Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Hitachi Command Suite Common Component Version: 7.0.1-00
JISEC-CC-CRP-C0303
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
ANSSI-CC-2011/78
name Hitachi Command Suite Common Component Version: 7.0.1-00 Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
category Access Control Devices and Systems Network and Network-Related Devices and Systems
not_valid_before 2011-08-15 2010-01-18
not_valid_after 2016-09-01 2019-09-01
scheme JP FR
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-78fr.pdf
manufacturer Hitachi, Ltd. Thales Communications & Security
manufacturer_web https://www.hitachi.com/ https://www.thalescommuninc.com
security_level ALC_FLR.1, EAL2+ ALC_TAT.1, ADV_IMP.1, AVA_VLA.2, EAL3+, ADV_LLD.1, ALC_FLR.3
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-78fr.pdf
state/report/pdf_hash 6d53e443a9a706ec6d2e7b63ae3f23c093d26086e54354c4eefe2da8e5c35e90 af5f7a5758f46006e33a83f6b2e21e42c5866857237b5c746722ed10408175e4
state/report/txt_hash 5715eac33217710ca2e388d2a9cce5fe32f1a65cadc3bd0580d39d458f1a50ce aebe30d6b15095ad4a64596f4b92fd456a620dc80d9ea8aacf47a1dbe30517fb
state/st/pdf_hash f2f4098ecaac915ebf4b427ba932a01c2beb24bae1c44387fefb470a713cfb0e f1fab220161bdc5def0528effc5bdd6b89f08da41aa3c4abe61d9e7b39c31cf5
state/st/txt_hash 4e4e716e35185a7b2c3ddb981dbc6ac44b0e4f5b4d197685712c314bb84a98ad e78548671f89fc15582691cc079382cda35cc4e8e2aaab3daf9dd9b49c934738
heuristics/cert_id JISEC-CC-CRP-C0303 ANSSI-CC-2011/78
heuristics/cert_lab None OPPIDA
heuristics/scheme_data
  • cert_id: C0303
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2016-09
  • claim: EAL2+ ALC_FLR.1
  • certification_date: 2011-08
  • toe_overseas_link: None
  • toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
  • enhanced:
    • product: Hitachi Command Suite Common Component
    • toe_version: 7.0.1-00
    • product_type: Foundational Module Software
    • certification_date: 2011-08-15
    • cc_version: 3.1
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
  • product: Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
  • url: https://cyber.gouv.fr/produits-certifies/suite-mistral-ip-version-702-pour-trc-7535-version-701-pour-trc-7539-11-et-leur
  • description: La « Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1», ci-après appelée « suite logicielle MISTRAL », est composée d'applications développées par Thales Communications & Security : - l'application VPN IP version 7.0.2 embarquée dans le boitier TRC 7535 incluant un FPGA qui dispose de fonctions cryptographiques T
  • sponsor: Thales Communications & Security
  • developer: Thales Communications & Security
  • cert_id: 2011/78
  • level: EAL3+
  • enhanced:
    • cert_id: 2011/78
    • certification_date: 18/01/2010
    • category: Produits réseau
    • cc_version: Critères Communs version 2.3
    • developer: Thales Communications & Security
    • sponsor: Thales Communications & Security
    • evaluation_facility: Oppida
    • level: EAL3+
    • protection_profile:
    • mutual_recognition: SOG-IS CCRA
    • augmented: ADV_IMP.1*, ADV_LLD.1*, ALC_FLR.3, ALC_TAT.1*, AVA_VLA.2
    • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-78fr.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-78fr.pdf
heuristics/scheme_data/cert_id C0303 2011/78
heuristics/scheme_data/enhanced
  • product: Hitachi Command Suite Common Component
  • toe_version: 7.0.1-00
  • product_type: Foundational Module Software
  • certification_date: 2011-08-15
  • cc_version: 3.1
  • assurance_level: EAL2 Augmented with ALC_FLR.1
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
  • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
  • cert_id: 2011/78
  • certification_date: 18/01/2010
  • category: Produits réseau
  • cc_version: Critères Communs version 2.3
  • developer: Thales Communications & Security
  • sponsor: Thales Communications & Security
  • evaluation_facility: Oppida
  • level: EAL3+
  • protection_profile:
  • mutual_recognition: SOG-IS CCRA
  • augmented: ADV_IMP.1*, ADV_LLD.1*, ALC_FLR.3, ALC_TAT.1*, AVA_VLA.2
  • target_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-78fr.pdf
  • report_link: https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-78fr.pdf
heuristics/scheme_data/enhanced/cc_version 3.1 Critères Communs version 2.3
heuristics/scheme_data/enhanced/certification_date 2011-08-15 18/01/2010
heuristics/scheme_data/enhanced/evaluation_facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security Oppida
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0303_erpt.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2011-78fr.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0303_est.pdf https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2011-78fr.pdf
pdf_data/report_filename c0303_erpt.pdf ANSSI-CC_2011-78fr.pdf
pdf_data/report_frontpage
  • FR:
    • match_rules: Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\(s\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
    • cert_id: ANSSI-CC-2011/78
    • cert_item: Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1
    • cert_item_version:
    • ref_protection_profiles:
    • cc_version: Critères Communs version 2.3 conforme à la norme ISO 15408:2005
    • cc_security_level: EAL 3 augmenté ADV_IMP.1*, ADV_LLD.1*, ALC_FLR.3, ALC_TAT.1*, AVA_VLA.2 *appliqués aux exigences FCS
    • developer: Thales Communications & Security 160, boulevard de Valmy BP82 92704 Colombes Cedex Commanditaire Thales Communications & Security 160, boulevard de Valmy BP82 92704 Colombes Cedex
    • cert_lab: Oppida 4-6 avenue du vieil étang, Bâtiment B, 78180 Montigny le Bretonneux, France Tél : +33 (0)1 30 14 19 00, mél : [email protected]
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0303-01: 1
    • Certification No. C0303: 1
  • FR:
    • ANSSI-CC-2011/78: 17
pdf_data/report_keywords/cc_claims
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.UNAUTHORISED_ACCESS: 2
  • A:
    • A.PHYSICAL: 1
    • A.ADMINISTRATORS: 1
    • A.PASSWORD: 1
    • A.SECURE_CHANNEL: 1
    • A.NETWORKS: 1
    • A.SRV_MGMT: 1
    • A.CLIENTS: 1
    • A.VERSION: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_FLR.2: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_IMP: 2
    • ADV_LLD: 2
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_INT: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_FLR.3: 1
    • ALC_TAT: 2
    • ALC_FLR: 2
    • ALC_DVS: 1
    • ALC_LCD: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VLA.2: 1
    • AVA_VLA: 2
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_SOF: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_FLR.1: 3
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_TAT: 2
  • ALC_FLR: 2
  • ALC_DVS: 1
  • ALC_LCD: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
  • EAL:
    • EAL 3: 3
    • EAL4: 2
    • EAL 1: 1
    • EAL 5: 1
    • EAL 7: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 1
  • EAL 3: 3
  • EAL4: 2
  • EAL 1: 1
  • EAL 5: 1
  • EAL 7: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • VPN:
    • VPN: 10
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 1
  • OPPIDA:
    • OPPIDA: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCMB-2005-08-001: 1
  • CCMB-2005-08-002: 1
  • CCMB-2005-08-003: 1
  • CCMB-2005-08-004: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • TDES: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 6
  • Thales:
    • Thales: 5
pdf_data/report_metadata
  • pdf_file_size_bytes: 345195
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110928100804+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110928100931+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 196760
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author:
  • /CreationDate: D:20121001160628+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20121001160628+02'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title:
  • pdf_hyperlinks:
pdf_data/report_metadata//Author IPA/JISEC
pdf_data/report_metadata//CreationDate D:20110928100804+09'00' D:20121001160628+02'00'
pdf_data/report_metadata//Creator Word 用 Acrobat PDFMaker 8.1 PScript5.dll Version 5.2.2
pdf_data/report_metadata//ModDate D:20110928100931+09'00' D:20121001160628+02'00'
pdf_data/report_metadata//Producer Acrobat Distiller 8.3.0 (Windows) Acrobat Distiller 9.0.0 (Windows)
pdf_data/report_metadata//Title CRP-e
pdf_data/report_metadata/pdf_file_size_bytes 345195 196760
