Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Symfoware Server Enterprise extended Edtion 4.0
JISEC-CC-CRP-C0003
EOS-1D Mark II firmware Ver.1.0.1
JISEC-CC-CRP-C0010
name Symfoware Server Enterprise extended Edtion 4.0 EOS-1D Mark II firmware Ver.1.0.1
category Databases Other Devices and Systems
not_valid_after 10.12.2010 20.12.2010
not_valid_before 26.11.2003 01.01.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_est.pdf
manufacturer Fujitsu Limited Canon Inc.
manufacturer_web https://www.fujitsu.com/ https://www.canon.com/
security_level EAL4 EAL2+, ALC_DVS.1
dgst 505e2adba5d4a6cf b0c543b69416411f
heuristics/cert_id JISEC-CC-CRP-C0003 JISEC-CC-CRP-C0010
heuristics/extracted_sars {} ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 4.0 1.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0133
  • certification_date: 01.11.2007
  • claim: EAL1
  • enhanced:
    • assurance_level: EAL1
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
    • product: Systemwalker Operation Manager Enterprise Edition
    • product_type: IT Product (Operation and maintenance supporting software)
    • toe_version: V13.2.0 (Linux for Itanium)
    • vendor: Fujitsu Limited
  • expiration_date: 01.10.2013
  • supplier: Fujitsu Limited
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
  • toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
  • toe_overseas_link: None
  • toe_overseas_name: -----
  • cert_id: JISEC-CC-CRP-C0010
  • certification_date: 01.08.2004
  • claim: EAL2+ ALC_DVS.1
  • enhanced:
    • assurance_level: EAL2+ALC_DVS.1
    • description: PRODUCT DESCRIPTION The product is EOS-1D Mark II digital camera in which the firmware of the digital camera (TOE) was included. Unlike the conventional 35mm film photos, the photos taken by the digital camera have various merits. For example, the photos taken by digital camera do not require development and printing, these photos do no have secular degradation, and these photos are easy to store, search and transmit. On the other hand, because of digitized photos, there are some demerits that digitized photos have the feature that processing and alteration can be easily performed using photo retouch tools. In using the photos taken by the digital camera as the evidence, the integrity of the photos is becoming a big issue. The firmware which is TOE provides the function that generate the verification data, which verify the integrity of the photos taken by EOS-1D Mark II. Please refer to "EOS-1D Mark II" on the following URLs for detail information about the product. (English) http://www.canon.co.jp/Imaging/BeBit-e.html
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
    • product: EOS-1D Mark II firmware Ver.1.0.1
    • product_type: IT product (Embedded software)
    • vendor: Canon Inc.
  • expiration_date: 01.07.2011
  • revalidations: [frozendict({'date': '2005-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023_02.html'})]
  • supplier: Canon Inc.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023.html
  • toe_japan_name: EOS-1D Mark II firmware Ver.1.0.1
  • toe_overseas_link: None
  • toe_overseas_name: EOS-1D Mark II N firmware Ver.1.0.1A
pdf_data/report_filename c0003.pdf c0010_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0010-01: 1
    • Certification No. C0010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 1
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_DVS.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.TAMPER: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
  • FIPS:
    • FIPS PUB 198: 1
  • ISO:
    • ISO/IEC 15408:1999: 1
pdf_data/report_metadata
  • /CreationDate: D:20040526154221+09'00'
  • /ModDate: D:20040526154221+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 12495
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20051222105917+09'00'
  • /ModDate: D:20051222105917+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 86516
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename c0010_est.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 6
  • ADO:
    • ADO_DEL.1: 5
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 12
    • ADV_HLD.1: 8
    • ADV_RCR.1: 6
  • AGD:
    • AGD_ADM.1: 9
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 9
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 5
    • ATE_IND.2: 6
  • AVA:
    • AVA_SOF.1: 6
    • AVA_VLA.1: 4
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 4
    • FCS_COP: 2
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 2
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.2: 6
  • FPT:
    • FPT_RVM.1: 1
  • FTP:
    • FTP_SEP.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.TAMPER: 5
  • O:
    • O.GEN_KEY: 8
    • O.GEN_VD: 9
  • OE:
    • OE.LOG_TAMER: 2
    • OE.LOG_TAMPER: 8
    • OE.PHS_TAMPER: 10
pdf_data/st_keywords/vendor
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 198: 4
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function: 1
    • cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function. 6.4 Assurance Measures This section provides the TOE assurance: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20051222105245+09'00'
  • /ModDate: D:20051222105245+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 106178
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
state/report/convert_garbage True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different