name |
NetApp DataFort FC520 v2, LKM 2.5.1 |
Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A) |
category |
Data Protection |
Access Control Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
20.07.2012 |
03.10.2016 |
not_valid_before |
01.04.2009 |
30.09.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10035-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_est.pdf |
manufacturer |
NetApp, Inc. |
Hitachi, Ltd. |
manufacturer_web |
https://www.netapp.com/ |
https://www.hitachi.com/ |
security_level |
EAL4+, ALC_FLR.1 |
EAL2 |
dgst |
436894360f619ed2 |
eecf16a3a9948989 |
heuristics/cert_id |
CCEVS-VR-VID-10035-2009 |
JISEC-CC-CRP-C0315 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
2.5.1 |
02, 70, 05, 00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Sensitive Data Protection, System Access Control
- certification_date: 20.02.2009
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID10035
- product: NetApp DataFort FC520 v2, LKM 2.5.1
- scheme: US
- url: https://www.niap-ccevs.org/product/10035
- vendor: NetApp, Inc.
|
- cert_id: JISEC-CC-CRP-C0315
- certification_date: 01.09.2011
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
- toe_version: 70-02-05-00/00(R7-02-06A)
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2016
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html
- toe_japan_name: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A)
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10035-vr.pdf |
c0315_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10035-2009
- cert_item: NetApp Decru DataFort FC520v2, LKM 2.5.1
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10035-2009: 1
|
- JP:
- CRP-C0315-01: 1
- Certification No. C0315: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ALC:
- ALC_DVS.1: 1
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_STG_ENV.1: 1
- FAU_STG_EXP.1: 1
- FCS:
- FCS_CKM: 3
- FCS_CKM.4: 1
- FCS_CKM_EXP.5: 1
- FCS_CKM_EXP.6: 1
- FCS_CKM_EXP.7: 1
- FCS_CKM_EXP.8: 1
- FCS_COP: 3
- FCS_COP_EXP.1: 1
- FCS_COP_EXP.2: 1
- FCS_COP_EXP.3: 1
- FCS_COP_EXP.4: 1
- FCS_COP_EXP.5: 1
- FDP:
- FDP_IFC.1: 1
- FDP_IFF.1: 2
- FIA:
- FIA_EAU_ENV.2: 1
- FIA_EAU_EXP.5: 1
- FIA_EID_ENV.2: 1
- FIA_EID_EXP.1: 1
- FIA_UAU_ENV.5: 1
- FIA_UAU_EXP.5: 1
- FIA_UID_ENV.2: 1
- FIA_UID_EXP.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_MTD.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_RCV.4: 1
- FPT_RVM_ENV.1: 1
- FPT_RVM_EXP.1: 1
- FPT_SEP_ENV.1: 1
- FPT_SEP_EXP.1: 1
- FPT_STM_ENV.1: 1
- FPT_STM_EXP.1: 1
- FTP:
- FTP_ITC_ENV.1: 1
- FTP_ITC_EXP.1: 2
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 2
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.NOEVIL_MNT: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.ILLEGAL_XCNTL: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 140: 3
- FIPS 140-2: 14
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: James E Brosey
- /CreationDate: D:20090326171341
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090326171341
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report
- pdf_file_size_bytes: 443011
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /CreationDate: D:20111222113805+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20111222113848+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 474751
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
pdf_data/st_filename |
st_vid10035-st.pdf |
c0315_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 1
- EAL4: 11
- EAL4 augmented: 2
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 3
- ACM_CAP.4: 2
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 2
- ADV_IMP.1: 2
- ADV_LLD.1: 2
- ADV_RCR.1: 2
- ADV_SPM.1: 8
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 6
- ALC_FLR.1: 13
- ALC_LCD.1: 6
- ALC_TAT.1: 6
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU: 1
- AVA_MSU.2: 2
- AVA_SOF.1: 2
- AVA_VLA.2: 3
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 19
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG_ENV.1: 11
- FAU_STG_ENV.1.1: 1
- FAU_STG_ENV.1.2: 1
- FAU_STG_ENV.1.3: 1
- FAU_STG_ENV.1.4: 1
- FAU_STG_ENV.1.5: 1
- FAU_STG_ENV.1.6: 1
- FAU_STG_EXP.1: 12
- FAU_STG_EXP.1.1: 1
- FAU_STG_EXP.1.2: 1
- FCS:
- FCS_CKM: 41
- FCS_CKM.1: 3
- FCS_CKM.4: 33
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 1
- FCS_CKM_EXP.5: 12
- FCS_CKM_EXP.5.1: 1
- FCS_CKM_EXP.6: 13
- FCS_CKM_EXP.6.1: 1
- FCS_CKM_EXP.7: 17
- FCS_CKM_EXP.7.1: 1
- FCS_CKM_EXP.7.2: 1
- FCS_CKM_EXP.8: 14
- FCS_CKM_EXP.8.1: 1
- FCS_CKM_EXP.8.2: 1
- FCS_COP: 51
- FCS_COP.1: 2
- FCS_COP_EXP.1: 16
- FCS_COP_EXP.1.1: 1
- FCS_COP_EXP.2: 15
- FCS_COP_EXP.2.1: 1
- FCS_COP_EXP.3: 12
- FCS_COP_EXP.3.1: 1
- FCS_COP_EXP.4: 14
- FCS_COP_EXP.4.1: 1
- FCS_COP_EXP.4.2: 1
- FCS_COP_EXP.5: 16
- FCS_COP_EXP.5.1: 1
- FDP:
- FDP_IFC.1: 17
- FDP_IFC.1.1: 1
- FDP_IFF.1: 14
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_IFF.1.6: 1
- FDP_IFF.3: 2
- FDP_ITC: 1
- FIA:
- FIA_EAU_ENV.2: 7
- FIA_EAU_ENV.2.1: 1
- FIA_EAU_EXP.5: 14
- FIA_EAU_EXP.5.1: 1
- FIA_EAU_EXP.5.2: 1
- FIA_EID_ENV.2: 6
- FIA_EID_ENV.2.1: 1
- FIA_EID_ENV.2.2: 1
- FIA_EID_EXP.1: 8
- FIA_EID_EXP.1.1: 1
- FIA_EID_EXP.1.2: 1
- FIA_UAU: 1
- FIA_UAU_ENV.5: 7
- FIA_UAU_ENV.5.1: 1
- FIA_UAU_ENV.5.2: 1
- FIA_UAU_EXP.5: 15
- FIA_UAU_EXP.5.1: 1
- FIA_UAU_EXP.5.2: 1
- FIA_UID: 1
- FIA_UID.1: 2
- FIA_UID_ENV.2: 6
- FIA_UID_ENV.2.1: 1
- FIA_UID_EXP.2: 8
- FIA_UID_EXP.2.1: 1
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 34
- FMT_MSA.1.1: 1
- FMT_MSA.2: 25
- FMT_MSA.2.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 19
- FMT_MTD.1.1: 1
- FMT_SMF.1: 36
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_RCV.4: 12
- FPT_RCV.4.1: 1
- FPT_RVM_ENV.1: 8
- FPT_RVM_ENV.1.1: 1
- FPT_RVM_EXP.1: 11
- FPT_RVM_EXP.1.1: 1
- FPT_RVM_EXP.1.2: 1
- FPT_RVM_EXP.1.3: 1
- FPT_SEP_ENV.1: 7
- FPT_SEP_ENV.1.1: 1
- FPT_SEP_EXP.1: 10
- FPT_SEP_EXP.1.1: 1
- FPT_SEP_EXP.1.2: 1
- FPT_SEP_EXP.1.3: 1
- FPT_SEP_EXP.1.4: 1
- FPT_STM.1: 1
- FPT_STM_ENV.1: 7
- FPT_STM_ENV.1.1: 1
- FPT_STM_EXP.1: 14
- FPT_STM_EXP.1.1: 1
- FTP:
- FTP_ITC_ENV.1: 8
- FTP_ITC_ENV.1.1: 1
- FTP_ITC_ENV.1.2: 1
- FTP_ITC_EXP.1: 12
- FTP_ITC_EXP.1.1: 1
- FTP_ITC_EXP.1.2: 1
- FTP_ITC_EXP.1.3: 1
|
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 11
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 16
- FIA_UID.2.1: 1
- FIA_USB: 18
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.NOEVIL_MNT: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 9
- O.ADM_ROLE: 5
- O.AUD_GEN: 8
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.HOST_AUTH: 5
- O.SEC_COMM: 8
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-SP_HBA: 3
- OE.HDD_ENC: 2
- OE.MANAGEMENT_PC: 3
- OE.MANAGE_SECRET: 2
- OE.NOEVIL: 2
- OE.NOEVIL-MNT: 1
- OE.NOEVIL_MNT: 1
- OE.PHYSICAL_SEC: 4
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.ILLEGAL_XCNTL: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 54
- AES-: 1
- AES-256: 4
- DES:
- constructions:
- MAC:
- HMAC: 13
- HMAC-SHA-256: 9
- HMAC-SHA-512: 3
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 6
- Key agreement: 1
- KEX:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 23
- FIPS 180-2: 2
- FIPS 186-2: 8
- FIPS 197: 7
- FIPS 198: 3
- FIPS 46-3: 5
- FIPS PUB 140-2: 1
- FIPS PUB 146-3: 1
- FIPS PUB 180-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
- FIPS PUB 198: 1
- NIST:
- RFC:
- RFC 2104: 1
- RFC 2246: 3
- RFC 2404: 1
- RFC 2407: 1
- RFC 2408: 1
- RFC 2409: 2
- RFC 2411: 1
- RFC 2631: 1
- RFC 3602: 1
- RFC 4109: 1
- RFC 4301: 1
- RFC 4304: 1
- RFC 4305: 1
- RFC 4306: 1
- RFC 4346: 1
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20111221190410
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20111221190410
- /Producer: Microsoft® Office Word 2007
- /Subject: CC EAL2 Security Target
- /Title: VSP ST
- pdf_file_size_bytes: 1094064
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |