name |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) |
D-TRUST Web-Dienst TSE-CSP, Version 1.1.1 |
category |
Access Control Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
06.06.2021 |
10.11.2026 |
not_valid_before |
06.06.2016 |
10.11.2021 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1139V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1139V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1139V3b_pdf.pdf |
manufacturer |
Hitachi, Ltd. |
D-Trust GmbH |
manufacturer_web |
https://www.hitachi.com/ |
https://d-trust.net |
security_level |
EAL2+, ALC_FLR.1 |
EAL2+, ALC_CMS.3, ALC_LCD.1 |
dgst |
4b794daffbae517d |
b5426b97da50f817 |
heuristics/cert_id |
JISEC-CC-CRP-C0514 |
BSI-DSZ-CC-1139-V3-2021 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ALC_LCD.1, ALC_CMS.3, ADV_ARC.1, ATE_IND.2 |
heuristics/extracted_versions |
25, 01, 80, 00 |
1.1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0514
- certification_date: 01.06.2016
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
- toe_version: 80-01-25-00/00(R8-01A-06_Z)
- vendor: Hitachi, Ltd.
- expiration_date: 01.07.2021
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
- toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
e8114f6ce9b122e1, cf58c5e8b3897d68, f2b0e950a638963c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0113b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0112b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0111b_pdf.pdf |
pdf_data/cert_filename |
|
1139V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1139-V3-2021: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0111-2019: 1
- BSI-CC-PP-0112-2020: 1
- BSI-CC-PP-0113-2020: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_CMS.3: 1
- ALC_FLR: 1
- ALC_LCD.1: 1
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20211202074202+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, CSP-Light"
- /ModDate: D:20211202074950+01'00'
- /Producer: LibreOffice 6.3
- /Subject: Certificate D-TRUST Web-Dienst TSE-CSP
- /Title: Certification Report BSI-DSZ-CC-1139-V3-2021
- pdf_file_size_bytes: 242317
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0514_erpt.pdf |
1139V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 2 augmented by ALC_CMS.3 and ALC_LCD.1
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1139-V3-2021
- cert_item: D-TRUST Web-Dienst TSE-CSP, Version 1.3.1
- cert_lab: BSI
- developer: D-Trust GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12 November 2019, BSI-CC-PP- 0111-2019, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light – Time Stamp Service and Audit (PPC-CSPLight-TS-Au) Version 1.0, 26 February 2020, BSI-CC-PP-0112-2020, Common Criteria Protection Profile Configuration Cryptographic Service Provider Light - Time Stamp Service and Audit – Clustering (PPC-CSPLight-TS-Au-Cl), Version 1.0, 26 February 2020, BSI-CC-PP-0113-2020
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0514-01: 1
- Certification No. C0514: 1
|
- DE:
- BSI-DSZ-CC-1139-V2-: 1
- BSI-DSZ-CC-1139-V2-2021: 2
- BSI-DSZ-CC-1139-V3-2021: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0111-2019: 1
- BSI-CC-PP-0111-2019: 2
- BSI-CC-PP-0112-2020: 3
- BSI-CC-PP-0113-2020: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2 augmented: 3
- EAL 2+: 1
- EAL 4: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMS.3: 4
- ALC_FLR: 3
- ALC_LCD.1: 4
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 1
- A.MAINTENCE_PC: 1
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
- BSI:
- AIS 19: 1
- AIS 20: 1
- AIS 32: 1
- AIS41: 1
- AIS46: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH – Evaluation Body for IT Security, (confidential document) [8] Base-PP: Protection Profile Cryptographic Service Provider Light (CSPL) Version 1.0, 12: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20160906162354+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160906162432+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 473024
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
|
pdf_data/st_filename |
c0514_est.pdf |
1139V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0111-2019: 1
- BSI-CC-PP-0105: 1
- BSI-CC-PP-0105-V2-2020: 1
- BSI-CC-PP-0111: 1
- BSI-CC-PP-0112-: 1
- BSI-CC-PP-0112-2020: 2
- BSI-CC-PP-0113-2020: 3
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 2
- EAL2+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ALC:
- ALC_CMS.3: 4
- ALC_LCD.1: 2
- ATE:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 18
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 18
- FIA_UID.2.1: 1
- FIA_USB: 19
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 4
- FAU_GEN.1: 10
- FAU_GEN.1.1: 11
- FAU_GEN.1.2: 2
- FAU_STG.1: 3
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 3
- FAU_STG.3.1: 5
- FCS:
- FCS_CKM: 65
- FCS_CKM.1: 29
- FCS_CKM.2: 14
- FCS_CKM.4: 39
- FCS_CKM.4.1: 1
- FCS_CKM.5: 14
- FCS_CKM.5.1: 1
- FCS_COP: 123
- FCS_COP.1: 32
- FCS_RNG: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 30
- FDP_ACF: 9
- FDP_ACF.1: 17
- FDP_DAU: 12
- FDP_DAU.1: 3
- FDP_DAU.2: 12
- FDP_ETC: 3
- FDP_ETC.1: 2
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ETC.2: 6
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 23
- FDP_ITC: 12
- FDP_ITC.1: 18
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 32
- FDP_RIP: 3
- FDP_RIP.1: 1
- FDP_UCT: 1
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 4
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 10
- FIA_API.1: 9
- FIA_ATD.1: 4
- FIA_ATD.1.1: 1
- FIA_UAU.1: 4
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 14
- FIA_UAU.5.2: 2
- FIA_UAU.6: 3
- FIA_UAU.6.1: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 6
- FMT_MOF.1: 9
- FMT_MOF.1.1: 7
- FMT_MSA: 7
- FMT_MSA.1: 10
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.4: 7
- FMT_MTD: 23
- FMT_MTD.1: 28
- FMT_MTD.3: 18
- FMT_MTD.3.1: 1
- FMT_SAE.1: 5
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 9
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ESA: 12
- FPT_ESA.1: 15
- FPT_ESA.1.1: 1
- FPT_ESA.1.2: 1
- FPT_ESA.1.3: 1
- FPT_ESA.1.4: 1
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_ISA: 15
- FPT_ISA.1: 18
- FPT_ISA.1.1: 1
- FPT_ISA.1.2: 1
- FPT_ISA.1.3: 1
- FPT_ISA.1.4: 1
- FPT_ISA.1.5: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 4
- FPT_TCT: 13
- FPT_TCT.1: 7
- FPT_TDC: 9
- FPT_TDC.1: 20
- FPT_TIT: 18
- FPT_TIT.1: 13
- FPT_TIT.1.1: 2
- FPT_TIT.1.2: 1
- FPT_TST.1: 5
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 3
- FTP:
- FTP_ITC.1: 14
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MAINTENANCE_PC: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 8
- O.ADM_ROLE: 5
- O.AUD_GEN: 7
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.SEC_COMM: 8
- O.SWITCH_AUTH: 6
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-: 1
- OE.FC-SP_HBA: 2
- OE.HDD_ENC: 2
- OE.MAINTENANCE_PC: 3
- OE.MANAGEMENT_PC: 2
- OE.MANAGE_SECRET: 3
- OE.NOEVIL: 2
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 25
- AES-: 4
- AES-128: 8
- AES-256: 8
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
- SHA384: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- SCA:
- physical probing: 1
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110: 1
- BSI TR-03151: 3
- BSI TR-03153: 2
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
- IBM:
- SE: 3
- Secure Execution: 1
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
- RFC:
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 2
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-2: 3
- FIPS 180-4: 1
- FIPS 186-4: 1
- FIPS PUB 180-4: 6
- FIPS PUB 186-4: 14
- FIPS PUB 197: 3
- FIPS197: 10
- ICAO:
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 14888-: 4
- ISO/IEC 14888-2: 6
- ISO/IEC 18033-: 1
- ISO/IEC 18033-3: 4
- ISO/IEC 27001: 2
- ISO/IEC 9797-2: 3
- ISO/IEC18033-3: 1
- PKCS:
- PKCS #1: 6
- PKCS#1: 9
- PKCS#5: 2
- PKCS5: 1
- RFC:
- RFC2104: 9
- RFC5639: 12
- RFC6954: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: 八木
- /CreationDate: D:20160901154400+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160901154400+09'00'
- /Producer: Microsoft® Word 2010
- /Subject: CC EAL2 Security Target
- /Title: USP_V ST
- pdf_file_size_bytes: 1477873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
- /Author: X00010763
- /CreationDate: D:20211015113933+02'00'
- /ModDate: D:20211015113933+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - DTRUST_CSPLight_ST_V1.3.7.docx
- pdf_file_size_bytes: 1787801
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |