_NTP_EXT.1.3: 1
- FCS_NTP_EXT.1.4: 2
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 22
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 4
- FCS_SSHC_EXT: 1
- FCS_SSHC_EXT.1: 14
- FCS_SSHC_EXT.1.1: 2
- FCS_SSHC_EXT.1.2: 2
- FCS_SSHC_EXT.1.3: 2
- FCS_SSHC_EXT.1.4: 2
- FCS_SSHC_EXT.1.5: 4
- FCS_SSHC_EXT.1.6: 2
- FCS_SSHC_EXT.1.7: 2
- FCS_SSHC_EXT.1.8: 2
- FCS_SSHC_EXT.1.9: 2
- FCS_SSHS_EXT: 1
- FCS_SSHS_EXT.1: 12
- FCS_SSHS_EXT.1.1: 2
- FCS_SSHS_EXT.1.2: 2
- FCS_SSHS_EXT.1.3: 2
- FCS_SSHS_EXT.1.4: 2
- FCS_SSHS_EXT.1.5: 3
- FCS_SSHS_EXT.1.6: 2
- FCS_SSHS_EXT.1.7: 2
- FCS_SSHS_EXT.1.8: 2
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 7
- FCS_TLSC_EXT.1.1: 5
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSC_EXT.2: 5
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.2.2: 1
- FCS_TLSC_EXT.2.3: 1
- FCS_TLSC_EXT.2.4: 1
- FCS_TLSC_EXT.2.5: 1
- FCS_TLSS_EXT: 3
- FCS_TLSS_EXT.1: 14
- FCS_TLSS_EXT.1.1: 5
- FCS_TLSS_EXT.1.2: 2
- FCS_TLSS_EXT.1.3: 2
- FCS_TLSS_EXT.2: 5
- FCS_TLSS_EXT.2.1: 2
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 2
- FCS_TLSS_EXT.2.5: 1
- FCS_TLSS_EXT.2.6: 1
- FCS_TLS_EXT.1.1: 2
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 10
- FIA_PMG_EXT.1.1: 2
- FIA_UAU.1: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.2: 12
- FIA_UAU_EXT.2.1: 2
- FIA_UIA_EXT: 3
- FIA_UIA_EXT.1: 11
- FIA_UIA_EXT.1.1: 2
- FIA_UIA_EXT.1.2: 2
- FMT:
- FMT_MOF: 13
- FMT_MOF.1: 2
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 11
- FPT_APW_EXT.1.1: 2
- FPT_APW_EXT.1.2: 2
- FPT_ITT: 7
- FPT_ITT.1: 8
- FPT_PTD: 1
- FPT_SKP_EXT: 1
- FPT_SKP_EXT.1: 10
- FPT_SKP_EXT.1.1: 2
- FPT_STM: 2
- FPT_STM_EXT: 2
- FPT_STM_EXT.1: 10
- FPT_STM_EXT.1.1: 2
- FPT_STM_EXT.1.2: 3
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 10
- FPT_TST_EXT.1.1: 3
- FPT_TST_EXT.2: 7
- FPT_TST_EXT.2.1: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 12
- FPT_TUD_EXT.1.1: 4
- FPT_TUD_EXT.1.2: 3
- FPT_TUD_EXT.1.3: 8
- FPT_TUD_EXT.2: 7
- FPT_TUD_EXT.2.2: 1
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTA_SSL.4: 5
- FTA_SSL.4.1: 1
- FTA_SSL_EXT: 2
- FTA_SSL_EXT.1: 12
- FTA_SSL_EXT.1.1: 2
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC: 7
- FTP_ITC.1: 17
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 8
- FTP_TRP.1: 2
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
- FTP_TUD.1: 1
|
- FAU:
- FAU_GEN.1: 21
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 11
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 13
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 12
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 27
- FIA_ATD.1: 6
- FIA_MSA.1.1: 1
- FIA_MSA.3.1: 1
- FIA_MSA.3.2: 1
- FIA_SOS: 29
- FIA_SOS.1: 2
- FIA_UAU.1: 21
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 17
- FIA_UAU.5: 19
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 22
- FIA_USB: 27
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MSA.1: 16
- FMT_MSA.2: 9
- FMT_MSA.3: 16
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 32
- FPT_RVM.1.1: 1
- FPT_SEP.1: 32
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 17
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_: 1
- A.COMPONENTS_RUNNING: 2
- A.LIMITED_: 1
- A.NO_THRU_: 1
- A.PHYSICAL_: 1
- A.REGULAR_: 1
- A.RESIDUAL_: 1
- A.TRUSTED_: 1
- OE:
- OE.ADMIN_CREDEN: 1
- OE.NO_GENERAL_: 1
- OE.NO_THRU_: 1
- OE.PHYSICAL: 1
- OE.RESIDUAL_INFO: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_: 1
- T.PASSWORD_CRACKING: 3
- T.SECURITY_: 2
- T.SECURITY_FUNCTIONAL: 2
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_ADMINIS: 1
- T.UNDETECTED_: 1
- T.UNDETECTED_ACTIVITY: 2
- T.UNTRUSTED_: 1
- T.UNTRUSTED_COMMUNI: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 2
- T.UPDATE_: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_: 2
- T.WEAK_AUTHENTICATIO: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.CONNECT_STORAGE: 3
- A.ILLEGAL_SOFT: 3
- A.NOEVIL: 3
- A.NOEVIL_MNT: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 9
- O.ADM_ROLE: 5
- O.AUD_GEN: 6
- O.HOST_ACCESS: 8
- O.HOST_AUTH: 5
- O.SEC_COMM: 8
- OE:
- OE.CONNECT_STORAGE: 3
- OE.ILLEGAL_SOFT: 2
- OE.NOEVIL: 2
- OE.NOEVIL-MNT: 1
- OE.NOEVIL_MNT: 1
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.ILLEGAL_XCNTL: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 20
- AES-: 2
- AES-128: 2
- constructions:
- MAC:
- HMAC: 4
- HMAC-SHA-256: 3
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 14
- DHE: 2
- Diffie-Hellman: 20
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 3
- SHA-512: 3
- SHA256: 3
- SHA384: 1
- SHA512: 1
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 5
- IKEv1: 12
- IKEv2: 12
- IPsec:
- SSH:
- TLS:
- DTLS:
- DTLS: 73
- DTLS 1.0: 9
- DTLS 1.2: 9
- DTLS v1.0: 4
- DTLS v1.2: 4
- SSL:
- SSL: 7
- SSL 2.0: 3
- SSL 3.0: 3
- TLS:
- TLS: 92
- TLS 1.0: 3
- TLS 1.1: 7
- TLS 1.2: 7
- TLS v1.0: 2
- TLS1.1: 1
- TLS1.2: 1
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 6
- P-384: 8
- P-521: 4
- curve P-384: 2
- secp256r1: 10
- secp384r1: 8
- secp521r1: 8
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 5
- NIST:
- RFC:
- RFC 1305: 1
- RFC 2818: 8
- RFC 2986: 2
- RFC 3526: 3
- RFC 3602: 2
- RFC 4106: 1
- RFC 4109: 1
- RFC 4251: 2
- RFC 4253: 8
- RFC 4301: 2
- RFC 4303: 1
- RFC 4304: 1
- RFC 4346: 4
- RFC 4347: 9
- RFC 4868: 2
- RFC 4945: 1
- RFC 5246: 5
- RFC 5280: 6
- RFC 5282: 1
- RFC 5289: 4
- RFC 5647: 2
- RFC 5759: 1
- RFC 5905: 1
- RFC 5996: 2
- RFC 6125: 8
- RFC 6347: 9
- RFC 6960: 2
- X509:
|
- CC:
- CCMB-2005-08-001: 4
- CCMB-2005-08-002: 3
- CCMB-2005-08-003: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- indicated as “REQUIRED” but not listed in the later elements of this component are implemented is out of scope of the evaluation activity for this requirement. RFC 5647 only applies to the RFC compliant: 2
- out of scope: 2
|
|
pdf_data/st_metadata |
|
- /Author: 八木
- /Company: Hitachi
- /CreationDate: D:20090330094022+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0.7
- /ModDate: D:20090330094033+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Subject: CC EAL2 Security Target
- /Title: USP_V ST
- pdf_file_size_bytes: 516948
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |