name |
NetApp DataFort FC520 v2, LKM 2.5.1 |
TOSHIBAe-STUDIO4525AC/5525AC/6525ACall of the above with FAX Unit and FIPS Hard Disk KitSYS V1.0 |
category |
Data Protection |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
active |
not_valid_after |
20.07.2012 |
01.09.2027 |
not_valid_before |
01.04.2009 |
01.09.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0759_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0759_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0759_est.pdf |
manufacturer |
NetApp, Inc. |
Toshiba TEC Corporation |
manufacturer_web |
https://www.netapp.com/ |
https://www.toshibatec.co.jp/en/ |
security_level |
EAL4+, ALC_FLR.1 |
{} |
dgst |
436894360f619ed2 |
c918987cf08b9873 |
heuristics/cert_id |
CCEVS-VR-VID-10035-2009 |
JISEC-CC-CRP-C0759-01-2022 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 |
heuristics/extracted_versions |
2.5.1 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Sensitive Data Protection, System Access Control
- certification_date: 20.02.2009
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID10035
- product: NetApp DataFort FC520 v2, LKM 2.5.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10035
- vendor: NetApp, Inc.
|
- cert_id: JISEC-CC-CRP-C0759
- certification_date: 01.09.2022
- claim: PP(Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015)
- enhanced:
- assurance_level: ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1, ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0759
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000iyp-att/c0759_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan and fax. The TOE is capable of implementing the functionality required by the Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 defined as the Protection Profile for MFD. TOE security functionality The TOE provides the following security features: Identification and Authentication Function Access Control Function Data Encryption Trusted Communication Function TSF Data Protection TSF Self Protection Software Update Verification Audit Function Function which separate PSTN Fax and Network
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: TOSHIBA e-STUDIO4525AC/5525AC/6525AC all of the above with FAX Unit and FIPS Hard Disk Kit
- product_type: Multifunction Product
- protection_profile: Protection Profile for Hardcopy Devices 1.0 dated September 10, 2015 (Certification Identification: JISEC-C0553)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000iyp-att/c0759_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/snqio10000000iyp-att/c0759_est.pdf
- toe_version: SYS V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date:
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: TOSHIBA e-STUDIO4525AC / 5525AC / 6525AC all of the above with FAX Unit and FIPS Hard Disk KitSYS V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0759_it2808.html
- toe_overseas_name: TOSHIBA e-STUDIO4525AC / 5525AC / 6525AC all of the above with FAX Unit and FIPS Hard Disk KitSYS V1.0
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b2cfec7a92fa2940 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/c0553_pp.pdf |
pdf_data/cert_filename |
|
c0759_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- JP:
- JISEC-CC-CRP-C0759-01-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20221202092407+09'00'
- /Creator: Microsoft® Word 2019
- /ModDate: D:20221202092513+09'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 86336
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
st_vid10035-vr.pdf |
c0759_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10035-2009
- cert_item: NetApp Decru DataFort FC520v2, LKM 2.5.1
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10035-2009: 1
|
- JP:
- JISEC-CC-CRP-C0759-01-2022: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- AVA:
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG_ENV.1: 1
- FAU_STG_EXP.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.5: 1
- FCS_CKM_EXP.6: 1
- FCS_CKM_EXP.7: 1
- FCS_CKM_EXP.8: 1
- FCS_COP: 3
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FCS_COP_EXP.3: 1
- FCS_COP_EXP.4: 1
- FCS_COP_EXP.5: 1
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 2
- FIA:
- FIA_EAU_ENV.2: 1
- FIA_EAU_EXP.5: 1
- FIA_EID_ENV.2: 1
- FIA_EID_EXP.1: 1
- FIA_UAU_ENV.5: 1
- FIA_UAU_EXP.5: 1
- FIA_UID_ENV.2: 1
- FIA_UID_EXP.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_RCV.4: 1
- FPT_RVM_ENV.1: 1
- FPT_RVM_EXP.1: 1
- FPT_SEP_ENV.1: 1
- FPT_SEP_EXP.1: 1
- FPT_STM_ENV.1: 1
- FPT_STM_EXP.1: 1
- FTP:
- FTP_ITC_ENV.1: 1
- FTP_ITC_EXP.1: 2
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 4
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- constructions:
- MAC:
- HMAC: 1
- HMAC-SHA-256: 1
- HMAC-SHA-512: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-2: 14
|
- CC:
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: James E Brosey
- /CreationDate: D:20090326171341
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090326171341
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report
- pdf_file_size_bytes: 443011
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author:
- /CreationDate: D:20230404151259+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /Keywords:
- /ModDate: D:20230404160508+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /SourceModified: D:20230329235527
- /Subject:
- /Title:
- pdf_file_size_bytes: 1307924
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
pdf_data/st_filename |
st_vid10035-st.pdf |
c0759_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL4: 11
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.4: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 8
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 6
- ALC_FLR.1: 13
- ALC_LCD.1: 6
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 19
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG_ENV.1: 11
- FAU_STG_ENV.1.1: 1
- FAU_STG_ENV.1.2: 1
- FAU_STG_ENV.1.3: 1
- FAU_STG_ENV.1.4: 1
- FAU_STG_ENV.1.5: 1
- FAU_STG_ENV.1.6: 1
- FAU_STG_EXP.1: 12
- FAU_STG_EXP.1.1: 1
- FAU_STG_EXP.1.2: 1
- FCS:
- FCS_CKM: 41
- FCS_CKM.1: 3
- FCS_CKM.4: 33
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.5: 12
- FCS_CKM_EXP.5.1: 1
- FCS_CKM_EXP.6: 13
- FCS_CKM_EXP.6.1: 1
- FCS_CKM_EXP.7: 17
- FCS_CKM_EXP.7.1: 1
- FCS_CKM_EXP.7.2: 1
- FCS_CKM_EXP.8: 14
- FCS_CKM_EXP.8.1: 1
- FCS_CKM_EXP.8.2: 1
- FCS_COP: 51
- FCS_COP.1: 2
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 15
- FCS_COP_EXP.2.1: 1
- FCS_COP_EXP.3: 12
- FCS_COP_EXP.3.1: 1
- FCS_COP_EXP.4: 14
- FCS_COP_EXP.4.1: 1
- FCS_COP_EXP.4.2: 1
- FCS_COP_EXP.5: 16
- FCS_COP_EXP.5.1: 1
- FDP:
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 14
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_IFF.3: 2
- FDP_ITC: 1
- FIA:
- FIA_EAU_ENV.2: 7
- FIA_EAU_ENV.2.1: 1
- FIA_EAU_EXP.5: 14
- FIA_EAU_EXP.5.1: 1
- FIA_EAU_EXP.5.2: 1
- FIA_EID_ENV.2: 6
- FIA_EID_ENV.2.1: 1
- FIA_EID_ENV.2.2: 1
- FIA_EID_EXP.1: 8
- FIA_EID_EXP.1.1: 1
- FIA_EID_EXP.1.2: 1
- FIA_UAU: 1
- FIA_UAU_ENV.5: 7
- FIA_UAU_ENV.5.1: 1
- FIA_UAU_ENV.5.2: 1
- FIA_UAU_EXP.5: 15
- FIA_UAU_EXP.5.1: 1
- FIA_UAU_EXP.5.2: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID_ENV.2: 6
- FIA_UID_ENV.2.1: 1
- FIA_UID_EXP.2: 8
- FIA_UID_EXP.2.1: 1
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 34
- FMT_MSA.1.1: 1
- FMT_MSA.2: 25
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 19
- FMT_MTD.1.1: 1
- FMT_SMF.1: 36
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_RCV.4: 12
- FPT_RCV.4.1: 1
- FPT_RVM_ENV.1: 8
- FPT_RVM_ENV.1.1: 1
- FPT_RVM_EXP.1: 11
- FPT_RVM_EXP.1.1: 1
- FPT_RVM_EXP.1.2: 1
- FPT_RVM_EXP.1.3: 1
- FPT_SEP_ENV.1: 7
- FPT_SEP_ENV.1.1: 1
- FPT_SEP_EXP.1: 10
- FPT_SEP_EXP.1.1: 1
- FPT_SEP_EXP.1.2: 1
- FPT_SEP_EXP.1.3: 1
- FPT_SEP_EXP.1.4: 1
- FPT_STM.1: 1
- FPT_STM_ENV.1: 7
- FPT_STM_ENV.1.1: 1
- FPT_STM_EXP.1: 14
- FPT_STM_EXP.1.1: 1
- FTP:
- FTP_ITC_ENV.1: 8
- FTP_ITC_ENV.1.1: 1
- FTP_ITC_ENV.1.2: 1
- FTP_ITC_EXP.1: 12
- FTP_ITC_EXP.1.1: 1
- FTP_ITC_EXP.1.2: 1
- FTP_ITC_EXP.1.3: 1
|
- FAU:
- FAU_GEN: 14
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_STG_EXT: 3
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 2
- FCS:
- FCS_CKM.1: 43
- FCS_CKM.1.1: 2
- FCS_CKM.4: 13
- FCS_CKM.4.1: 2
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.4: 27
- FCS_CKM_EXT.4.1: 1
- FCS_COP.1: 127
- FCS_COP.1.1: 6
- FCS_ITC.1: 1
- FCS_KDF_EXT: 4
- FCS_KDF_EXT.1: 20
- FCS_KDF_EXT.1.1: 3
- FCS_KYC_EXT: 4
- FCS_KYC_EXT.1: 9
- FCS_KYC_EXT.1.1: 4
- FCS_PCC_EXT.1: 1
- FCS_RBG_EXT: 3
- FCS_RBG_EXT.1: 35
- FCS_RBG_EXT.1.1: 3
- FCS_RBG_EXT.1.2: 3
- FCS_RGB_EXT.1: 2
- FCS_SMC_EXT: 2
- FCS_SMC_EXT.1: 16
- FCS_SMC_EXT.1.1: 2
- FCS_SNI_EXT.1.1: 1
- FCS_SSH_EXT.1: 6
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1: 22
- FCS_TLS_EXT.1.1: 2
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_DSK_EXT: 2
- FDP_DSK_EXT.1: 8
- FDP_DSK_EXT.1.1: 2
- FDP_DSK_EXT.1.2: 2
- FDP_FXS_EXT: 2
- FDP_FXS_EXT.1: 8
- FDP_FXS_EXT.1.1: 2
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_PMG: 4
- FIA_PMG_EXT: 4
- FIA_PMG_EXT.1: 3
- FIA_PMG_EXT.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 5
- FIA_UAU.7.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 5
- FMT_MOF.1.1: 1
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 5
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_KYP_EXT: 2
- FPT_KYP_EXT.1: 4
- FPT_KYP_EXT.1.1: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 9
- FPT_SKP_EXT.1.1: 2
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 8
- FPT_TST_EXT.1.1: 2
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 11
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 3
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 19
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_ITC_EXT.1: 2
- FTP_TRP.1: 27
- FTP_TRP.1.1: 3
- FTP_TRP.1.2: 2
- FTP_TRP.1.3: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.TRAINED_USERS: 1
- A.TRUSTED_ADMIN: 1
- D:
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 6
- O.ADMIN_ROLES: 4
- O.AUDIT: 5
- O.COMMS_PROTECTION: 12
- O.FAX_NET_SEPARATION: 1
- O.KEY_MATERIAL: 1
- O.PURGE_DATA: 3
- O.STORAGE_ENCRYPTION: 8
- O.TSF_SELF_TEST: 1
- O.UPDATE_VERIFICATION: 2
- O.USER_AUTHORIZATION: 7
- OE:
- OE.ADMIN_TRAINING: 1
- OE.ADMIN_TRUST: 1
- OE.NETWORK_PROTECTION: 1
- OE.PHYSICAL_PROTECTION: 1
- OE.USER_TRAINING: 1
- T:
- T.NET_COMPROMISE: 1
- T.TSF_COMPROMISE: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTHORIZED_UPDATE: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 54
- AES-: 1
- AES-256: 4
- DES:
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 9
- HMAC-SHA-512: 3
|
- AES_competition:
- AES:
- AES: 18
- AES-: 1
- AES-256: 2
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 7
- SHA-384: 2
- SHA-512: 13
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 6
- Key agreement: 1
- KEX:
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 45
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- TLS1.2: 3
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 23
- FIPS 180-2: 2
- FIPS 186-2: 8
- FIPS 197: 7
- FIPS 198: 3
- FIPS 46-3: 5
- FIPS PUB 140-2: 1
- FIPS PUB 146-3: 1
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198: 1
- NIST:
- RFC:
- RFC 2104: 1
- RFC 2246: 3
- RFC 2404: 1
- RFC 2407: 1
- RFC 2408: 1
- RFC 2409: 2
- RFC 2411: 1
- RFC 2631: 1
- RFC 3602: 1
- RFC 4109: 1
- RFC 4301: 1
- RFC 4304: 1
- RFC 4305: 1
- RFC 4306: 1
- RFC 4346: 1
|
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-4: 2
- FIPS PUB 197: 1
- FIPS PUB 198-1: 2
- FIPS140-2: 1
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 10118: 4
- ISO/IEC 18031:2011: 6
- ISO/IEC 18033-3: 1
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 1
- NIST SP 800-38A: 2
- NIST SP 800-38D: 1
- NIST SP 800-56B: 1
- NIST SP 800-90A: 7
- NIST SP 800-90B: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 3
- RFC 4346: 1
- RFC 5246: 3
- RFC2818: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: TOSHIBA TEC
- /CreationDate: D:20230403180710+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /Keywords: HCD-PP
- /ModDate: D:20230403180710+09'00'
- /Producer: iText® Core 7.2.3 (AGPL version) ©2000-2022 iText Group NV
- /Subject: セキュリティーターゲット
- /Title: TOSHIBA e-STUDIO4525AC/5525AC/6525AC all of the above with FAX Unit and FIPS Hard Disk Kit Security Target
- pdf_file_size_bytes: 1290323
- pdf_hyperlinks: https://www.rambus.com/intel-ivy-bridge-random-number-generator/
- pdf_is_encrypted: True
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |