Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CISCO IOS/IPSec release 12.3(6a)
Certificate Number: 2006/38
Hitachi Command Suite Common Component Version: 7.0.1-00
JISEC-CC-CRP-C0303
name CISCO IOS/IPSec release 12.3(6a) Hitachi Command Suite Common Component Version: 7.0.1-00
category Network and Network-Related Devices and Systems Access Control Devices and Systems
scheme AU JP
not_valid_after 13.07.2017 01.09.2016
not_valid_before 29.09.2006 15.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFC-T0052%20CR_1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/IOSIPSec12.3.6a_ST_4.8.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
manufacturer Cisco Systems, Inc. Hitachi, Ltd.
manufacturer_web https://www.cisco.com https://www.hitachi.com/
security_level EAL4 EAL2+, ALC_FLR.1
dgst 45f443442057dd62 3d4662c844b7ac14
heuristics/cert_id Certificate Number: 2006/38 JISEC-CC-CRP-C0303
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 12.3 7.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0303
  • certification_date: 01.08.2011
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Command Suite Common Component
    • product_type: Foundational Module Software
    • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
    • toe_version: 7.0.1-00
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.09.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
  • toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
  • toe_overseas_link: None
  • toe_overseas_name: -----
maintenance_updates
pdf_data/report_filename EFC-T0052 CR_1.0.pdf c0303_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certificate Number: 2006/38: 1
  • JP:
    • CRP-C0303-01: 1
    • Certification No. C0303: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 22
    • EAL4: 6
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
    • A.VERSION: 1
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.UNAUTHORISED_ACCESS: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 30
    • Cisco Systems: 8
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 3
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 6
  • VPN:
    • VPN: 2
  • SSH:
    • SSH: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /Author: chris clacher
  • /CreationDate: D:20061003103004+10'00'
  • /Creator: Acrobat PDFMaker 5.0 for Word
  • /ModDate: D:20061003103023+10'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Subject: Certificate Number: 2006/38
  • /Title: Certification Report
  • pdf_file_size_bytes: 317403
  • pdf_hyperlinks: http://www.cisco.com/, http://www.dsd.gov.au/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110928100804+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110928100931+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 345195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename IOSIPSec12.3.6a_ST_4.8.pdf c0303_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL4: 4
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 3
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 5
    • ADV_HLD.2: 2
    • ADV_IMP.1: 3
    • ADV_LLD.1: 2
    • ADV_RCR.1: 5
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 3
    • ALC_LCD.1: 2
    • ALC_TAT.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 3
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 3
    • AVA_SOF.1: 2
    • AVA_VLA.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_AUD: 7
    • FAU_AUD.1: 16
    • FAU_AUD.1.2: 1
    • FAU_GEN.1: 14
    • FAU_SAR.1: 14
    • FAU_SAR.1.2: 1
  • FCO:
    • FCO_NRO.2: 11
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_IFC.1: 20
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 17
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AUD.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID: 1
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 16
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR: 6
    • FMT_SMR.2: 9
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
    • FMT_SMR.3: 7
    • FMT_SMR.3.1: 1
  • FPT:
    • FPT_AMT.1: 14
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NOEVIL: 1
    • A.PHYSEC: 1
    • A.SECURETIMESOURCE: 1
    • A.TRAINING: 1
    • A.TRUSTED-CA: 1
  • O:
    • O.AUTHENTICITY: 1
    • O.CONFIDENTIALITY: 1
    • O.INTEGRITY: 1
    • O.KEY-CONFIDENTIALITY: 1
    • O.NOREPLAY: 1
    • O.SECURE-OPERATION: 1
  • T:
    • T.ATTACK: 1
    • T.UNTRUSTED-PATH: 1
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.CLIENTS: 4
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 3
    • A.VERSION: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 4
    • OE.PASSWORD: 4
    • OE.SECURE_CHANNEL: 4
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 10
    • Cisco Systems: 3
    • Cisco Systems, Inc: 2
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 4
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 4
    • DES:
      • DES: 9
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 6
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 6
  • SHA:
    • SHA1:
      • SHA-1: 5
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 30
  • VPN:
    • VPN: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 46-3: 2
  • PKCS:
    • PKCS #1: 1
    • PKCS #3: 1
  • RFC:
    • RFC 2403: 1
    • RFC 2404: 1
pdf_data/st_metadata
  • /CreationDate: D:20060929182057+10'00'
  • /Creator: AdobePS5.dll Version 5.2
  • /ModDate: D:20060929182057+10'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - ST_4.8_for EPL.doc
  • pdf_file_size_bytes: 668718
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 48
  • /Author: Hitachi, Ltd. Software Division
  • /CreationDate: D:20110926112144
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110926112144
  • /Producer: Microsoft® Office Word 2007
  • /Subject: HSCC-ST
  • /Title: Hitachi Command Suite Common Component ST
  • pdf_file_size_bytes: 455862
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different