name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
|
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
|
category |
Access Control Devices and Systems
|
Access Control Devices and Systems
|
not_valid_before |
2016-06-06
|
2008-12-24
|
not_valid_after |
2021-06-06
|
2014-04-08
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
manufacturer_web |
https://www.hitachi.com/
|
https://www.hitachi.com/
|
security_level |
ALC_FLR.1, EAL2+ |
EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
|
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
93a52189ac3baf26ac00310474d1b238aa438951331d1f5b6f10ceb65c03d5a7
|
50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c
|
state/report/txt_hash |
3af7b5bf795117fd27bedb5264d03826302b23ac65df033e4afdf09040e1fcd0
|
affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
d4924797a53b58c23d0fce46516f98abc901c012f6caca39f69cc5a41200ba41
|
22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800
|
state/st/txt_hash |
8f4a9a82c5a3b00ee7ff8044c894a6a53acc5759c4f381948ab6ab714960598a
|
06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0514
|
JISEC-CC-CRP-C0200
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0514
- supplier:
Hitachi, Ltd.
- toe_overseas_name:
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
- expiration_date:
2021-07
- claim:
EAL2+ALC_FLR.1
- certification_date:
2016-06
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
- toe_japan_name:
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
80-01-25-00/00(R8-01A-06_Z)
- enhanced:
- product:
Hitachi Virtual Storage Platform G1000,
Hitachi Virtual Storage Platform VX7 Control Program
- toe_version:
80-01-25-00/00(R8-01A-06_Z)
- product_type:
Control Program for storage system
- certification_date:
2016-06-06
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- report_link:
https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- cert_link:
https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0514_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device.
TOE Security functions
The major security functions of this TOE are as follows.
-
Function that identifies the host and controls access, so that the host can access only the designated storage area
-
Function that erases data by overwriting it with dummy data in the storage device
-
Function that manages an encryption key to encrypt data written to the storage device
-
Function that identifies/authenticates fibre channel switches
-
Function that identifies/authenticates users and limits settings related to security to specific roles
-
Function that records events related to security in logs and enables persons who have a specific role to read it
|
- cert_id:
C0200
- supplier:
Hitachi, Ltd.
- toe_overseas_name:
-----
- expiration_date:
2014-04
- claim:
EAL2
- certification_date:
2008-12
- toe_overseas_link:
None
- toe_japan_name:
Hitachi Universal
Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi
Universal Storage Platform VM, Hitachi Universal Storage Platform H20000
Control Program 60-02-32-00/00(R6-02A-14)
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
- enhanced:
- product:
Hitachi Universal Storage
Platform V, Hitachi Universal
Storage Platform H24000,
Hitachi Universal Storage
Platform VM, Hitachi Universal
Storage Platform H20000
Control Program
- toe_version:
60-02-32-00/00(R6-02A-14)
- product_type:
IT Product (Storage Control Software)
- certification_date:
2008-12-24
- cc_version:
2.3
- assurance_level:
EAL2
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0200_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0200_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users.
TOE security functions
TOE has the following security functions.
- Storage Navigator function
It sets, changes, etc. the configuration of each function to manage the storage
subsystem.
- Virtual Partition Manager function
It partitions the resources of the entire storage subsystem into multiple virtual disks to
control access.
- LUN Manager function
It associates ports and logical devices that can be accessed by the host.
- Host identification/authentication function
When a host is connected to SAN, this function identifies/authenticates the host so that
invalid host would not be connected.
- Audit log function
It records events related to security, such as success/failure of login, changes in
configuration settings.
|
heuristics/scheme_data/cert_id |
C0514
|
C0200
|
heuristics/scheme_data/certification_date |
2016-06
|
2008-12
|
heuristics/scheme_data/claim |
EAL2+ALC_FLR.1
|
EAL2
|
heuristics/scheme_data/enhanced |
- product:
Hitachi Virtual Storage Platform G1000,
Hitachi Virtual Storage Platform VX7 Control Program
- toe_version:
80-01-25-00/00(R8-01A-06_Z)
- product_type:
Control Program for storage system
- certification_date:
2016-06-06
- cc_version:
3.1 Release4
- assurance_level:
EAL2 Augmented with ALC_FLR.1
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
- report_link:
https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0514_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device.
TOE Security functions
The major security functions of this TOE are as follows.
-
Function that identifies the host and controls access, so that the host can access only the designated storage area
-
Function that erases data by overwriting it with dummy data in the storage device
-
Function that manages an encryption key to encrypt data written to the storage device
-
Function that identifies/authenticates fibre channel switches
-
Function that identifies/authenticates users and limits settings related to security to specific roles
-
Function that records events related to security in logs and enables persons who have a specific role to read it
|
- product:
Hitachi Universal Storage
Platform V, Hitachi Universal
Storage Platform H24000,
Hitachi Universal Storage
Platform VM, Hitachi Universal
Storage Platform H20000
Control Program
- toe_version:
60-02-32-00/00(R6-02A-14)
- product_type:
IT Product (Storage Control Software)
- certification_date:
2008-12-24
- cc_version:
2.3
- assurance_level:
EAL2
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0200_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0200_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users.
TOE security functions
TOE has the following security functions.
- Storage Navigator function
It sets, changes, etc. the configuration of each function to manage the storage
subsystem.
- Virtual Partition Manager function
It partitions the resources of the entire storage subsystem into multiple virtual disks to
control access.
- LUN Manager function
It associates ports and logical devices that can be accessed by the host.
- Host identification/authentication function
When a host is connected to SAN, this function identifies/authenticates the host so that
invalid host would not be connected.
- Audit log function
It records events related to security, such as success/failure of login, changes in
configuration settings.
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2 Augmented with ALC_FLR.1
|
EAL2
|
heuristics/scheme_data/enhanced/cc_version |
3.1 Release4
|
2.3
|
heuristics/scheme_data/enhanced/certification_date |
2016-06-06
|
2008-12-24
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device.
TOE Security functions
The major security functions of this TOE are as follows.
-
Function that identifies the host and controls access, so that the host can access only the designated storage area
-
Function that erases data by overwriting it with dummy data in the storage device
-
Function that manages an encryption key to encrypt data written to the storage device
-
Function that identifies/authenticates fibre channel switches
-
Function that identifies/authenticates users and limits settings related to security to specific roles
-
Function that records events related to security in logs and enables persons who have a specific role to read it
|
PRODUCT DESCRIPTION
Description of TOE
TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users.
TOE security functions
TOE has the following security functions.
- Storage Navigator function
It sets, changes, etc. the configuration of each function to manage the storage
subsystem.
- Virtual Partition Manager function
It partitions the resources of the entire storage subsystem into multiple virtual disks to
control access.
- LUN Manager function
It associates ports and logical devices that can be accessed by the host.
- Host identification/authentication function
When a host is connected to SAN, this function identifies/authenticates the host so that
invalid host would not be connected.
- Audit log function
It records events related to security, such as success/failure of login, changes in
configuration settings.
|
heuristics/scheme_data/enhanced/evaluation_facility |
Mizuho Information & Research Institute, Inc.
Information Security Evaluation Office
|
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Hitachi Virtual Storage Platform G1000,
Hitachi Virtual Storage Platform VX7 Control Program
|
Hitachi Universal Storage
Platform V, Hitachi Universal
Storage Platform H24000,
Hitachi Universal Storage
Platform VM, Hitachi Universal
Storage Platform H20000
Control Program
|
heuristics/scheme_data/enhanced/product_type |
Control Program for storage system
|
IT Product (Storage Control Software)
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0514_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0200_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0514_est.pdf
|
https://www.ipa.go.jp/en/security/c0200_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
80-01-25-00/00(R8-01A-06_Z)
|
60-02-32-00/00(R6-02A-14)
|
heuristics/scheme_data/enhanced/vendor |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
heuristics/scheme_data/expiration_date |
2021-07
|
2014-04
|
heuristics/scheme_data/supplier |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
heuristics/scheme_data/toe_japan_name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
80-01-25-00/00(R8-01A-06_Z)
|
Hitachi Universal
Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi
Universal Storage Platform VM, Hitachi Universal Storage Platform H20000
Control Program 60-02-32-00/00(R6-02A-14)
|
heuristics/scheme_data/toe_overseas_link |
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
|
None
|
heuristics/scheme_data/toe_overseas_name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
|
-----
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0514_erpt.pdf
|
c0200_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0514-01:
1
- Certification No. C0514:
1
|
- CRP-C0200-01:
1
- Certification No. C0200:
1
|
pdf_data/report_keywords/cc_claims/A |
- A.NOEVIL:
1
- A.PHYSICAL_SEC:
1
- A.MANAGE_SECRET: 1
- A.MANAGEMENT_PC: 1
- A.MAINTENCE_PC: 1
- A.CONNECT_STORAGE:
1
- A.EXTERNAL_SERVER: 1
|
- A.NOEVIL:
1
- A.NOEVIL_MNT: 1
- A.PHYSICAL_SEC:
1
- A.ILLEGAL_SOFT: 1
- A.CONNECT_STORAGE:
1
|
pdf_data/report_keywords/cc_claims/A/A.CONNECT_STORAGE |
1
|
1
|
pdf_data/report_keywords/cc_claims/A/A.NOEVIL |
1
|
1
|
pdf_data/report_keywords/cc_claims/A/A.PHYSICAL_SEC |
1
|
1
|
pdf_data/report_keywords/cc_claims/T |
- T.TSF_COMP:
1
- T.LP_LEAK:
1
- T.CHG_CONFIG:
1
- T.HDD_THEFT: 1
- T.HDD_REUSE: 1
|
- T.ILLEGAL_XCNTL: 1
- T.TSF_COMP:
1
- T.LP_LEAK:
1
- T.CHG_CONFIG:
1
|
pdf_data/report_keywords/cc_claims/T/T.CHG_CONFIG |
1
|
1
|
pdf_data/report_keywords/cc_claims/T/T.LP_LEAK |
1
|
1
|
pdf_data/report_keywords/cc_claims/T/T.TSF_COMP |
1
|
1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL2:
4
- EAL2 augmented: 3
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
4
|
3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol/TLS |
|
|
pdf_data/report_keywords/crypto_protocol/TLS/SSL |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- ISO:
- ISO/IEC 15408:2005:
1
- ISO/IEC 18045:2005:
2
- CC:
- CCMB-2005-08-001:
2
- CCMB-2005-08-002:
2
- CCMB-2005-08-003:
2
- CCMB-2005-08-004:
2
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCMB-2005-08-001:
2
- CCMB-2005-08-002:
2
- CCMB-2005-08-003:
2
- CCMB-2005-08-004:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
473024
- pdf_is_encrypted:
True
- pdf_number_of_pages:
41
- /CreationDate:
D:20160906162354+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate:
D:20160906162432+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
147813
- pdf_is_encrypted:
False
- pdf_number_of_pages:
24
- /ModDate:
D:20090401163719+09'00'
- /CreationDate:
D:20090401163719+09'00'
- /Title: untitled
- /Producer:
Acrobat Distiller 6.0 (Windows)
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20160906162354+09'00'
|
D:20090401163719+09'00'
|
pdf_data/report_metadata//ModDate |
D:20160906162432+09'00'
|
D:20090401163719+09'00'
|
pdf_data/report_metadata//Producer |
Microsoft® Word 2010
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata/pdf_file_size_bytes |
473024
|
147813
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
True
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
41
|
24
|
pdf_data/st_filename |
c0514_est.pdf
|
c0200_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims/A |
- A.NOEVIL:
3
- A.PHYSICAL_SEC:
3
- A.MANAGE_SECRET: 3
- A.MANAGEMENT_PC: 3
- A.MAINTENANCE_PC: 3
- A.CONNECT_STORAGE:
3
- A.EXTERNAL_SERVER: 3
|
- A.NOEVIL:
3
- A.NOEVIL_MNT: 3
- A.PHYSICAL_SEC:
3
- A.ILLEGAL_SOFT: 3
- A.CONNECT_STORAGE:
3
|
pdf_data/st_keywords/cc_claims/A/A.CONNECT_STORAGE |
3
|
3
|
pdf_data/st_keywords/cc_claims/A/A.NOEVIL |
3
|
3
|
pdf_data/st_keywords/cc_claims/A/A.PHYSICAL_SEC |
3
|
3
|
pdf_data/st_keywords/cc_claims/O |
- O.ADM_AUTH:
8
- O.ADM_ROLE:
5
- O.SEC_COMM:
8
- O.SWITCH_AUTH: 6
- O.HOST_ACCESS:
8
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.AUD_GEN:
7
- O.HDD_: 2
|
- O.ADM_AUTH:
9
- O.ADM_ROLE:
5
- O.SEC_COMM:
8
- O.HOST_AUTH: 5
- O.HOST_ACCESS:
8
- O.AUD_GEN:
6
|
pdf_data/st_keywords/cc_claims/O/O.ADM_AUTH |
8
|
9
|
pdf_data/st_keywords/cc_claims/O/O.ADM_ROLE |
5
|
5
|
pdf_data/st_keywords/cc_claims/O/O.AUD_GEN |
7
|
6
|
pdf_data/st_keywords/cc_claims/O/O.HOST_ACCESS |
8
|
8
|
pdf_data/st_keywords/cc_claims/O/O.SEC_COMM |
8
|
8
|
pdf_data/st_keywords/cc_claims/OE |
- OE.NOEVIL:
2
- OE.PHYSICAL_SEC:
3
- OE.MANAGE_SECRET: 3
- OE.MANAGEMENT_PC: 2
- OE.MAINTENANCE_PC: 3
- OE.CONNECT_STORAGE:
2
- OE.EXTERNAL_SERVER: 3
- OE.FC-SP_HBA: 2
- OE.HDD_ENC: 2
- OE.FC-: 1
|
- OE.NOEVIL:
2
- OE.NOEVIL-MNT: 1
- OE.PHYSICAL_SEC:
3
- OE.ILLEGAL_SOFT: 2
- OE.CONNECT_STORAGE:
3
- OE.NOEVIL_MNT: 1
|
pdf_data/st_keywords/cc_claims/OE/OE.CONNECT_STORAGE |
2
|
3
|
pdf_data/st_keywords/cc_claims/OE/OE.NOEVIL |
2
|
2
|
pdf_data/st_keywords/cc_claims/OE/OE.PHYSICAL_SEC |
3
|
3
|
pdf_data/st_keywords/cc_claims/T |
- T.TSF_COMP:
3
- T.LP_LEAK:
3
- T.CHG_CONFIG:
3
- T.HDD_THEFT: 3
- T.HDD_REUSE: 3
|
- T.ILLEGAL_XCNTL: 3
- T.TSF_COMP:
3
- T.LP_LEAK:
3
- T.CHG_CONFIG:
3
|
pdf_data/st_keywords/cc_claims/T/T.CHG_CONFIG |
3
|
3
|
pdf_data/st_keywords/cc_claims/T/T.LP_LEAK |
3
|
3
|
pdf_data/st_keywords/cc_claims/T/T.TSF_COMP |
3
|
3
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- ALC:
- ALC_FLR.1:
4
- ALC_CMC.2:
1
- ALC_CMS.2:
1
- ALC_DEL.1:
1
- ATE:
- ATE_COV.1:
1
- ATE_FUN.1:
1
- ATE_IND.2:
1
- AVA:
- ASE:
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
- ASE_TSS.1:
1
|
- ACM:
- ADO:
- ADO_DEL.1:
2
- ADO_IGS.1:
3
- ADV:
- ADV_FSP.1:
2
- ADV_HLD.1:
2
- ADV_RCR.1:
1
- AGD:
- AGD_ADM.1:
3
- AGD_USR.1:
3
- ATE:
- ATE_COV.1:
2
- ATE_FUN.1:
2
- ATE_IND.2:
2
- AVA:
- AVA_SOF.1:
2
- AVA_VLA.1:
2
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_ARC.1:
1
- ADV_FSP.2:
1
- ADV_TDS.1:
1
|
- ADV_FSP.1:
2
- ADV_HLD.1:
2
- ADV_RCR.1:
1
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_OPE.1:
1
- AGD_PRE.1:
1
|
- AGD_ADM.1:
3
- AGD_USR.1:
3
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 |
1
|
2
|
pdf_data/st_keywords/cc_sar/AVA |
|
- AVA_SOF.1:
2
- AVA_VLA.1:
2
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL2 |
3
|
1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
18
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
8
- FAU_SAR.1:
9
- FAU_STG.1:
12
- FAU_STG.3:
10
- FAU_STG.4:
8
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
- FAU_STG.4.1:
1
- FCS:
- FCS_CKM.1:
12
- FCS_CKM.4:
11
- FCS_CKM.2:
1
- FCS_COP.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
- FDP:
- FDP_ACC.1:
16
- FDP_ACF.1:
13
- FDP_RIP.1:
10
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1:
1
- FDP_IFC.1:
2
- FIA:
- FIA_AFL.1:
10
- FIA_ATD:
19
- FIA_SOS:
20
- FIA_UAU.2:
18
- FIA_UID.2:
18
- FIA_USB:
19
- FIA_UID.1:
6
- FIA_UAU.1:
2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
6
- FIA_SOS.1:
2
- FIA_UAU:
1
- FIA_UID:
1
- FIA_UAU.2.1:
1
- FIA_UID.2.1:
1
- FIA_USB.1:
6
- FMT:
- FMT_MOF.1:
14
- FMT_MSA.1:
12
- FMT_MSA.3:
13
- FMT_MTD.1:
15
- FMT_MTD.3:
10
- FMT_SMF.1:
15
- FMT_SMR.1:
18
- FMT_MOF.1.1:
1
- FMT_MSA.1.1:
1
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MTD.1.1:
1
- FMT_MTD.3.1:
1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FPT:
- FPT_STM.1:
13
- FPT_STM.1.1:
1
- FPT_STM:
1
- FTP:
- FTP_ITC.1:
10
- FTP_TRP.1:
9
- FTP_ITC.1.1:
1
- FTP_ITC.1.2:
1
- FTP_ITC.1.3:
1
- FTP_TRP.1.1:
1
- FTP_TRP.1.2:
1
- FTP_TRP.1.3:
1
|
- FAU:
- FAU_GEN.1:
21
- FAU_GEN.2:
11
- FAU_SAR.1:
12
- FAU_STG.1:
13
- FAU_STG.3:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
- FCS:
- FCS_COP.1:
17
- FCS_CKM.1:
20
- FCS_CKM.2:
16
- FCS_CKM.4:
18
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FDP:
- FDP_ACC.1:
19
- FDP_IFC.1:
2
- FDP_ACF.1:
16
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FIA:
- FIA_ATD:
27
- FIA_ATD.1:
6
- FIA_USB:
27
- FIA_USB.1:
6
- FIA_AFL.1:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU.1:
21
- FIA_SOS:
29
- FIA_SOS.1:
2
- FIA_UAU.2:
17
- FIA_UID.1:
8
- FIA_UAU.7:
13
- FIA_UAU.7.1:
1
- FIA_UID.2:
22
- FIA_MSA.1.1:
1
- FIA_MSA.3.1:
1
- FIA_MSA.3.2:
1
- FIA_UAU.5:
19
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FMT:
- FMT_MSA.1:
16
- FMT_SMF.1:
18
- FMT_SMR.1:
20
- FMT_MSA.3:
16
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_MOF.1:
13
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.2:
9
- FMT_MOF.1.1:
1
- FPT:
- FPT_STM.1:
17
- FPT_RVM.1:
32
- FPT_SEP.1:
32
- FPT_STM.1.1:
1
- FPT_RVM.1.1:
1
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_GEN.1:
18
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2:
8
- FAU_SAR.1:
9
- FAU_STG.1:
12
- FAU_STG.3:
10
- FAU_STG.4: 8
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
- FAU_STG.4.1: 1
|
- FAU_GEN.1:
21
- FAU_GEN.2:
11
- FAU_SAR.1:
12
- FAU_STG.1:
13
- FAU_STG.3:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 |
18
|
21
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 |
8
|
11
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 |
9
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 |
12
|
13
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 |
10
|
12
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_CKM.1:
12
- FCS_CKM.4:
11
- FCS_CKM.2:
1
- FCS_COP.1:
2
- FCS_CKM.1.1:
1
- FCS_CKM.4.1:
1
|
- FCS_COP.1:
17
- FCS_CKM.1:
20
- FCS_CKM.2:
16
- FCS_CKM.4:
18
- FCS_COP.1.1: 1
- FCS_CKM.1.1:
1
- FCS_CKM.2.1: 1
- FCS_CKM.4.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
12
|
20
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
1
|
16
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
11
|
18
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
2
|
17
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
16
- FDP_ACF.1:
13
- FDP_RIP.1: 10
- FDP_ITC.1:
2
- FDP_ITC.2:
2
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_RIP.1.1: 1
- FDP_IFC.1:
2
|
- FDP_ACC.1:
19
- FDP_IFC.1:
2
- FDP_ACF.1:
16
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
16
|
19
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
13
|
16
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
2
|
6
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
2
|
6
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_AFL.1:
10
- FIA_ATD:
19
- FIA_SOS:
20
- FIA_UAU.2:
18
- FIA_UID.2:
18
- FIA_USB:
19
- FIA_UID.1:
6
- FIA_UAU.1:
2
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_ATD.1:
6
- FIA_SOS.1:
2
- FIA_UAU: 1
- FIA_UID: 1
- FIA_UAU.2.1: 1
- FIA_UID.2.1: 1
- FIA_USB.1:
6
|
- FIA_ATD:
27
- FIA_ATD.1:
6
- FIA_USB:
27
- FIA_USB.1:
6
- FIA_AFL.1:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU.1:
21
- FIA_SOS:
29
- FIA_SOS.1:
2
- FIA_UAU.2:
17
- FIA_UID.1:
8
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.2:
22
- FIA_MSA.1.1: 1
- FIA_MSA.3.1: 1
- FIA_MSA.3.2: 1
- FIA_UAU.5: 19
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 |
10
|
13
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD |
19
|
27
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS |
20
|
29
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS.1 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
2
|
21
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 |
18
|
17
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
18
|
22
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB |
19
|
27
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB.1 |
6
|
6
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MOF.1:
14
- FMT_MSA.1:
12
- FMT_MSA.3:
13
- FMT_MTD.1:
15
- FMT_MTD.3: 10
- FMT_SMF.1:
15
- FMT_SMR.1:
18
- FMT_MOF.1.1:
1
- FMT_MSA.1.1: 1
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1.1:
1
- FMT_MTD.3.1: 1
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
|
- FMT_MSA.1:
16
- FMT_SMF.1:
18
- FMT_SMR.1:
20
- FMT_MSA.3:
16
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_MOF.1:
13
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.2: 9
- FMT_MOF.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 |
14
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
12
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
13
|
16
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
15
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
15
|
18
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
18
|
20
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_STM.1:
13
- FPT_STM.1.1:
1
- FPT_STM: 1
|
- FPT_STM.1:
17
- FPT_RVM.1: 32
- FPT_SEP.1: 32
- FPT_STM.1.1:
1
- FPT_RVM.1.1: 1
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
13
|
17
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/SSL |
|
|
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL |
8
|
16
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS |
2
|
3
|
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLSv1.0 |
2
|
3
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
2
- FIPS PUB 46-3:
1
- FIPS PUB 180-2:
1
- RFC:
- CC:
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- FIPS:
- FIPS PUB 197:
1
- FIPS PUB 46-3:
1
- FIPS PUB 180-2:
1
- PKCS:
- CC:
- CCMB-2005-08-001:
4
- CCMB-2005-08-002:
3
- CCMB-2005-08-003:
2
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
2
- CCMB-2012-09-002:
2
- CCMB-2012-09-003:
2
- CCMB-2012-09-004:
2
|
- CCMB-2005-08-001:
4
- CCMB-2005-08-002:
3
- CCMB-2005-08-003:
2
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 180-2 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
2
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46-3 |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
2
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor/Microsoft |
|
- Microsoft:
1
- Microsoft Corporation: 1
|
pdf_data/st_keywords/vendor/Microsoft/Microsoft |
2
|
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1477873
- pdf_is_encrypted:
False
- pdf_number_of_pages:
78
- /Title:
USP_V ST
- /Author:
八木
- /Subject:
CC EAL2 Security Target
- /Creator:
Microsoft® Word 2010
- /CreationDate:
D:20160901154400+09'00'
- /ModDate:
D:20160901154400+09'00'
- /Producer:
Microsoft® Word 2010
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
516948
- pdf_is_encrypted:
False
- pdf_number_of_pages:
93
- /CreationDate:
D:20090330094022+09'00'
- /Subject:
CC EAL2 Security Target
- /Author:
八木
- /Creator:
Word 用 Acrobat PDFMaker 7.0.7
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20090330094033+09'00'
- /Company: Hitachi
- /Title:
USP_V ST
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
八木
|
八木
|
pdf_data/st_metadata//CreationDate |
D:20160901154400+09'00'
|
D:20090330094022+09'00'
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2010
|
Word 用 Acrobat PDFMaker 7.0.7
|
pdf_data/st_metadata//ModDate |
D:20160901154400+09'00'
|
D:20090330094033+09'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2010
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Subject |
CC EAL2 Security Target
|
CC EAL2 Security Target
|
pdf_data/st_metadata//Title |
USP_V ST
|
USP_V ST
|
pdf_data/st_metadata/pdf_file_size_bytes |
1477873
|
516948
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
78
|
93
|
dgst |
4b794daffbae517d
|
96e36510c2c8ba64
|