name |
Hitachi Command Suite Common Component Version: 7.0.1-00
|
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
|
category |
Access Control Devices and Systems
|
Network and Network-Related Devices and Systems
|
not_valid_before |
2011-08-15
|
2010-01-18
|
not_valid_after |
2016-09-01
|
2019-09-01
|
scheme |
JP
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-78fr.pdf
|
status |
archived
|
archived
|
manufacturer |
Hitachi, Ltd.
|
Thales Communications & Security
|
manufacturer_web |
https://www.hitachi.com/
|
https://www.thalescommuninc.com
|
security_level |
ALC_FLR.1, EAL2+ |
ALC_TAT.1, ADV_IMP.1, AVA_VLA.2, EAL3+, ADV_LLD.1, ALC_FLR.3 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-78fr.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
|
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
6d53e443a9a706ec6d2e7b63ae3f23c093d26086e54354c4eefe2da8e5c35e90
|
af5f7a5758f46006e33a83f6b2e21e42c5866857237b5c746722ed10408175e4
|
state/report/txt_hash |
5715eac33217710ca2e388d2a9cce5fe32f1a65cadc3bd0580d39d458f1a50ce
|
aebe30d6b15095ad4a64596f4b92fd456a620dc80d9ea8aacf47a1dbe30517fb
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
f2f4098ecaac915ebf4b427ba932a01c2beb24bae1c44387fefb470a713cfb0e
|
f1fab220161bdc5def0528effc5bdd6b89f08da41aa3c4abe61d9e7b39c31cf5
|
state/st/txt_hash |
4e4e716e35185a7b2c3ddb981dbc6ac44b0e4f5b4d197685712c314bb84a98ad
|
e78548671f89fc15582691cc079382cda35cc4e8e2aaab3daf9dd9b49c934738
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0303
|
ANSSI-CC-2011/78
|
heuristics/cert_lab |
None
|
OPPIDA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0303
- supplier: Hitachi, Ltd.
- toe_overseas_name: -----
- expiration_date: 2016-09
- claim: EAL2+
ALC_FLR.1
- certification_date: 2011-08
- toe_overseas_link: None
- toe_japan_name: Hitachi Command Suite Common Component
7.0.1-00
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
- enhanced:
- product:
Hitachi Command Suite Common Component
- toe_version:
7.0.1-00
- product_type:
Foundational Module Software
- certification_date:
2011-08-15
- cc_version:
3.1
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- report_link:
https://www.ipa.go.jp/en/security/c0303_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0303_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products.
TOE security functionality
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
- product: Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
- url: https://cyber.gouv.fr/produits-certifies/suite-mistral-ip-version-702-pour-trc-7535-version-701-pour-trc-7539-11-et-leur
- description: La « Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1», ci-après appelée « suite logicielle MISTRAL », est composée d'applications développées par Thales Communications & Security :
- l'application VPN IP version 7.0.2 embarquée dans le boitier TRC 7535 incluant un FPGA qui dispose de fonctions cryptographiques T
- sponsor: Thales Communications & Security
- developer: Thales Communications & Security
- cert_id:
2011/78
- level: EAL3+
- enhanced:
- cert_id:
2011/78
- certification_date:
18/01/2010
- category:
Produits réseau
- cc_version:
Critères Communs version 2.3
- developer:
Thales Communications & Security
- sponsor:
Thales Communications & Security
- evaluation_facility:
Oppida
- level:
EAL3+
- protection_profile:
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ADV_IMP.1*, ADV_LLD.1*, ALC_FLR.3, ALC_TAT.1*, AVA_VLA.2
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-78fr.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-78fr.pdf
|
heuristics/scheme_data/cert_id |
C0303
|
2011/78
|
heuristics/scheme_data/enhanced |
- product: Hitachi Command Suite Common Component
- toe_version: 7.0.1-00
- product_type: Foundational Module Software
- certification_date:
2011-08-15
- cc_version:
3.1
- assurance_level: EAL2 Augmented with ALC_FLR.1
- vendor: Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
- report_link:
https://www.ipa.go.jp/en/security/c0303_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0303_est.pdf
- description: PRODUCT DESCRIPTION
Description of TOE
TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products.
TOE security functionality
TOE provides the following security functionality:
- Identification/authentication functionality
(External authentication functionality provided by external authentication servers,
or the use of linkage functionality for external authentication groups)
- Security management functionality
(Functionality that manages TOE user account information,
and allows the user to set security parameters)
- Warning banner functionality
|
- cert_id: 2011/78
- certification_date:
18/01/2010
- category: Produits réseau
- cc_version:
Critères Communs version 2.3
- developer: Thales Communications & Security
- sponsor: Thales Communications & Security
- evaluation_facility:
Oppida
- level: EAL3+
- protection_profile:
- mutual_recognition: SOG-IS
CCRA
- augmented: ADV_IMP.1*, ADV_LLD.1*, ALC_FLR.3, ALC_TAT.1*, AVA_VLA.2
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-78fr.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-78fr.pdf
|
heuristics/scheme_data/enhanced/cc_version |
3.1
|
Critères Communs version 2.3
|
heuristics/scheme_data/enhanced/certification_date |
2011-08-15
|
18/01/2010
|
heuristics/scheme_data/enhanced/evaluation_facility |
Mizuho Information & Research Institute, Inc.
Center for Evaluation of Information Security
|
Oppida
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0303_erpt.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-78fr.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0303_est.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-78fr.pdf
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0303_erpt.pdf
|
ANSSI-CC_2011-78fr.pdf
|
pdf_data/report_frontpage |
|
- FR:
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2011/78
- cert_item:
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
- cert_item_version:
- ref_protection_profiles:
- cc_version:
Critères Communs version 2.3 conforme à la norme ISO 15408:2005
- cc_security_level:
EAL 3 augmenté ADV_IMP.1*, ADV_LLD.1*, ALC_FLR.3, ALC_TAT.1*, AVA_VLA.2 *appliqués aux exigences FCS
- developer:
Thales Communications & Security 160, boulevard de Valmy BP82 92704 Colombes Cedex Commanditaire Thales Communications & Security 160, boulevard de Valmy BP82 92704 Colombes Cedex
- cert_lab:
Oppida 4-6 avenue du vieil étang, Bâtiment B, 78180 Montigny le Bretonneux, France Tél : +33 (0)1 30 14 19 00, mél : [email protected]
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0303-01:
1
- Certification No. C0303:
1
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ILLEGAL_ACCESS:
2
- T.UNAUTHORISED_ACCESS:
2
- A:
- A.PHYSICAL:
1
- A.ADMINISTRATORS:
1
- A.PASSWORD:
1
- A.SECURE_CHANNEL:
1
- A.NETWORKS:
1
- A.SRV_MGMT:
1
- A.CLIENTS:
1
- A.VERSION:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_FLR.1:
3
- ALC_FLR.2:
1
|
- ACM:
- ACM_AUT:
1
- ACM_CAP:
1
- ACM_SCP:
1
- ADO:
- ADV:
- ADV_IMP:
2
- ADV_LLD:
2
- ADV_FSP:
1
- ADV_HLD:
1
- ADV_INT:
1
- ADV_RCR:
1
- ADV_SPM:
1
- AGD:
- ALC:
- ALC_FLR.3:
1
- ALC_TAT:
2
- ALC_FLR:
2
- ALC_DVS:
1
- ALC_LCD:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- AVA_VLA.2:
1
- AVA_VLA:
2
- AVA_CCA:
1
- AVA_MSU:
1
- AVA_SOF:
1
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1:
3
- ALC_FLR.2:
1
|
- ALC_FLR.3:
1
- ALC_TAT:
2
- ALC_FLR:
2
- ALC_DVS:
1
- ALC_LCD:
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2:
4
- EAL2 augmented:
1
|
- EAL:
- EAL 3:
3
- EAL4:
2
- EAL 1:
1
- EAL 5:
1
- EAL 7:
1
- ITSEC:
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
4
- EAL2 augmented:
1
|
- EAL 3:
3
- EAL4:
2
- EAL 1:
1
- EAL 5:
1
- EAL 7:
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- ISO:
- ISO/IEC 15408:2005:
1
- ISO/IEC 18045:2005:
1
- CC:
- CCMB-2005-08-001:
1
- CCMB-2005-08-002:
1
- CCMB-2005-08-003:
1
- CCMB-2005-08-004:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2009-07-001:
2
- CCMB-2009-07-002:
2
- CCMB-2009-07-003:
2
- CCMB-2009-07-004:
2
|
- CCMB-2005-08-001:
1
- CCMB-2005-08-002:
1
- CCMB-2005-08-003:
1
- CCMB-2005-08-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
345195
- pdf_is_encrypted:
True
- pdf_number_of_pages:
38
- /Author:
IPA/JISEC
- /Company: IPA
- /CreationDate:
D:20110928100804+09'00'
- /Creator:
Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate:
D:20110928100931+09'00'
- /Producer:
Acrobat Distiller 8.3.0 (Windows)
- /Title:
CRP-e
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
196760
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /Author:
- /CreationDate:
D:20121001160628+02'00'
- /Creator:
PScript5.dll Version 5.2.2
- /ModDate:
D:20121001160628+02'00'
- /Producer:
Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//Author |
IPA/JISEC
|
|
pdf_data/report_metadata//CreationDate |
D:20110928100804+09'00'
|
D:20121001160628+02'00'
|
pdf_data/report_metadata//Creator |
Word 用 Acrobat PDFMaker 8.1
|
PScript5.dll Version 5.2.2
|
pdf_data/report_metadata//ModDate |
D:20110928100931+09'00'
|
D:20121001160628+02'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 8.3.0 (Windows)
|
Acrobat Distiller 9.0.0 (Windows)
|
pdf_data/report_metadata//Title |
CRP-e
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
345195
|
196760
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
38
|
16
|
pdf_data/st_filename |
c0303_est.pdf
|
ANSSI-CC-cible_2011-78fr.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.MGMT:
9
- O.BANNER:
6
- O.PASSWORD:
7
- T:
- T.ILLEGAL_ACCESS:
4
- T.UNAUTHORISED_ACCESS:
3
- A:
- A.PHYSICAL:
4
- A.NETWORKS:
3
- A.ADMINISTRATORS:
3
- A.SECURE_CHANNEL:
3
- A.VERSION:
4
- A.PASSWORD:
3
- A.CLIENTS:
4
- A.SRV_MGMT:
3
- A.ADMINISTROTORS:
1
- OE:
- OE.SECURE_CHANNEL:
4
- OE.BANNER:
4
- OE.PASSWORD:
4
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
6
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ACM:
- ACM_CAP.3:
3
- ACM_SCP.1:
3
- ADO:
- ADO_DEL.1:
2
- ADO_IGS.1:
2
- ADV:
- ADV_LLD.1:
6
- ADV_IMP.1:
6
- ADV_SPM.1:
6
- ADV_FSP.1:
2
- ADV_HLD.2:
2
- ADV_RCR.1:
2
- AGD:
- AGD_ADM.1:
4
- AGD_USR.1:
2
- ALC:
- ALC_FLR.3:
5
- ALC_TAT.1:
6
- ALC_DVS.1:
2
- ATE:
- ATE_COV.2:
3
- ATE_DPT.1:
3
- ATE_FUN.1:
2
- ATE_IND.2:
2
- AVA:
- AVA_VLA.2:
5
- AVA_MSU.1:
2
- AVA_SOF.1:
2
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
- ADV_LLD.1:
6
- ADV_IMP.1:
6
- ADV_SPM.1:
6
- ADV_FSP.1:
2
- ADV_HLD.2:
2
- ADV_RCR.1:
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_ADM.1:
4
- AGD_USR.1:
2
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_FLR.1:
6
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
|
- ALC_FLR.3:
5
- ALC_TAT.1:
6
- ALC_DVS.1:
2
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1: 1
- ATE_FUN.1:
1
- ATE_IND.2:
1
|
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1:
2
- ATE_IND.2:
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
2
|
pdf_data/st_keywords/cc_sar/AVA |
|
- AVA_VLA.2:
5
- AVA_MSU.1:
2
- AVA_SOF.1:
2
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL2:
7
- EAL2 augmented:
3
|
- EAL3+:
84
- EAL3:
2
- EAL2+:
1
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1:
15
- FDP_ACF.1:
12
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
2
- FDP_ACC:
1
- FDP_ACF:
1
- FIA:
- FIA_UAU.1:
11
- FIA_UID.1:
11
- FIA_SOS.1:
8
- FIA_ATD.1:
10
- FIA_USB.1:
7
- FIA_AFL.1:
7
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_SOS.1.1:
1
- FIA_ATD.1.1:
1
- FIA_USB.1.1:
1
- FIA_USB.1.2:
1
- FIA_USB.1.3:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UID:
1
- FIA_SOS:
1
- FIA_USB:
1
- FIA_AFL:
1
- FMT:
- FMT_MSA.3:
9
- FMT_MSA.1:
10
- FMT_SMR.1:
13
- FMT_SMF.1:
11
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
10
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA:
2
- FMT_MTD:
1
- FMT_SMF:
1
- FMT_SMR:
1
- FTA:
- FTA_TAB.1:
8
- FTA_TAB.1.1:
1
- FTA_TAB:
1
|
- FAU:
- FAU_ARP.1:
7
- FAU_SAA.1:
7
- FAU_ARP:
1
- FAU_SAA:
1
- FAU_GEN.1:
1
- FAU_SAA.1.2:
1
- FCS:
- FCS_CKM.2:
8
- FCS_CKM.4:
13
- FCS_COP.1:
1
- FCS_CKM:
1
- FCS_CKM.1:
8
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FCS_COP:
18
- FCS_COP.1.1:
2
- FDP:
- FDP_ACC.2:
3
- FDP_ACF.1:
5
- FDP_IFC.1:
15
- FDP_IFF.1:
5
- FDP_ITC.1:
15
- FDP_RIP.2:
7
- FDP_UCT.1:
6
- FDP_UIT.1:
7
- FDP_ITC.2:
8
- FDP_ACC:
16
- FDP_ACC.2.2:
2
- FDP_ACF:
13
- FDP_ACC.1:
16
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_IFC:
16
- FDP_IFF:
19
- FDP_IFF.1.1:
2
- FDP_IFF.1.2:
2
- FDP_IFF.1.3:
2
- FDP_IFF.1.4:
2
- FDP_IFF.1.5:
2
- FDP_IFF.1.6:
2
- FDP_ITC:
1
- FDP_ITC.1.1:
1
- FDP_ITC.1.2:
1
- FDP_ITC.1.3:
1
- FDP_RIP:
1
- FDP_RIP.2.1:
1
- FDP_UCT:
1
- FDP_UCT.1.1:
1
- FDP_UIT:
1
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FIA:
- FIA_AFL.1:
7
- FIA_UAU.2:
7
- FIA_UID.2:
7
- FIA_AFL:
1
- FIA_UAU.1:
2
- FIA_AFL.1.2:
1
- FIA_UAU:
1
- FIA_UID.1:
4
- FIA_UID:
1
- FIA_UID.2.1:
1
- FMT:
- FMT_MOF.1:
14
- FMT_MSA.1:
16
- FMT_MSA.2:
17
- FMT_MSA.3:
18
- FMT_MTD.1:
9
- FMT_SMF.1:
17
- FMT_SMR.1:
16
- FMT_MOF:
1
- FMT_MSA:
1
- FMT_MSA.3.2:
1
- FMT_MTD:
1
- FMT_SMF:
1
- FMT_SMF.1.1:
1
- FMT_SMR:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPR:
- FPR_ANO.1:
7
- FPR_ANO:
1
- FPR_ANO.1.1:
1
- FPT:
- FPT_AMT.1:
8
- FPT_ITC.1:
7
- FPT_ITI.1:
7
- FPT_RPL.1:
7
- FPT_RCV.1:
7
- FPT_TST.1:
7
- FPT_AMT:
1
- FPT_AMT.1.1:
1
- FPT_ITC:
1
- FPT_ITC.1.1:
1
- FPT_ITI:
1
- FPT_ITI.1.1:
1
- FPT_ITI.1.2:
1
- FPT_RPL:
1
- FPT_RPL.1.1:
1
- FPT_RPL.1.2:
1
- FPT_RCV:
1
- FPT_RCV.1.1:
1
- FPT_TST:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FTP:
- FTP_TRP.1:
11
- FTP_ITC.1:
4
- FTP_TRP:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
15
- FDP_ACF.1:
12
- FDP_ACC.1.1: 1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
2
- FDP_ACC:
1
- FDP_ACF:
1
|
- FDP_ACC.2: 3
- FDP_ACF.1:
5
- FDP_IFC.1:
15
- FDP_IFF.1: 5
- FDP_ITC.1: 15
- FDP_RIP.2: 7
- FDP_UCT.1: 6
- FDP_UIT.1: 7
- FDP_ITC.2: 8
- FDP_ACC:
16
- FDP_ACC.2.2: 2
- FDP_ACF:
13
- FDP_ACC.1:
16
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_IFC: 16
- FDP_IFF: 19
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_IFF.1.6: 2
- FDP_ITC: 1
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP: 1
- FDP_RIP.2.1: 1
- FDP_UCT: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
1
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
15
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
1
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
12
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
2
|
15
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_UAU.1:
11
- FIA_UID.1:
11
- FIA_SOS.1: 8
- FIA_ATD.1: 10
- FIA_USB.1: 7
- FIA_AFL.1:
7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_SOS.1.1: 1
- FIA_ATD.1.1: 1
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2:
1
- FIA_UID:
1
- FIA_SOS: 1
- FIA_USB: 1
- FIA_AFL:
1
|
- FIA_AFL.1:
7
- FIA_UAU.2: 7
- FIA_UID.2: 7
- FIA_AFL:
1
- FIA_UAU.1:
2
- FIA_AFL.1.2:
1
- FIA_UAU: 1
- FIA_UID.1:
4
- FIA_UID:
1
- FIA_UID.2.1: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
7
|
7
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
11
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
11
|
4
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.3:
9
- FMT_MSA.1:
10
- FMT_SMR.1:
13
- FMT_SMF.1:
11
- FMT_MSA.1.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2:
1
- FMT_MTD.1:
10
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA:
2
- FMT_MTD:
1
- FMT_SMF:
1
- FMT_SMR:
1
|
- FMT_MOF.1: 14
- FMT_MSA.1:
16
- FMT_MSA.2: 17
- FMT_MSA.3:
18
- FMT_MTD.1:
9
- FMT_SMF.1:
17
- FMT_SMR.1:
16
- FMT_MOF: 1
- FMT_MSA:
1
- FMT_MSA.3.2:
1
- FMT_MTD:
1
- FMT_SMF:
1
- FMT_SMF.1.1:
1
- FMT_SMR:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
10
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
9
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
10
|
9
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
11
|
17
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
13
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
- RFC:
- RFC2406:
1
- RFC 3566:
2
- RFC1700:
1
- RFC1042:
1
- RFC1112:
1
- RFC1213:
1
- RFC1157:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft Corporation:
4
- Microsoft:
4
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
455862
- pdf_is_encrypted:
False
- pdf_number_of_pages:
58
- /Title:
Hitachi Command Suite Common Component ST
- /Author:
Hitachi, Ltd. Software Division
- /Subject:
HSCC-ST
- /Creator:
Microsoft® Office Word 2007
- /CreationDate:
D:20110926112144
- /ModDate:
D:20110926112144
- /Producer:
Microsoft® Office Word 2007
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
996398
- pdf_is_encrypted:
False
- pdf_number_of_pages:
79
- /Producer:
GPL Ghostscript 8.70
- /CreationDate:
- /ModDate:
- /Title:
- /Creator:
PDFCreator Version 1.0.2
- /Author:
- /Keywords:
- /Subject:
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Hitachi, Ltd. Software Division
|
|
pdf_data/st_metadata//CreationDate |
D:20110926112144
|
|
pdf_data/st_metadata//Creator |
Microsoft® Office Word 2007
|
PDFCreator Version 1.0.2
|
pdf_data/st_metadata//ModDate |
D:20110926112144
|
|
pdf_data/st_metadata//Producer |
Microsoft® Office Word 2007
|
GPL Ghostscript 8.70
|
pdf_data/st_metadata//Subject |
HSCC-ST
|
|
pdf_data/st_metadata//Title |
Hitachi Command Suite Common Component ST
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
455862
|
996398
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
58
|
79
|
dgst |
3d4662c844b7ac14
|
65f26f8bf773b2b3
|