name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
|
SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
|
category |
Access Control Devices and Systems
|
Access Control Devices and Systems
|
not_valid_before |
2016-06-06
|
2007-06-27
|
not_valid_after |
2021-06-06
|
2013-10-07
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
manufacturer_web |
https://www.hitachi.com/
|
https://www.hitachi.com/
|
security_level |
ALC_FLR.1, EAL2+ |
EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
|
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
93a52189ac3baf26ac00310474d1b238aa438951331d1f5b6f10ceb65c03d5a7
|
2e60ea5270fbc0f11c2112143832445e6142b856f0a0892f3ab31b05cfe3884a
|
state/report/txt_hash |
3af7b5bf795117fd27bedb5264d03826302b23ac65df033e4afdf09040e1fcd0
|
9ad5433a32d590aac96300931d64097f1b55f8e70fd739f8c5e99d49e13e407c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
d4924797a53b58c23d0fce46516f98abc901c012f6caca39f69cc5a41200ba41
|
30bcb2eaa6f18b4fe7c9926057263a785d8c053585dc6ee05d495c733c9af099
|
state/st/txt_hash |
8f4a9a82c5a3b00ee7ff8044c894a6a53acc5759c4f381948ab6ab714960598a
|
b52cd8c677fe4c51cf6d131f8b55862970d9b7f0953c265a60a45887d1a5b538
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0514
|
JISEC-CC-CRP-C0102
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data/cert_id |
C0514
|
C0102
|
heuristics/scheme_data/certification_date |
2016-06
|
2007-06
|
heuristics/scheme_data/claim |
EAL2+ALC_FLR.1
|
EAL2
|
heuristics/scheme_data/enhanced |
- product:
Hitachi Virtual Storage Platform G1000,
Hitachi Virtual Storage Platform VX7 Control Program
- toe_version:
80-01-25-00/00(R8-01A-06_Z)
- product_type:
Control Program for storage system
- certification_date:
2016-06-06
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- report_link:
https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0514_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device.
TOE Security functions
The major security functions of this TOE are as follows.
-
Function that identifies the host and controls access, so that the host can access only the designated storage area
-
Function that erases data by overwriting it with dummy data in the storage device
-
Function that manages an encryption key to encrypt data written to the storage device
-
Function that identifies/authenticates fibre channel switches
-
Function that identifies/authenticates users and limits settings related to security to specific roles
-
Function that records events related to security in logs and enables persons who have a specific role to read it
|
- product:
SANRISE Universal Storage Platform CHA/DKA Program
TagmaStore Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
- toe_version:
50-04-34-00/00
- product_type:
IT Product (Storage Control Software)
- certification_date:
2007-06-27
- cc_version:
2.1
- assurance_level:
EAL2
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0102_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0102_est.pdf
- description:
PRODUCT DESCRIPTION
TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”.
TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.1
|
EAL2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
2.1
|
heuristics/scheme_data/enhanced/certification_date |
2016-06-06
|
2007-06-27
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device.
TOE Security functions
The major security functions of this TOE are as follows.
-
Function that identifies the host and controls access, so that the host can access only the designated storage area
-
Function that erases data by overwriting it with dummy data in the storage device
-
Function that manages an encryption key to encrypt data written to the storage device
-
Function that identifies/authenticates fibre channel switches
-
Function that identifies/authenticates users and limits settings related to security to specific roles
-
Function that records events related to security in logs and enables persons who have a specific role to read it
|
PRODUCT DESCRIPTION
TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”.
TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
|
heuristics/scheme_data/enhanced/evaluation_facility |
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Hitachi Virtual Storage Platform G1000,
Hitachi Virtual Storage Platform VX7 Control Program
|
SANRISE Universal Storage Platform CHA/DKA Program
TagmaStore Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
|
heuristics/scheme_data/enhanced/product_type |
Control Program for storage system
|
IT Product (Storage Control Software)
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0514_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0102_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0514_est.pdf
|
https://www.ipa.go.jp/en/security/c0102_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
80-01-25-00/00(R8-01A-06_Z)
|
50-04-34-00/00
|
heuristics/scheme_data/enhanced/vendor |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
heuristics/scheme_data/expiration_date |
2021-07
|
2013-10
|
heuristics/scheme_data/supplier |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
heuristics/scheme_data/toe_japan_name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
80-01-25-00/00(R8-01A-06_Z)
|
SANRISE Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
50-04-34-00/00
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
|
heuristics/scheme_data/toe_overseas_name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
|
TagmaStore Universal Storage
Platform CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
50-04-34-00/00
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0514_erpt.pdf
|
c0102_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0514-01:
1
- Certification No. C0514:
1
|
- CRP-C0102-01:
1
- Certification No. C0102:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.TSF_COMP:
1
- T.LP_LEAK:
1
- T.CHG_CONFIG:
1
- T.HDD_THEFT:
1
- T.HDD_REUSE:
1
- A:
- A.NOEVIL:
1
- A.PHYSICAL_SEC:
1
- A.MANAGE_SECRET:
1
- A.MANAGEMENT_PC:
1
- A.MAINTENCE_PC:
1
- A.CONNECT_STORAGE:
1
- A.EXTERNAL_SERVER:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
4
- EAL2 augmented: 3
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
4
|
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- ISO:
- CC:
- CCIMB-99-032:
2
- CCIMB-99-033:
2
- CCIMB-99-031:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCIMB-99-032:
2
- CCIMB-99-033:
2
- CCIMB-99-031:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
473024
- pdf_is_encrypted:
True
- pdf_number_of_pages:
41
- /CreationDate:
D:20160906162354+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate:
D:20160906162432+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
104544
- pdf_is_encrypted:
False
- pdf_number_of_pages:
20
- /ModDate:
D:20070918163642+09'00'
- /CreationDate:
D:20070918163642+09'00'
- /Title: untitled
- /Producer:
Acrobat Distiller 6.0 (Windows)
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20160906162354+09'00'
|
D:20070918163642+09'00'
|
pdf_data/report_metadata//ModDate |
D:20160906162432+09'00'
|
D:20070918163642+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata/pdf_file_size_bytes |
473024
|
104544
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
41
|
20
|
pdf_data/st_filename |
c0514_est.pdf
|
c0102_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.ADM_AUTH:
8
- O.ADM_ROLE:
5
- O.SEC_COMM:
8
- O.SWITCH_AUTH:
6
- O.HOST_ACCESS:
8
- O.HDD_ENC:
6
- O.HDD_SHRED:
3
- O.AUD_GEN:
7
- O.HDD_:
2
- T:
- T.TSF_COMP:
3
- T.LP_LEAK:
3
- T.CHG_CONFIG:
3
- T.HDD_THEFT:
3
- T.HDD_REUSE:
3
- A:
- A.NOEVIL:
3
- A.PHYSICAL_SEC:
3
- A.MANAGE_SECRET:
3
- A.MANAGEMENT_PC:
3
- A.MAINTENANCE_PC:
3
- A.CONNECT_STORAGE:
3
- A.EXTERNAL_SERVER:
3
- OE:
- OE.NOEVIL:
2
- OE.PHYSICAL_SEC:
3
- OE.MANAGE_SECRET:
3
- OE.MANAGEMENT_PC:
2
- OE.MAINTENANCE_PC:
3
- OE.CONNECT_STORAGE:
2
- OE.EXTERNAL_SERVER:
3
- OE.FC-SP_HBA:
2
- OE.HDD_ENC:
2
- OE.FC-:
1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
4
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ACM:
- ADO:
- ADO_DEL.1:
2
- ADO_IGS.1:
3
- ADV:
- ADV_SPM.1:
4
- ADV_FSP.1:
2
- ADV_HLD.1:
3
- ADV_RCR.1:
2
- AGD:
- AGD_ADM.1:
3
- AGD_USR.1:
3
- ATE:
- ATE_COV.1:
2
- ATE_FUN.1:
2
- ATE_IND.2:
2
- AVA:
- AVA_SOF.1:
2
- AVA_VLA.1:
2
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
- ADV_SPM.1:
4
- ADV_FSP.1:
2
- ADV_HLD.1:
3
- ADV_RCR.1:
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_ADM.1:
3
- AGD_USR.1:
3
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
2
|
pdf_data/st_keywords/cc_sar/AVA |
|
- AVA_SOF.1:
2
- AVA_VLA.1:
2
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
18
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
8
- FAU_SAR.1:
9
- FAU_STG.1:
12
- FAU_STG.3:
10
- FAU_STG.4:
8
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
- FAU_STG.4.1:
1
- FCS:
- FCS_CKM.1:
12
- FCS_CKM.4:
11
- FCS_CKM.2:
1
- FCS_COP.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FDP:
- FDP_ACC.1:
16
- FDP_ACF.1:
13
- FDP_RIP.1:
10
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1:
1
- FDP_IFC.1:
2
- FIA:
- FIA_AFL.1:
10
- FIA_ATD:
19
- FIA_SOS:
20
- FIA_UAU.2:
18
- FIA_UID.2:
18
- FIA_USB:
19
- FIA_UID.1:
6
- FIA_UAU.1:
2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
6
- FIA_SOS.1:
2
- FIA_UAU:
1
- FIA_UID:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1:
6
- FMT:
- FMT_MOF.1:
14
- FMT_MSA.1:
12
- FMT_MSA.3:
13
- FMT_MTD.1:
15
- FMT_MTD.3:
10
- FMT_SMF.1:
15
- FMT_SMR.1:
18
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_MTD.3.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
13
- FPT_STM.1.1:
1
- FPT_STM:
1
- FTP:
- FTP_ITC.1:
10
- FTP_TRP.1:
9
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
- FDP:
- FDP_ACC.1:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1:
8
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
4
- FIA:
- FIA_UID.1:
4
- FIA_UID.2:
13
- FMT:
- FMT_MSA.3:
11
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1:
13
- FMT_SMR.1:
14
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1:
13
- FMT_MSA.2:
11
- FMT_MSA.2.1:
1
- FMT_SMF.1.1:
1
- FMT_SAE.1:
10
- FMT_SAE.1.1:
1
- FMT_SAE.1.2:
1
- FPT:
- FPT_RVM.1:
13
- FPT_RVM.1.1:
1
- FPT_STM.1:
14
- FPT_STM.1.1:
1
- FPT_SEP.1:
12
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
16
- FDP_ACF.1:
13
- FDP_RIP.1: 10
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1: 1
- FDP_IFC.1:
2
|
- FDP_ACC.1:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1:
8
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
16
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
13
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1: 10
- FIA_ATD: 19
- FIA_SOS: 20
- FIA_UAU.2: 18
- FIA_UID.2:
18
- FIA_USB: 19
- FIA_UID.1:
6
- FIA_UAU.1: 2
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_SOS.1: 2
- FIA_UAU: 1
- FIA_UID: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_USB.1: 6
|
- FIA_UID.1:
4
- FIA_UID.2:
13
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
18
|
13
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1: 14
- FMT_MSA.1:
12
- FMT_MSA.3:
13
- FMT_MTD.1: 15
- FMT_MTD.3: 10
- FMT_SMF.1:
15
- FMT_SMR.1:
18
- FMT_MOF.1.1: 1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1: 1
- FMT_MTD.3.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA.3:
11
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1:
13
- FMT_SMR.1:
14
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1:
13
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_SMF.1.1:
1
- FMT_SAE.1: 10
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
13
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
15
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
18
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
13
- FPT_STM.1.1:
1
- FPT_STM: 1
|
- FPT_RVM.1: 13
- FPT_RVM.1.1: 1
- FPT_STM.1:
14
- FPT_STM.1.1:
1
- FPT_SEP.1: 12
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
13
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
2
- FIPS PUB 46-3:
1
- FIPS PUB 180-2:
1
- RFC:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CC:
- CCIMB-99-031:
1
- CCIMB-99-032:
1
- CCIMB-99-033:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCIMB-99-031:
1
- CCIMB-99-032:
1
- CCIMB-99-033:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Microsoft |
|
- Microsoft:
1
- Microsoft Corporation: 1
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
2
|
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1477873
- pdf_is_encrypted:
False
- pdf_number_of_pages:
78
- /Title:
USP_V ST
- /Author:
八木
- /Subject: CC EAL2 Security Target
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20160901154400+09'00'
- /ModDate:
D:20160901154400+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
231671
- pdf_is_encrypted:
False
- pdf_number_of_pages:
57
- /CreationDate:
D:20070918131359+09'00'
- /Author:
hiwa.sysdeptdm
- /Creator:
PScript5.dll Version 5.2
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20070918131359+09'00'
- /Title:
Microsoft Word - User Data Protection Security Target_Eng.doc
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
八木
|
hiwa.sysdeptdm
|
pdf_data/st_metadata//CreationDate |
D:20160901154400+09'00'
|
D:20070918131359+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
PScript5.dll Version 5.2
|
pdf_data/st_metadata//ModDate |
D:20160901154400+09'00'
|
D:20070918131359+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Title |
USP_V ST
|
Microsoft Word - User Data Protection Security Target_Eng.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
1477873
|
231671
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
78
|
57
|
dgst |
4b794daffbae517d
|
5647d3c66dfdd6f9
|