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 38 16
pdf_data/st_filename c0303_est.pdf ANSSI-CC-cible_2011-78fr.pdf
pdf_data/st_keywords/cc_claims
  • O:
    • O.MGMT: 9
    • O.BANNER: 6
    • O.PASSWORD: 7
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
  • A:
    • A.PHYSICAL: 4
    • A.NETWORKS: 3
    • A.ADMINISTRATORS: 3
    • A.SECURE_CHANNEL: 3
    • A.VERSION: 4
    • A.PASSWORD: 3
    • A.CLIENTS: 4
    • A.SRV_MGMT: 3
    • A.ADMINISTROTORS: 1
  • OE:
    • OE.SECURE_CHANNEL: 4
    • OE.BANNER: 4
    • OE.PASSWORD: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 6
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_LLD.1: 6
    • ADV_IMP.1: 6
    • ADV_SPM.1: 6
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 4
    • AGD_USR.1: 2
  • ALC:
    • ALC_FLR.3: 5
    • ALC_TAT.1: 6
    • ALC_DVS.1: 2
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VLA.2: 5
    • AVA_MSU.1: 2
    • AVA_SOF.1: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_LLD.1: 6
  • ADV_IMP.1: 6
  • ADV_SPM.1: 6
  • ADV_FSP.1: 2
  • ADV_HLD.2: 2
  • ADV_RCR.1: 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_ADM.1: 4
  • AGD_USR.1: 2
pdf_data/st_keywords/cc_sar/ALC
  • ALC_FLR.1: 6
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
  • ALC_FLR.3: 5
  • ALC_TAT.1: 6
  • ALC_DVS.1: 2
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
  • ATE_COV.2: 3
  • ATE_DPT.1: 3
  • ATE_FUN.1: 2
  • ATE_IND.2: 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_VLA.2: 5
  • AVA_MSU.1: 2
  • AVA_SOF.1: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 7
  • EAL2 augmented: 3
  • EAL3+: 84
  • EAL3: 2
  • EAL2+: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACF.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ACC: 1
    • FDP_ACF: 1
  • FIA:
    • FIA_UAU.1: 11
    • FIA_UID.1: 11
    • FIA_SOS.1: 8
    • FIA_ATD.1: 10
    • FIA_USB.1: 7
    • FIA_AFL.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_SOS.1.1: 1
    • FIA_ATD.1.1: 1
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UID: 1
    • FIA_SOS: 1
    • FIA_USB: 1
    • FIA_AFL: 1
  • FMT:
    • FMT_MSA.3: 9
    • FMT_MSA.1: 10
    • FMT_SMR.1: 13
    • FMT_SMF.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA: 2
    • FMT_MTD: 1
    • FMT_SMF: 1
    • FMT_SMR: 1
  • FTA:
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
    • FTA_TAB: 1
  • FAU:
    • FAU_ARP.1: 7
    • FAU_SAA.1: 7
    • FAU_ARP: 1
    • FAU_SAA: 1
    • FAU_GEN.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.2: 8
    • FCS_CKM.4: 13
    • FCS_COP.1: 1
    • FCS_CKM: 1
    • FCS_CKM.1: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP: 18
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.2: 3
    • FDP_ACF.1: 5
    • FDP_IFC.1: 15
    • FDP_IFF.1: 5
    • FDP_ITC.1: 15
    • FDP_RIP.2: 7
    • FDP_UCT.1: 6
    • FDP_UIT.1: 7
    • FDP_ITC.2: 8
    • FDP_ACC: 16
    • FDP_ACC.2.2: 2
    • FDP_ACF: 13
    • FDP_ACC.1: 16
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 16
    • FDP_IFF: 19
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC: 1
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP: 1
    • FDP_RIP.2.1: 1
    • FDP_UCT: 1
    • FDP_UCT.1.1: 1
    • FDP_UIT: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_UAU.2: 7
    • FIA_UID.2: 7
    • FIA_AFL: 1
    • FIA_UAU.1: 2
    • FIA_AFL.1.2: 1
    • FIA_UAU: 1
    • FIA_UID.1: 4
    • FIA_UID: 1
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MSA.1: 16
    • FMT_MSA.2: 17
    • FMT_MSA.3: 18
    • FMT_MTD.1: 9
    • FMT_SMF.1: 17
    • FMT_SMR.1: 16
    • FMT_MOF: 1
    • FMT_MSA: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_SMF: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_ANO.1: 7
    • FPR_ANO: 1
    • FPR_ANO.1.1: 1
  • FPT:
    • FPT_AMT.1: 8
    • FPT_ITC.1: 7
    • FPT_ITI.1: 7
    • FPT_RPL.1: 7
    • FPT_RCV.1: 7
    • FPT_TST.1: 7
    • FPT_AMT: 1
    • FPT_AMT.1.1: 1
    • FPT_ITC: 1
    • FPT_ITC.1.1: 1
    • FPT_ITI: 1
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_RPL: 1
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_RCV: 1
    • FPT_RCV.1.1: 1
    • FPT_TST: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_TRP.1: 11
    • FTP_ITC.1: 4
    • FTP_TRP: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 15
  • FDP_ACF.1: 12
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 2
  • FDP_ACC: 1
  • FDP_ACF: 1
  • FDP_ACC.2: 3
  • FDP_ACF.1: 5
  • FDP_IFC.1: 15
  • FDP_IFF.1: 5
  • FDP_ITC.1: 15
  • FDP_RIP.2: 7
  • FDP_UCT.1: 6
  • FDP_UIT.1: 7
  • FDP_ITC.2: 8
  • FDP_ACC: 16
  • FDP_ACC.2.2: 2
  • FDP_ACF: 13
  • FDP_ACC.1: 16
  • FDP_ACF.1.1: 2
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 2
  • FDP_ACF.1.4: 2
  • FDP_IFC: 16
  • FDP_IFF: 19
  • FDP_IFF.1.1: 2
  • FDP_IFF.1.2: 2
  • FDP_IFF.1.3: 2
  • FDP_IFF.1.4: 2
  • FDP_IFF.1.5: 2
  • FDP_IFF.1.6: 2
  • FDP_ITC: 1
  • FDP_ITC.1.1: 1
  • FDP_ITC.1.2: 1
  • FDP_ITC.1.3: 1
  • FDP_RIP: 1
  • FDP_RIP.2.1: 1
  • FDP_UCT: 1
  • FDP_UCT.1.1: 1
  • FDP_UIT: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC 1 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 15 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF 1 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 12 5
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 15
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UAU.1: 11
  • FIA_UID.1: 11
  • FIA_SOS.1: 8
  • FIA_ATD.1: 10
  • FIA_USB.1: 7
  • FIA_AFL.1: 7
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_SOS.1.1: 1
  • FIA_ATD.1.1: 1
  • FIA_USB.1.1: 1
  • FIA_USB.1.2: 1
  • FIA_USB.1.3: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UID: 1
  • FIA_SOS: 1
  • FIA_USB: 1
  • FIA_AFL: 1
  • FIA_AFL.1: 7
  • FIA_UAU.2: 7
  • FIA_UID.2: 7
  • FIA_AFL: 1
  • FIA_UAU.1: 2
  • FIA_AFL.1.2: 1
  • FIA_UAU: 1
  • FIA_UID.1: 4
  • FIA_UID: 1
  • FIA_UID.2.1: 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 11 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 11 4
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.3: 9
  • FMT_MSA.1: 10
  • FMT_SMR.1: 13
  • FMT_SMF.1: 11
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1: 10
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA: 2
  • FMT_MTD: 1
  • FMT_SMF: 1
  • FMT_SMR: 1
  • FMT_MOF.1: 14
  • FMT_MSA.1: 16
  • FMT_MSA.2: 17
  • FMT_MSA.3: 18
  • FMT_MTD.1: 9
  • FMT_SMF.1: 17
  • FMT_SMR.1: 16
  • FMT_MOF: 1
  • FMT_MSA: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD: 1
  • FMT_SMF: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA 2 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 10 16
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 9 18
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 11 17
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 13 16
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • VPN:
    • VPN: 26
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • MD:
    • MD5:
      • MD5: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC2406: 1
    • RFC 3566: 2
    • RFC1700: 1
    • RFC1042: 1
    • RFC1112: 1
    • RFC1213: 1
    • RFC1157: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 28
  • DES:
    • DES:
      • DES: 5
    • 3DES:
      • 3DES: 10
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft Corporation: 4
    • Microsoft: 4
  • Thales:
    • Thales: 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 455862
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
  • /Title: Hitachi Command Suite Common Component ST
  • /Author: Hitachi, Ltd. Software Division
  • /Subject: HSCC-ST
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20110926112144
  • /ModDate: D:20110926112144
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 996398
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 79
  • /Producer: GPL Ghostscript 8.70
  • /CreationDate:
  • /ModDate:
  • /Title:
  • /Creator: PDFCreator Version 1.0.2
  • /Author:
  • /Keywords:
  • /Subject:
  • pdf_hyperlinks:
pdf_data/st_metadata//Author Hitachi, Ltd. Software Division
pdf_data/st_metadata//CreationDate D:20110926112144
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 PDFCreator Version 1.0.2
pdf_data/st_metadata//ModDate D:20110926112144
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 GPL Ghostscript 8.70
pdf_data/st_metadata//Subject HSCC-ST
pdf_data/st_metadata//Title Hitachi Command Suite Common Component ST
pdf_data/st_metadata/pdf_file_size_bytes 455862 996398
pdf_data/st_metadata/pdf_number_of_pages 58 79
dgst 3d4662c844b7ac14 65f26f8bf773b2b3