name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) |
Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830 |
category |
Access Control Devices and Systems |
Mobility |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
06.06.2021 |
27.08.2017 |
not_valid_before |
06.06.2016 |
27.08.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10635-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10635-st.pdf |
manufacturer |
Hitachi, Ltd. |
Microsoft Corporation |
manufacturer_web |
https://www.hitachi.com/ |
https://www.microsoft.com |
security_level |
EAL2+, ALC_FLR.1 |
{} |
dgst |
4b794daffbae517d |
29b9078253975817 |
heuristics/cert_id |
JISEC-CC-CRP-C0514 |
CCEVS-VR-10635-2015 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, ASE_REQ.1, AGD_OPE.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
25, 01, 80, 00 |
8.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0514
- certification_date: 01.06.2016
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
- toe_version: 80-01-25-00/00(R8-01A-06_Z)
- vendor: Hitachi, Ltd.
- expiration_date: 01.07.2021
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
- toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
|
- category: Mobility
- certification_date: 27.08.2015
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 27.08.2017
- id: CCEVS-VR-VID10635
- product: Windows 8.1 with Surface 3 and Windows Phone 8.1 with Lumia 635 and Lumia 830
- scheme: US
- url: https://www.niap-ccevs.org/product/10635
- vendor: Microsoft Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
7a7b216fc3e5f2ae |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MD_v1.1.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0514_erpt.pdf |
st_vid10635-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-10635-2015
- cert_item: for Microsoft Windows 8.1 and Microsoft Windows Phone 8.1
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0514-01: 1
- Certification No. C0514: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 1
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 1
- A.MAINTENCE_PC: 1
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
|
pdf_data/report_keywords/vendor |
|
- Microsoft:
- Microsoft: 104
- Microsoft Corporation: 1
- Qualcomm:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- SSH:
- TLS:
- VPN:
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20160906162354+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160906162432+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 473024
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
- /CreationDate: D:20150901130004-04'00'
- /ModDate: D:20150901130004-04'00'
- pdf_file_size_bytes: 404210
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
c0514_est.pdf |
st_vid10635-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_TSU_EXT: 1
- ALC_TSU_EXT.1: 7
- ASE:
- ASE_CCL: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 18
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 18
- FIA_UID.2.1: 1
- FIA_USB: 19
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 42
- FCS_CKM.1.1: 3
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM_EXT: 5
- FCS_CKM_EXT.1: 7
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 18
- FCS_CKM_EXT.2.1: 2
- FCS_CKM_EXT.3: 10
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 11
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 7
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 6
- FCS_CKM_EXT.6.1: 1
- FCS_COP: 1
- FCS_COP.1: 59
- FCS_COP.1.1: 8
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 18
- FCS_RBG_EXT.1.1: 2
- FCS_RBG_EXT.1.2: 3
- FCS_RBG_EXT.1.3: 2
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 6
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 8
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 2
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 13
- FCS_STG_EXT.2.1: 1
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 8
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLS_EXT.1: 7
- FCS_TLS_EXT.1.1: 1
- FCS_TLS_EXT.1.2: 1
- FCS_TLS_EXT.2: 8
- FCS_TLS_EXT.2.1: 1
- FCS_TLS_EXT.2.2: 1
- FDP:
- FDP_ACF_EXT: 1
- FDP_ACF_EXT.1: 6
- FDP_ACF_EXT.1.1: 1
- FDP_DAR_EXT: 1
- FDP_DAR_EXT.1: 16
- FDP_DAR_EXT.1.1: 2
- FDP_DAR_EXT.1.2: 2
- FDP_DAR_EXT.2: 6
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC.1.1: 1
- FDP_ITC_EXT.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 7
- FDP_STG_EXT.1.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 6
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_BLT_EXT: 1
- FIA_BLT_EXT.1: 6
- FIA_BLT_EXT.1.1: 1
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 6
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 6
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 6
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 3
- FIA_UAU_EXT.1: 7
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 8
- FIA_UAU_EXT.2.1: 1
- FIA_UAU_EXT.2.2: 1
- FIA_UAU_EXT.3: 6
- FIA_UAU_EXT.3.1: 1
- FMT:
- FMT_MOF.1: 32
- FMT_MOF.1.1: 3
- FMT_SMF: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 2
- FMT_SMF_EXT: 1
- FMT_SMF_EXT.1: 7
- FMT_SMF_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 6
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 3
- FPT_AEX_EXT.1.4: 1
- FPT_AEX_EXT.2: 6
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.2.2: 2
- FPT_AEX_EXT.3: 6
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 6
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_ITC_EXT: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 8
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 6
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 6
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 6
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 6
- FPT_STM.1.1: 1
- FPT_TST_EXT: 2
- FPT_TST_EXT.1: 6
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 6
- FPT_TST_EXT.2.1: 1
- FPT_TST_EXT.2.2: 1
- FPT_TUD_EXT: 2
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 2
- FPT_TUD_EXT.1.2: 2
- FPT_TUD_EXT.1.3: 2
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.2: 6
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.2.4: 1
- FPT_TUD_EXT.2.5: 3
- FPT_TUD_EXT.2.6: 2
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 6
- FTA_SSL_EXT.1.1: 1
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 6
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_ITC_EXT.1: 6
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MAINTENANCE_PC: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 8
- O.ADM_ROLE: 5
- O.AUD_GEN: 7
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.SEC_COMM: 8
- O.SWITCH_AUTH: 6
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-: 1
- OE.FC-SP_HBA: 2
- OE.HDD_ENC: 2
- OE.MAINTENANCE_PC: 3
- OE.MANAGEMENT_PC: 2
- OE.MANAGE_SECRET: 3
- OE.NOEVIL: 2
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.PRECAUTION: 1
- O:
- O.AUTH: 1
- O.COMMS: 1
- O.CONFIG: 1
- O.INTEGRITY: 1
- O.STORAGE: 1
- OE:
- OE.CONFIG: 1
- OE.NOTIFY: 1
- OE.PRECAUTION: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 1
- T.NETWORK: 1
- T.PERSISTENT: 1
- T.PHYSICAL: 1
|
pdf_data/st_keywords/vendor |
|
- Cisco:
- Microsoft:
- Microsoft: 192
- Microsoft Corporation: 5
- Qualcomm:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 39
- AES-: 2
- AES-128: 6
- AES-256: 5
- AES256: 1
- RC:
- DES:
- constructions:
- MAC:
- CMAC: 1
- HMAC: 23
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 3
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 8
- DHE: 2
- Diffie-Hellman: 10
- DSA:
- RSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-256: 6
- SHA-384: 6
- SHA-512: 7
- SHA256: 3
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- KA: 16
- Key Agreement: 10
- Key agreement: 1
- KEX:
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IPsec:
- TLS:
- SSL:
- TLS:
- TLS: 71
- TLS 1.0: 7
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 20
- P-284: 6
- P-384: 8
- P-521: 14
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
- RFC:
|
- FIPS:
- FIPS 140: 4
- FIPS 140-1: 2
- FIPS 140-2: 6
- FIPS 180-3: 1
- FIPS 186-4: 12
- FIPS 197: 2
- FIPS 198-1: 1
- FIPS 198-2: 1
- FIPS PUB 186-4: 5
- FIPS PUB 197: 1
- NIST:
- NIST SP 800-108: 1
- NIST SP 800-132: 2
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38F: 5
- NIST SP 800-56A: 3
- NIST SP 800-56B: 2
- NIST SP 800-57: 1
- NIST SP 800-90: 1
- SP 800-108: 3
- SP 800-132: 1
- SP 800-56A: 3
- SP 800-90: 2
- RFC:
- RFC 2246: 4
- RFC 2396: 1
- RFC 2560: 1
- RFC 2818: 2
- RFC 2986: 2
- RFC 3268: 1
- RFC 3546: 2
- RFC 4301: 1
- RFC 4306: 1
- RFC 4346: 1
- RFC 4366: 1
- RFC 4492: 1
- RFC 4681: 1
- RFC 5216: 1
- RFC 5246: 8
- RFC 5280: 4
- RFC 5289: 5
- RFC 5759: 1
- RFC 6460: 4
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this security target. T.FLAWAPP Malicious or Flawed Application: Applications loaded onto the: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: 八木
- /CreationDate: D:20160901154400+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160901154400+09'00'
- /Producer: Microsoft® Word 2010
- /Subject: CC EAL2 Security Target
- /Title: USP_V ST
- pdf_file_size_bytes: 1477873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /CreationDate: D:20150901130146-04'00'
- /ModDate: D:20150901130146-04'00'
- pdf_file_size_bytes: 2065878
- pdf_hyperlinks: http://www.ietf.org/rfc/rfc4346.txt, http://www.ietf.org/rfc/rfc4306.txt, mailto:[email protected], http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.humaninterfacedevice.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspxn, http://msdn.microsoft.com/en-us/library/windows/apps/dn298272.aspx, http://www.ietf.org/rfc/rfc3268.txt, http://support.microsoft.com/kb/816042#method2, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.dataprotection.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.certificates.certificateenrollmentmanager.importpfxdataasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.asymmetrickeyalgorithmprovider.createkeypair.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.hashalgorithmprovider.hashdata.aspx, http://www.ietf.org/rfc/rfc4681.txt, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signhasheddataasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.decrypt.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.hashalgorithmprovider.createhash.aspx, http://www.wi-fi.org/content/search-page?keys=Lumia%20635, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.encrypt.aspx, http://www.ietf.org/rfc/rfc4492.txt, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.sign.aspx, http://creativecommons.org/licenses/by-nd-nc/1.0/, http://msdn.microsoft.com/en-us/library/windows/hardware/ff556022(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/dn298266.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signasync.aspx, http://technet.microsoft.com/en-us/library/cc773013(v=WS.10).aspx, https://www.niap-ccevs.org/pp/pp_swfde_v1.1.pdf, http://www.trustedcomputinggroup.org/files/static_page_files/0328C641-1A4B-B294-D0D3151FB2B30179/TCG_PP_PC_client_specific_TPM_SecV2_v10_PublicReview.pdf, http://technet.microsoft.com/en-us/library/cc783349(v=WS.10).aspx, https://www.niap-ccevs.org/st/st_vid10540-st.pdf, https://www.niap-ccevs.org/st/st_vid10540-vr.pdf, http://tools.ietf.org/html/rfc5280, https://www.wi-fi.org/product-finder-results?keywords=19950, http://www.ietf.org/rfc/rfc2246.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.bluetooth.rfcomm.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.verifysignaturewithhashinput.aspx, http://www.ietf.org/rfc/rfc3546.txt, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.signhasheddata.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.cryptographicbuffer.generaterandomnumber.aspx, https://www.niap-ccevs.org/st/st_vid10520-st.pdf, http://msdn.microsoft.com/en-us/library/windows/apps/windows.networking.vpn.aspx, https://tools.ietf.org/html/draft-ietf-tls-ssl-version3-00, http://msdn.microsoft.com/en-us/library/windows/desktop/aa374757(v=vs.85).aspx), http://www.wi-fi.org/content/search-page?keys=Lumia%20830, http://www.wi-fi.org/content/search-page?keys=WFA59150, http://www.microsoft.com/security/default.aspx, http://www.ietf.org/rfc/rfc5246.txt, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.core.asymmetrickeyalgorithmprovider.importkeypair.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.devices.usb.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.core.keyderivationparameters.buildforpbkdf2.aspx, http://msdn.microsoft.com/en-us/library/ms725473(v=vs.85).aspx, http://www.ietf.org/rfc/rfc4366.txt, http://msdn.microsoft.com/en-us/library/jj709814.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.core.cryptographicengine.verifysignature.aspx, http://www.ietf.org/rfc/rfc4301.txt, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm, http://msdn.microsoft.com/en-us/library/ms724962(v=vs.85).aspx, http://msdn.microsoft.com/en-us/library/windows/apps/dn279161.aspx, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0464f/index.html, http://msdn.microsoft.com/en-us/library/windows/apps/xaml/windows.security.cryptography.cryptographicbuffer.generaterandom.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.security.cryptography.certificates.certificate.buildchainasync.aspx, http://msdn.microsoft.com/en-us/library/windows/apps/windows.web.http.httpclient.aspx, http://csrc.nist.gov/publications/nistpubs/800-56B/sp800-56B.pdf, http://msdn.microsoft.com/en-us/library/windows/desktop/aa376545(v=vs.85).aspx, http://technet.microsoft.com/en-us/library/cc733982(v=WS.10).aspx, http://msdn.microsoft.com/en-us/library/aa375458(v=VS.85).aspx, http://www.ietf.org/rfc/rfc5289.txt, http://csrc.nist.gov/publications/nistpubs/800-56A/SP800-56A_Revision1_Mar08-2007.pdf, http://www.ietf.org/rfc/rfc2409.txt
- pdf_is_encrypted: False
- pdf_number_of_pages: 156
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |