name |
Symfoware Server Enterprise extended Edtion 4.0 |
Panasonic Connect TOUGHBOOK Devices on Android 11 |
category |
Databases |
Mobility |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
16.12.2024 |
not_valid_before |
26.11.2003 |
16.12.2022 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-ci.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11315-st.pdf |
manufacturer |
Fujitsu Limited |
Panasonic Connect of North America |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.panasonic.com |
security_level |
EAL4 |
{} |
dgst |
505e2adba5d4a6cf |
29f8b0e8b53d064c |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
CCEVS-VR-11315-2022 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ALC_TSU_EXT.1, AGD_PRE.1 |
heuristics/extracted_versions |
4.0 |
11 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
- category: Mobility
- certification_date: 16.12.2022
- evaluation_facility: Gossamer Security Solutions
- expiration_date: 16.12.2024
- id: CCEVS-VR-VID11315
- product: Panasonic Connect TOUGHBOOK Devices on Android 11
- scheme: US
- url: https://www.niap-ccevs.org/product/11315
- vendor: Panasonic Connect of North America
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
pdf_data/cert_filename |
|
st_vid11315-ci.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID11315-2022: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20221220140031-05'00'
- /ModDate: D:20221220140031-05'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 182708
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0003.pdf |
st_vid11315-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-11315-2022
- cert_item: Panasonic Connect TOUGHBOOK Devices on Android 11
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
st_vid11315-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 11
- AGD_PRE: 1
- AGD_PRE.1: 7
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 5
- ALC_CMS: 1
- ALC_CMS.1: 6
- ALC_TSU_EXT: 2
- ALC_TSU_EXT.1: 2
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 1
- FAU_STG.4: 1
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 3
- FCS_CKM.2: 1
- FCS_CKM_EXT.1: 1
- FCS_CKM_EXT.2: 1
- FCS_CKM_EXT.3: 2
- FCS_CKM_EXT.4: 4
- FCS_CKM_EXT.4.1: 1
- FCS_CKM_EXT.5: 1
- FCS_CKM_EXT.6: 1
- FCS_CKM_EXT.7: 1
- FCS_CKM_EXT.8: 1
- FCS_COP: 9
- FCS_COP.1: 12
- FCS_RBG_EXT.1: 12
- FCS_STG_EXT.1: 1
- FCS_STG_EXT.2: 3
- FCS_STG_EXT.2.1: 1
- FCS_STG_EXT.3: 1
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 2
- FCS_TLSC_EXT.2: 1
- FCS_TLSC_EXT.3: 1
- FCS_TLSC_EXT.5: 1
- FCS_TLSS_EXT.1.1: 1
- FCS_TLS_EXT.1: 1
- FDP:
- FDP_ACC.1: 3
- FDP_ACF_EXT.1: 1
- FDP_BCK_EXT.1: 1
- FDP_DAR_EXT.1: 2
- FDP_DAR_EXT.2: 1
- FDP_IFC_EXT.1: 2
- FDP_STG_EXT.1: 1
- FDP_UPC_EXT: 2
- FIA:
- FIA_AFL_EXT.1: 2
- FIA_BLT_EXT.2: 1
- FIA_BLT_EXT.3: 1
- FIA_BLT_EXT.4: 1
- FIA_BLT_EXT.6: 1
- FIA_BLT_EXT.7: 1
- FIA_PAE_EXT.1: 1
- FIA_PMG_EXT.1: 2
- FIA_TRT_EXT.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 2
- FIA_UAU.6: 1
- FIA_UAU_EXT.1: 1
- FIA_UAU_EXT.2: 2
- FIA_UAU_EXT.2.1: 3
- FMT:
- FMT_MOF_EXT.1: 2
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 2
- FMT_SMF_EXT.1: 3
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 1
- FPT:
- FPT_AEX_EXT.1: 1
- FPT_AEX_EXT.2: 1
- FPT_AEX_EXT.3: 1
- FPT_AEX_EXT.4: 1
- FPT_BBD_EXT.1: 1
- FPT_JTA_EXT.1: 1
- FPT_KST_EXT.1: 1
- FPT_KST_EXT.2: 1
- FPT_KST_EXT.3: 1
- FPT_NOT_EXT.1: 1
- FPT_STM.1: 1
- FPT_TST_EXT: 3
- FPT_TST_EXT.1: 1
- FPT_TUD_EXT.1: 1
- FPT_TUD_EXT.2: 1
- FTA:
- FTA_SSL_EXT.1: 1
- FTA_TAB.1: 1
- FTP:
- FTP_BLT_EXT: 2
- FTP_BLT_EXT.1: 1
- FTP_BLT_EXT.2: 1
- FTP_ITC_EXT: 1
- FTP_ITC_EXT.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 28
- AES-128: 1
- AES-256: 15
- constructions:
- MAC:
- CMAC: 1
- HMAC: 6
- HMAC-SHA-256: 3
- HMAC-SHA-384: 2
- HMAC-SHA-512: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 8
- SHA-384: 3
- SHA-512: 3
- SHA256: 1
- scrypt:
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
- IPsec:
- TLS:
- TLS:
- TLS: 64
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 2
- VPN:
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XEX:
- XTS:
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- P-256: 8
- P-384: 6
- P-521: 4
- secp256r1: 3
- secp384r1: 3
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_GCM_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_GCM_SHA384: 2
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 180-4: 3
- FIPS 186-4: 6
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 800-108: 4
- SP 800-38A: 6
- SP 800-38B: 1
- SP 800-38C: 2
- SP 800-38D: 1
- SP 800-38E: 2
- SP 800-38F: 1
- SP 800-56A: 1
- SP 800-90A: 2
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 1
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 4
- RFC 5288: 3
- RFC 5289: 8
- RFC 5746: 1
- RFC 6125: 1
- RFC 6960: 1
- RFC 8017: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20221220135411-05'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20221220135411-05'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1298183
- pdf_hyperlinks: https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9411, http://www.wi-fi.org/certification, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9459, https://developer.android.com/reference/android/app/admin/SecurityLog#constants_1, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9458, http://www.globalplatform.org/mediaguidetee.asp, https://developer.android.com/reference/javax/net/ssl/HttpsURLConnection, https://na.panasonic.com/us/support/computers-tablets-handhelds-get-service-support, https://developer.android.com/reference/javax/net/ssl/SSLSocket, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9410, mailto:[email protected], mailto:[email protected], https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=8370, https://developer.android.com/reference/packages, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0487a.f/index.html, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=15047, https://source.android.com/setup/contribute/report-bugs, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?product=9460, https://source.android.com/devices/architecture/kernel/modular-kernels#core-kernel-requirements, https://na.panasonic.com/us/support/computers-tablets-handhelds-security-updates, https://csrc.nist.gov/projects/cryptographic-algorithm-validation-program/details?validation=35371, https://developer.android.com/reference/android/app/admin/SecurityLog.SecurityEvent, https://source.android.com/devices/tech/security/index.html, http://developer.android.com/reference/android/bluetooth/package-summary.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 67
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |