name |
Symfoware Server Enterprise extended Edtion 4.0 |
Intel® SOA Expressway v2.7.0.4 and Intel® SOA Expressway v2.7.0.4 for Healthcare |
category |
Databases |
Boundary Protection Devices and Systems |
scheme |
JP |
CA |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
15.05.2017 |
not_valid_before |
26.11.2003 |
30.09.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/intel-soa-v2704-cert-eng.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1627_ST-Version_1_9%20(2).pdf |
manufacturer |
Fujitsu Limited |
Intel Corporation |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.intel.com |
security_level |
EAL4 |
EAL4+, ALC_FLR.1 |
dgst |
505e2adba5d4a6cf |
ab8096e5557ad548 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
383-4-121 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.0 |
2.7.0.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
intel-soa-v2704-cert-eng.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- CA:
- 383-4-121: 1
- 383-4-121-CR: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 197: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: 29 August 2011
- /CR_Version: 0.2
- /Client City: Oakbrook Terrace
- /Client Country: USA
- /Client Full Name: Intel Corporation
- /Client Postal Code: 60181
- /Client Short Name: Intel
- /Client State: Illinois
- /Client Street: 1815 South Meyers Road, Suite 150
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Microsoft
- /CreationDate: D:20111025093327-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: Intel Corporation
- /Developer Short Name: Intel
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4 Augmented
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1627-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: X.X
- /ETPlan_date: dd month yyyyy
- /ETProcRes_Date: dd month yyyyy
- /ETProcRes_Doc#: 1627-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: X.X
- /ETProc_Date: dd month yyyyy
- /ETProc_Doc#: 1627-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: X.X
- /ETReport_Date: X August 2011
- /ETReport_Doc#: 1627-000-D002
- /ETReport_Title: Preliminary Evaluation Technical Report
- /ETReport_TitleShort: PETR
- /ETReport_Version: 1.2
- /EWP_Date: 1 April 2011
- /EWP_Doc#: 1627-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.1
- /Eval number: 383-4-121
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: dd month yyyy
- /Keywords:
- /ModDate: D:20111025093514-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectNumber: 1627
- /ST_Date: 24 August 2011
- /ST_Title: Intel® SOA Expressway v2.7 Security Target
- /ST_Version: Version 1.8
- /SVR_Date: dd month yyyyy
- /SVR_Doc#: 1627-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: X.X
- /SV_City: TBD
- /Security Classification: EWA-Canada & Intel Proprietary
- /SourceModified: D:20111025133130
- /Sponsor: Intel®
- /Sponsor City: tbd
- /Sponsor Country: tbd
- /Sponsor Postal Code: tbd
- /Sponsor State: tbd
- /Sponsor Street: tbd
- /Subject:
- /TOE: SOA Expressway
- /TOE Short: SOAE
- /TOE Short with version: tbd
- /TOE Short-NoTM: SOAE v2.7.0.4
- /TOE Version: tbd
- /TOE with version: Intel® SOA Expressway v2.7.0.4 and SOA Expressway v2.7.0.4 for Healthcare
- /TOE-NoTM: tbd
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 82511
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
pdf_data/st_filename |
|
1627_ST-Version_1_9 (2).pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_FLR.2: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 8
- FAU_ARP.1.1: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 9
- FAU_SAR.3.1: 1
- FAU_SEL.1: 9
- FAU_SEL.1.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 7
- FAU_STG.3.1: 1
- FAU_STG.4: 10
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 2
- FCS_COP: 1
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 2
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 17
- FDP_IFC.1.1: 2
- FDP_IFF.1: 19
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_ITC.1: 8
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 10
- FIA_ATD.1.1: 2
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 12
- FIA_UAU.2.1: 1
- FIA_UAU.5: 13
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 23
- FMT_MOF.1.1: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 14
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_MTD.2: 9
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_REV.1: 17
- FMT_REV.1.1: 2
- FMT_REV.1.2: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 3
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FRU_RSA.1: 10
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 7
- FTA_SSL.3.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS: 3
- A.ASSET: 1
- A.DIRECT: 4
- A.GENPUR: 2
- A.LOWEXP: 4
- A.NOEVIL: 2
- A.NOREMO: 4
- A.PHYSEC: 2
- A.PUBLIC: 4
- A.REMACC: 2
- A.SINGEN: 4
- A.TIME_SOURCE: 3
- O:
- O.ACCOUN: 14
- O.ALARM: 9
- O.AUDIT: 10
- O.AUDREC: 4
- O.CRYPTOGRAPHY: 10
- O.EAL: 3
- O.ENCRYP: 6
- O.IDAUTH: 10
- O.LIMEXT: 4
- O.MEDIAT: 13
- O.ROLE: 7
- O.SECFUN: 11
- O.SECSTA: 5
- O.SELPRO: 8
- O.SINUSE: 6
- O.TOE_AVAILABLE: 11
- OE:
- OE.ACCESS: 2
- OE.ADMTRA: 4
- OE.ASSET: 2
- OE.CONSOLE: 2
- OE.DIRECT: 3
- OE.GENPUR: 3
- OE.GUIDAN: 3
- OE.GUIDANCE: 1
- OE.IDAUTH: 4
- OE.LOWEXP: 3
- OE.NOEVIL: 3
- OE.NOREMO: 3
- OE.PHYSCEC: 1
- OE.PHYSEC: 2
- OE.PUBLIC: 4
- OE.REMACC: 3
- OE.SINGEN: 3
- OE.TIME_SOURCE: 4
- T:
- T.ASPOOF: 4
- T.ATTACK_DATA: 3
- T.ATTACK_POTENTIAL: 5
- T.AUDACC: 2
- T.AUDFUL: 4
- T.AUDIT_UNDETECTED: 3
- T.BAD_ADMIN: 5
- T.BAD_CREDENTIALS: 3
- T.CAPTURE: 5
- T.DENIAL: 3
- T.ENHANCEDEXP: 5
- T.HIJACK: 3
- T.INTERNAL: 5
- T.LOWEXP: 1
- T.MEDIAT: 2
- T.MODIFY_: 1
- T.MODIFY_PROTOCOL: 4
- T.NOAUTH: 3
- T.OLDINF: 4
- T.PROCOM: 2
- T.REMOTE_ATTACK: 5
- T.REPEAT: 2
- T.REPLAY: 4
- T.SELPRO: 2
- T.SERVICE_MISUSE: 5
- T.UNAVAILABLE: 3
- T.USAGE: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 8
- FIPS 197: 2
- FIPS PUB 140-2: 2
- NIST:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: Mark Gauvreau
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: [dd month yyyy]
- /CR_Version: [x.x]
- /Client City: Oakbrook Terrace
- /Client Country: U.S.A.
- /Client Full Name: Intel Corporation
- /Client Postal Code: 60181
- /Client Short Name: Intel
- /Client State: Illinois
- /Client Street: 1815 South Meyers Road, Suite 150
- /Comments: CC V3.1 Evaluation Work Plan
Template Version 1_2
- /Company: EWA-Canada
- /CreationDate: D:20111123095733-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: Intel Corporation
- /Developer Short Name: Intel
- /EAL Level: 4+
- /EAL Level Base: 4
- /EAL Long: EAL 4+
- /EAL Short: EAL 4+
- /ETPlan_Doc#: 1627-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: [0.x]
- /ETPlan_date: [dd month yyyy]
- /ETProcRes_Date: [dd month yyyy]
- /ETProcRes_Doc#: 1627-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: [0.x]
- /ETProc_Date: [dd month yyyy]
- /ETProc_Doc#: 1627-000-D004
- /ETProc_Title: Evaluation Test Procedures
- /ETProc_Version: [0.x]
- /ETReport_Date: [dd month yyyy]
- /ETReport_Doc#: 1627-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_Version: [0.x]
- /EWP_Date: [dd month yyyy]
- /EWP_Doc#: 1627-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: [0.x]
- /Eval number: [TBD]
- /Eval_End_Date: [dd month yyyy (date on certificate)]
- /Eval_Start_Date: [dd month yyyy (registration)]
- /ModDate: D:20111123134717-05'00'
- /Producer: Adobe PDF Library 10.0
- /ProjectNumber: 1627
- /ST_Date: August 30, 2011
- /ST_Doc#: 1627-006
- /ST_Title: Intel® SOA Expressway v2.7.0.4 and Intel® SOA Expressway v2.7.0.4 for Healthcare Security Target
- /ST_Version: 1.9
- /SVR_Date: [dd month yyyy]
- /SVR_Doc#: 1627-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: [0.x]
- /SV_City: [site vist city/cities]
- /Security Classification: EWA-Canada & Intel Proprietary
- /SourceModified: D:20111123145656
- /Sponsor: Intel Corporation
- /Sponsor City: Oakbrook Terrace
- /Sponsor Country: U.S.A
- /Sponsor Postal Code: 60181
- /Sponsor State: Illinois
- /Sponsor Street: 1815 South Meyers Road, Suite 150
- /TOE: Intel® SOA Expressway
- /TOE Short: SOAE
- /TOE Short with version: SOAE Version 2.7.0.4
- /TOE Short-NoTM: SOAE
- /TOE Version: Version 2.7.0.4
- /TOE with version: Intel® SOA Expressway Version 2.7.0.4
- /Title: Evaluation Work Plan
- pdf_file_size_bytes: 1040341
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |