name |
Huawei Server intelligent Baseboard Management Controller iBMC version 3.03.00.21 |
Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A) |
category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
NL |
JP |
status |
active |
archived |
not_valid_after |
09.11.2027 |
03.10.2016 |
not_valid_before |
09.11.2022 |
30.09.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-22-0461863-cert.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0461863-cr-1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0461863-st2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_est.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
Hitachi, Ltd. |
manufacturer_web |
https://www.huawei.com |
https://www.hitachi.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL2 |
dgst |
380de1d1d77fdb50 |
eecf16a3a9948989 |
heuristics/cert_id |
NSCIB-CC-0461863-CR |
JISEC-CC-CRP-C0315 |
heuristics/cert_lab |
|
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1, ALC_FLR.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.03.00.21 |
02, 70, 05, 00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0315
- certification_date: 01.09.2011
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
- toe_version: 70-02-05-00/00(R7-02-06A)
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2016
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html
- toe_japan_name: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A)
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
nscib-cc-22-0461863-cert.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 1
- EAL4: 2
- EAL4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR.1: 1
- ALC_FLR.3: 2
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: kruitr
- /CreationDate: D:20221125150316+01'00'
- /Creator: Bullzip PDF Printer (11.0.0.2588)
- /ModDate: D:20221125150404+01'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-22-0461863-Cert.doc
- pdf_file_size_bytes: 245214
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
nscib-cc-0461863-cr-1.0.pdf |
c0315_erpt.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0461863-CR
- cert_item: Huawei Server intelligent Baseboard Management Controller iBMC version 3.03.00.21
- cert_lab: UL
- developer: Huawei Technologies Co., Ltd
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0315-01: 1
- Certification No. C0315: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 2
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.NOEVIL_MNT: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.ILLEGAL_XCNTL: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 22
- Huawei Technologies Co: 3
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20111222113805+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111222113848+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 474751
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
pdf_data/st_filename |
nscib-cc-0461863-st2.0.pdf |
c0315_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 14
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 5
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 7
- FCS_CKM.2: 1
- FCS_CKM.4: 8
- FCS_COP: 22
- FCS_COP.1: 19
- FDP:
- FDP_ACC.1: 13
- FDP_IFC.1: 12
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_ROL: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 4
- FIA_SOS.1.1: 1
- FIA_SOS_EXT.1: 1
- FIA_UAU.1: 6
- FIA_UAU.2: 14
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID.1: 15
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 7
- FMT_MSA.4.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ARB: 4
- FPT_ARB.1: 10
- FPT_ARB.1.1: 2
- FPT_ARB.1.2: 2
- FPT_ARB.1.3: 2
- FPT_FLS: 3
- FPT_FLS_EXT.1: 29
- FPT_FLS_EXT.1.1: 1
- FPT_FLS_EXT.2: 12
- FPT_FLS_EXT.2.1: 1
- FPT_ITC.1: 2
- FPT_RCV.2: 13
- FPT_RCV.3: 10
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_ROTS.2: 1
- FPT_SMR.1: 1
- FPT_STM.1: 8
- FPT_STM.1.1: 1
- FPT_TST.1: 1
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.1.2: 2
- FRU:
- FRU_FLT.1: 17
- FRU_FLT.1.1: 1
- FTA:
- FTA_SSL.3: 11
- FTA_SSL.3.1: 1
- FTA_TAB.1: 5
- FTA_TAB.1.1: 1
- FTA_TSE.1: 7
- FTA_TSE.1.1: 1
- FTP:
- FTP_FLS_EXT.1: 1
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 16
- FIA_UID.2.1: 1
- FIA_USB: 18
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.NOEVIL_MNT: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 9
- O.ADM_ROLE: 5
- O.AUD_GEN: 8
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.HOST_AUTH: 5
- O.SEC_COMM: 8
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-SP_HBA: 3
- OE.HDD_ENC: 2
- OE.MANAGEMENT_PC: 3
- OE.MANAGE_SECRET: 2
- OE.NOEVIL: 2
- OE.NOEVIL-MNT: 1
- OE.NOEVIL_MNT: 1
- OE.PHYSICAL_SEC: 4
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.ILLEGAL_XCNTL: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 101
- Huawei Technologies Co: 89
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-512: 1
- SHA512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- SSH:
- TLS:
- TLS:
- TLS: 25
- TLS 1.2: 1
- TLS 1.3: 2
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_DSS_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_AES_128_CCM: 1
- TLS_DHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CCM: 1
- TLS_DHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CCM: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CCM: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS 198-1: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- FIPS PUB 198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38D: 1
- NIST SP 800-56A: 1
- NIST SP 800-56B: 1
- NIST SP 800-57: 4
- PKCS:
- PKCS #1: 1
- PKCS#1: 1
- PKCS#3: 1
- RFC:
- RFC 2104: 2
- RFC 3174: 2
- RFC 3268: 2
- RFC 3526: 2
- RFC 4250: 2
- RFC 4251: 4
- RFC 4252: 4
- RFC 4253: 4
- RFC 4254: 4
- RFC 4344: 1
- RFC 4346: 2
- RFC 4419: 2
- RFC 4432: 2
- RFC 4462: 2
- RFC 4634: 2
- RFC 5246: 4
- RFC 5288: 2
- RFC 5487: 2
- RFC 5647: 2
- RFC 5656: 2
- RFC 6234: 2
- RFC 6655: 2
- RFC 6668: 2
- RFC 7251: 1
- RFC 7905: 2
- RFC 8017: 2
- RFC 8332: 2
- RFC 8446: 4
- RFC 8492: 2
- RFC 8709: 2
- RFC 8731: 2
- RFC-4344: 3
- RFC-4419: 1
- RFC-5647: 2
- RFC-6668: 4
- RFC-7905: 1
- RFC-8332: 2
- RFC-8709: 1
- RFC-8731: 2
- RFC4253: 2
- RFC4419: 2
- RFC4432: 2
- RFC4462: 2
- RFC5288: 8
- RFC5656: 2
- RFC6655: 2
- RFC7251: 3
- RFC7905: 3
- RFC8446: 3
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 2
- server’s service plane usually conducts other services and interfaces with other components out of scope of the TOE, it is essential to define that no other management functionality or application shall: 1
- with the management operation of the TOE. Such seamless and non-conflicting operational policy is out of scope of the TOE and belongs to the administrator of the cloud or data centre. 4.2.5 OE: 1
|
|
pdf_data/st_metadata |
- /Author: zhangli (AH)
- /Comments:
- /Company: Huawei Technologies Co.,Ltd.
- /CreationDate: D:20221109190149+08'00'
- /Creator: Acrobat PDFMaker 22 Word 版
- /Keywords:
- /ModDate: D:20221125150549+01'00'
- /Producer: Adobe PDF Library 22.3.39
- /SourceModified: D:20221109110124
- /Subject:
- /Title:
- /_2015_ms_pID_725343: (3)3sNf0e39ZTRxxfLI5QOzF4k0ctZme9LdhUROMvLBeHcmGggE4emrCacrsFsIqKT7QPUFaCKH
EqSaNYihxzyG+5HUknBbdbFR78bqE7PDe7eAuKAGvtboxF6c5YwR3sMNcCokY1QBncm4gXZP
lhAulD0DDuJOqb/Z2bO+iHIDWdl3Znt1Ju2EREENxPw25BP75t0ab1PY5ZFks2xM7NHxz81O
Ocn1z3STunny3I2YjB
- /_2015_ms_pID_7253431: dqlgxGsEg1wed5ZeJZiPUuEapBlVKymoaLTaeFTppyQCw9f6ZC1B/T
GARnybBknetIuCCEp7Gd7s+NDACM3uwmp6NdVFshffjRLsga0NYctS5HeeVdShaqn7ve9hNC
Yl6Wmv54KMT9H+lQj9BBjlpqo9ykr3xht3BwZibCEEsqFjvKi2j37hm6EGqdtvKVnGIQWgM2
7fD12Kq4FF2PNgcx3IC0fZrO0EinIGflsrBB
- /_2015_ms_pID_7253432: i4P+5eEDoWzceUP2lDIMDEY=
- /_change:
- /_full-control:
- /_readonly:
- /sflag: 1667991649
- pdf_file_size_bytes: 1019166
- pdf_hyperlinks: mailto:[email protected], mailto:[email protected], mailto:[email protected], mailto:[email protected], mailto:[email protected], mailto:[email protected], mailto:[email protected], http://www.huawei.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
- /CreationDate: D:20111221190410
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20111221190410
- /Producer: Microsoft® Office Word 2007
- /Subject: CC EAL2 Security Target
- /Title: VSP ST
- pdf_file_size_bytes: 1094064
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |