Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
JISEC-CC-CRP-C0514
Oberthur Card ID-One ePass 64K: application ID-One ePass 64K embedded on Philips (NXP) P5CD072/V0P and P5CD072/V0Q components
ANSSI-CC-2007/06
name Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) Oberthur Card ID-One ePass 64K: application ID-One ePass 64K embedded on Philips (NXP) P5CD072/V0P and P5CD072/V0Q components
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 06.06.2021 01.09.2019
not_valid_before 06.06.2016 23.03.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_06en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_06en.pdf
manufacturer Hitachi, Ltd. Oberthur Card System / Philips (NXP)
manufacturer_web https://www.hitachi.com/ https://www.oberthur.com/
security_level EAL2+, ALC_FLR.1 ADV_IMP.2, EAL4+, ALC_DVS.2
dgst 4b794daffbae517d a49f52088f921f52
heuristics/cert_id JISEC-CC-CRP-C0514 ANSSI-CC-2007/06
heuristics/cert_lab [] CEA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_MSU.2, AVA_VLA.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ALC_DVS.2, ADV_FSP.2, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1
heuristics/extracted_versions 25, 01, 80, 00 -
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0348-2006, BSI-DSZ-CC-0349-2006
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0348-2006, BSI-DSZ-CC-0227-2004, BSI-DSZ-CC-0349-2006, BSI-DSZ-CC-0312-2005
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0514
  • certification_date: 01.06.2016
  • claim: EAL2+ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
    • product_type: Control Program for storage system
    • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
    • toe_version: 80-01-25-00/00(R8-01A-06_Z)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.07.2021
  • supplier: Hitachi, Ltd.
  • toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
  • toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
maintenance_updates
pdf_data/report_filename c0514_erpt.pdf 2007_06en.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2
    • cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
    • cert_id: 2007/06
    • cert_item: Oberthur Card ID-One ePass 64K: application ID-One ePass 64K v1.0 masked on Philips (NXP) components P5CD072/V0P and P5CD072/V0Q
    • cert_item_version: Philips references IC + ROM mask : 9352 831 41006 VOP et 9352 831 64118 VOQ
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France Tél : +33 (0)4 38 78 40 87, mél : [email protected]
    • developer: Oberthur Card Systems SA 71-73 rue des Hautes Pâtures 92726 Nanterre, France Philips Semiconductors Postfach 54 02 40, D-22502 Hamburg, Allemagne Sponsor Oberthur Card Systems SA 71-73 rue des Hautes Pâtures, 92726 Nanterre, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: « Machine readable Travel Document with ICAO Application, Basic Access Control » BSI-PP-0017 rev: 1.0 date 18/08/2005
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0514-01: 1
    • Certification No. C0514: 1
  • AU:
    • Certification Report 2007/06: 1
  • DE:
    • BSI_DSZ_CC_0348_2006: 1
    • BSI_DSZ_CC_0349_2006: 1
  • FR:
    • Certification Report 2007/06: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 1
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 1
    • A.MAINTENCE_PC: 1
    • A.MANAGEMENT_PC: 1
    • A.MANAGE_SECRET: 1
    • A.NOEVIL: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.HDD_REUSE: 1
    • T.HDD_THEFT: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 18
  • Oberthur:
    • Oberthur: 10
    • Oberthur Card Systems: 4
  • Philips:
    • Philips: 21
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
  • CESTI:
    • CESTI: 2
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 8
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/ic_data_group
  • EF:
    • EF.DG15: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ICAO:
    • ICAO: 5
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20160906162354+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160906162432+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 473024
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /Author: watanabe
  • /Comments: Oberthur Card Systems SA
  • /Company: SGDN/DCSSI
  • /CreationDate: D:20070413140225+02'00'
  • /Creator: Acrobat PDFMaker 7.0.7 pour Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20070413140301+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20070405113401
  • /Subject: Oberthur Card ID-One ePass 64K: application ID-One ePass 64K v1.0 masked on Philips (NXP) components P5CD072/V0P and P5CD072/V0Q
  • /Title: 2007/06
  • pdf_file_size_bytes: 219841
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename c0514_est.pdf cible2007_06en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0349: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 1
    • BSI-PP-0017: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 3
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.2: 3
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • APE:
    • APE_SRE: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 19
    • FIA_ATD.1: 6
    • FIA_SOS: 20
    • FIA_SOS.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 18
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 18
    • FIA_UID.2.1: 1
    • FIA_USB: 19
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 6
    • FAU_SAS.1: 7
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 18
    • FCS_CKM.2: 3
    • FCS_CKM.4: 16
    • FCS_COP: 8
    • FCS_COP.1: 16
    • FCS_RND: 12
    • FCS_RND.1: 12
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 6
    • FDP_ACC.1: 15
    • FDP_ACF: 8
    • FDP_ACF.1: 13
    • FDP_DAU: 1
    • FDP_DAU.1: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 5
    • FDP_IFF: 1
    • FDP_ITC: 2
    • FDP_ITC.1: 12
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 11
    • FDP_UCT: 6
    • FDP_UCT.1: 3
    • FDP_UIT: 6
    • FDP_UIT.1: 4
  • FIA:
    • FIA_API: 12
    • FIA_API.1: 5
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 18
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 5
    • FIA_UAU.5: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 2
    • FIA_UAU.6: 3
    • FIA_UID.1: 2
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 14
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 13
    • FMT_LIM.2.1: 2
    • FMT_MOF: 1
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.2: 13
    • FMT_MSA.3: 3
    • FMT_MTD: 7
    • FMT_MTD.1: 5
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_TST.1.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 3
    • FPT_PHP.3.1: 1
    • FPT_RVM.1: 2
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 2
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 4
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
    • A.MAINTENANCE_PC: 3
    • A.MANAGEMENT_PC: 3
    • A.MANAGE_SECRET: 3
    • A.NOEVIL: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 8
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 7
    • O.HDD_: 2
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.HOST_ACCESS: 8
    • O.SEC_COMM: 8
    • O.SWITCH_AUTH: 6
  • OE:
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-: 1
    • OE.FC-SP_HBA: 2
    • OE.HDD_ENC: 2
    • OE.MAINTENANCE_PC: 3
    • OE.MANAGEMENT_PC: 2
    • OE.MANAGE_SECRET: 3
    • OE.NOEVIL: 2
    • OE.PHYSICAL_SEC: 3
  • T:
    • T.CHG_CONFIG: 3
    • T.HDD_REUSE: 3
    • T.HDD_THEFT: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • NXP:
    • NXP: 5
  • Oberthur:
    • Oberthur: 1
    • Oberthur Card Systems: 57
  • Philips:
    • Philips: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
  • DES:
    • 3DES:
      • 3DES: 3
      • TDEA: 2
      • TDES: 2
      • Triple-DEA: 1
      • Triple-DES: 19
    • DES:
      • DEA: 1
      • DES: 8
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
    • TLS:
      • TLS: 2
      • TLSv1.0: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 3
    • RNG: 4
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
  • ECB:
    • ECB: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • Physical Tampering: 2
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 4
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 5
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 0002: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG15: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
  • RFC:
    • RFC2865: 2
  • BSI:
    • AIS 31: 3
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS 180-2: 2
    • FIPS 46-3: 3
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 2
  • ICAO:
    • ICAO: 16
  • ISO:
    • ISO/IEC 7816-2: 1
    • ISO/IEC 9796-2: 1
pdf_data/st_metadata
  • /Author: 八木
  • /CreationDate: D:20160901154400+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160901154400+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: CC EAL2 Security Target
  • /Title: USP_V ST
  • pdf_file_size_bytes: 1477873
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /Author: Grassin
  • /CreationDate: D:20070223155357+02'00
  • /Creator: PDFCreator Version 0.8.1
  • /ModDate: D:20070223155357+02'00
  • /Producer: AFPL Ghostscript 8.50
  • /Title: BISON_ST_Lite_V00
  • pdf_file_size_bytes: 1028975
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different