Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
JISEC-CC-CRP-C0514
SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
JISEC-CC-CRP-C0102
name Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
not_valid_before 2016-06-06 2007-06-27
not_valid_after 2021-06-06 2013-10-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf
security_level ALC_FLR.1, EAL2+ EAL2
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf
state/report/pdf_hash 93a52189ac3baf26ac00310474d1b238aa438951331d1f5b6f10ceb65c03d5a7 2e60ea5270fbc0f11c2112143832445e6142b856f0a0892f3ab31b05cfe3884a
state/report/txt_hash 3af7b5bf795117fd27bedb5264d03826302b23ac65df033e4afdf09040e1fcd0 9ad5433a32d590aac96300931d64097f1b55f8e70fd739f8c5e99d49e13e407c
state/st/pdf_hash d4924797a53b58c23d0fce46516f98abc901c012f6caca39f69cc5a41200ba41 30bcb2eaa6f18b4fe7c9926057263a785d8c053585dc6ee05d495c733c9af099
state/st/txt_hash 8f4a9a82c5a3b00ee7ff8044c894a6a53acc5759c4f381948ab6ab714960598a b52cd8c677fe4c51cf6d131f8b55862970d9b7f0953c265a60a45887d1a5b538
heuristics/cert_id JISEC-CC-CRP-C0514 JISEC-CC-CRP-C0102
heuristics/scheme_data/cert_id C0514 C0102
heuristics/scheme_data/certification_date 2016-06 2007-06
heuristics/scheme_data/claim EAL2+ALC_FLR.1 EAL2
heuristics/scheme_data/enhanced
  • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
  • toe_version: 80-01-25-00/00(R8-01A-06_Z)
  • product_type: Control Program for storage system
  • certification_date: 2016-06-06
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.1
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
  • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
  • product: SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
  • toe_version: 50-04-34-00/00
  • product_type: IT Product (Storage Control Software)
  • certification_date: 2007-06-27
  • cc_version: 2.1
  • assurance_level: EAL2
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0102_erpt.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0102_est.pdf
  • description: PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
heuristics/scheme_data/enhanced/assurance_level EAL2 Augmented with ALC_FLR.1 EAL2
heuristics/scheme_data/enhanced/cc_version 3.1 Release4 2.1
heuristics/scheme_data/enhanced/certification_date 2016-06-06 2007-06-27
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
heuristics/scheme_data/enhanced/evaluation_facility Mizuho Information & Research Institute, Inc. Information Security Evaluation Office Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
heuristics/scheme_data/enhanced/product_type Control Program for storage system IT Product (Storage Control Software)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0514_erpt.pdf https://www.ipa.go.jp/en/security/c0102_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0514_est.pdf https://www.ipa.go.jp/en/security/c0102_est.pdf
heuristics/scheme_data/enhanced/toe_version 80-01-25-00/00(R8-01A-06_Z) 50-04-34-00/00
heuristics/scheme_data/expiration_date 2021-07 2013-10
heuristics/scheme_data/toe_japan_name Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
heuristics/scheme_data/toe_overseas_link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
heuristics/scheme_data/toe_overseas_name Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z) TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
pdf_data/report_filename c0514_erpt.pdf c0102_erpt.pdf
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0514-01: 1
  • Certification No. C0514: 1
  • CRP-C0102-01: 1
  • Certification No. C0102: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.TSF_COMP: 1
    • T.LP_LEAK: 1
    • T.CHG_CONFIG: 1
    • T.HDD_THEFT: 1
    • T.HDD_REUSE: 1
  • A:
    • A.NOEVIL: 1
    • A.PHYSICAL_SEC: 1
    • A.MANAGE_SECRET: 1
    • A.MANAGEMENT_PC: 1
    • A.MAINTENCE_PC: 1
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 4
  • EAL2 augmented: 3
  • EAL2: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL2 4 3
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
    • CCIMB-99-031: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCIMB-99-032: 2
  • CCIMB-99-033: 2
  • CCIMB-99-031: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 473024
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /CreationDate: D:20160906162354+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160906162432+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 104544
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /ModDate: D:20070918163642+09'00'
  • /CreationDate: D:20070918163642+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20160906162354+09'00' D:20070918163642+09'00'
pdf_data/report_metadata//ModDate D:20160906162432+09'00' D:20070918163642+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 6.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 473024 104544
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 41 20
pdf_data/st_filename c0514_est.pdf c0102_est.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 512: 1
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.ADM_AUTH: 8
    • O.ADM_ROLE: 5
    • O.SEC_COMM: 8
    • O.SWITCH_AUTH: 6
    • O.HOST_ACCESS: 8
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.AUD_GEN: 7
    • O.HDD_: 2
  • T:
    • T.TSF_COMP: 3
    • T.LP_LEAK: 3
    • T.CHG_CONFIG: 3
    • T.HDD_THEFT: 3
    • T.HDD_REUSE: 3
  • A:
    • A.NOEVIL: 3
    • A.PHYSICAL_SEC: 3
    • A.MANAGE_SECRET: 3
    • A.MANAGEMENT_PC: 3
    • A.MAINTENANCE_PC: 3
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
  • OE:
    • OE.NOEVIL: 2
    • OE.PHYSICAL_SEC: 3
    • OE.MANAGE_SECRET: 3
    • OE.MANAGEMENT_PC: 2
    • OE.MAINTENANCE_PC: 3
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-SP_HBA: 2
    • OE.HDD_ENC: 2
    • OE.FC-: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 4
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_SPM.1: 4
    • ADV_FSP.1: 2
    • ADV_HLD.1: 3
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_SPM.1: 4
  • ADV_FSP.1: 2
  • ADV_HLD.1: 3
  • ADV_RCR.1: 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_ADM.1: 3
  • AGD_USR.1: 3
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 2
  • AVA_VLA.1: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL 2: 1
  • EAL2: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 3 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_SAR.1: 9
    • FAU_STG.1: 12
    • FAU_STG.3: 10
    • FAU_STG.4: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.4: 11
    • FCS_CKM.2: 1
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACF.1: 13
    • FDP_RIP.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_ATD: 19
    • FIA_SOS: 20
    • FIA_UAU.2: 18
    • FIA_UID.2: 18
    • FIA_USB: 19
    • FIA_UID.1: 6
    • FIA_UAU.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_SOS.1: 2
    • FIA_UAU: 1
    • FIA_UID: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MSA.1: 12
    • FMT_MSA.3: 13
    • FMT_MTD.1: 15
    • FMT_MTD.3: 10
    • FMT_SMF.1: 15
    • FMT_SMR.1: 18
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
    • FPT_STM: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_TRP.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_UID.1: 4
    • FIA_UID.2: 13
  • FMT:
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1: 13
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 13
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SAE.1: 10
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
  • FPT:
    • FPT_RVM.1: 13
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 14
    • FPT_STM.1.1: 1
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 16
  • FDP_ACF.1: 13
  • FDP_RIP.1: 10
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 2
  • FDP_ACC.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1: 8
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 16 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 10
  • FIA_ATD: 19
  • FIA_SOS: 20
  • FIA_UAU.2: 18
  • FIA_UID.2: 18
  • FIA_USB: 19
  • FIA_UID.1: 6
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 6
  • FIA_SOS.1: 2
  • FIA_UAU: 1
  • FIA_UID: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 6
  • FIA_UID.1: 4
  • FIA_UID.2: 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 6 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 18 13
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 14
  • FMT_MSA.1: 12
  • FMT_MSA.3: 13
  • FMT_MTD.1: 15
  • FMT_MTD.3: 10
  • FMT_SMF.1: 15
  • FMT_SMR.1: 18
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_MTD.3.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1: 13
  • FMT_SMR.1: 14
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 13
  • FMT_MSA.2: 11
  • FMT_MSA.2.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SAE.1: 10
  • FMT_SAE.1.1: 1
  • FMT_SAE.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 12 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 13 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 15 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 18 14
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 13
  • FPT_STM.1.1: 1
  • FPT_STM: 1
  • FPT_RVM.1: 13
  • FPT_RVM.1.1: 1
  • FPT_STM.1: 14
  • FPT_STM.1.1: 1
  • FPT_SEP.1: 12
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 13 14
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
    • TLS:
      • TLSv1.0: 2
      • TLS: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • RFC:
    • RFC2865: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
  • CCIMB-99-031: 1
  • CCIMB-99-032: 1
  • CCIMB-99-033: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/vendor/Microsoft
  • Microsoft: 2
  • Microsoft: 1
  • Microsoft Corporation: 1
pdf_data/st_keywords/vendor/Microsoft/Microsoft 2 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1477873
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /Title: USP_V ST
  • /Author: 八木
  • /Subject: CC EAL2 Security Target
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160901154400+09'00'
  • /ModDate: D:20160901154400+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 231671
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /CreationDate: D:20070918131359+09'00'
  • /Author: hiwa.sysdeptdm
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20070918131359+09'00'
  • /Title: Microsoft Word - User Data Protection Security Target_Eng.doc
  • pdf_hyperlinks:
pdf_data/st_metadata//Author 八木 hiwa.sysdeptdm
pdf_data/st_metadata//CreationDate D:20160901154400+09'00' D:20070918131359+09'00'
pdf_data/st_metadata//Creator Microsoft® Word 2010 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20160901154400+09'00' D:20070918131359+09'00'
pdf_data/st_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title USP_V ST Microsoft Word - User Data Protection Security Target_Eng.doc
pdf_data/st_metadata/pdf_file_size_bytes 1477873 231671
pdf_data/st_metadata/pdf_number_of_pages 78 57
dgst 4b794daffbae517d 5647d3c66dfdd6f9