Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
383-4-172
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
JISEC-CC-CRP-C0286
name EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™ Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
category Other Devices and Systems Multi-Function Devices
scheme CA JP
not_valid_after 15.05.2017 08.04.2016
not_valid_before 30.05.2011 29.03.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v531-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0286_est.pdf
manufacturer EMC Corporation Ricoh Company, Ltd.
manufacturer_web https://www.emc.com/ https://www.ricoh.com/
dgst 5c135ac1bf057d70 8a8d0f5b96ee95fb
heuristics/cert_id 383-4-172 JISEC-CC-CRP-C0286
heuristics/cert_lab CANADA []
heuristics/extracted_versions 7.0, 5.31 7.34, 01.12, 1.02, 1.1, 02.00.00, 1.09, 1.05, 1.00, 1.01, 1.03, 1.10
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0286
  • certification_date: 01.03.2011
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0286_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of "IEEE Std 2600.1-2009", which is an international security standard for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I HDD Encryption Unit: HDD Encryption Unit Type A
    • product_type: Multi Function Product
    • protection_profile: IEEE Std 2600.1-2009
    • report_link: https://www.ipa.go.jp/en/security/c0286_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0286_est.pdf
    • toe_version: -Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 -Hardware Ic Key 1100 Ic Hdd 01 -Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.04.2016
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0286_it0300.html
  • toe_overseas_name: Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP:Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU:Fax Option Type 3351 DataOverwriteSecurity Unit:DataOverwriteSecurity Unit Type I HDD Encryption Unit:HDD Encryption Unit Type A < Cont. >
heuristics/protection_profiles {} 32475ccb695b1644
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf
pdf_data/report_filename emc-vnx-v531-cert-eng.pdf c0286_erpt.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-172-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-172: 1
    • 383-4-172-CR: 1
  • JP:
    • CRP-C0286-01: 1
    • Certification No. C0286: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 4
    • EAL 3+: 3
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 3
  • TLS:
    • SSL:
      • SSL: 2
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /AM_ACPP_Date: [dd month yyyy]
  • /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
  • /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
  • /AM_ACPP_Version: [AM_AMCPP_Version]
  • /AM_IAR_Date: [dd month yyyy]
  • /AM_IAR_Doc#: [AM_IAR_Doc#]
  • /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
  • /AM_IAR_Version: [AM_IAR_Version]
  • /AM_ST Date: [dd month yyyy]
  • /AM_ST Title: [AM_ST Title]
  • /AM_ST Version: [AM_ST Version]
  • /AM_TOE: [AM_TOE]
  • /AM_TOE Short: [AM_TOE Short]
  • /AM_TOE Version: [AM_TOE Version]
  • /Author: sjackson
  • /CC Version: 3.1R3
  • /CC date: July 2009
  • /CEM Version: 3.1R3
  • /CEM date: July 2009
  • /CR_Date: TBD
  • /CR_Version: 1.0
  • /Client City: Hopkinton
  • /Client Country: USA
  • /Client Full Name: EMC Corporation
  • /Client Postal Code: 01748
  • /Client Short Name: EMC
  • /Client State: MA
  • /Client Street: 171 South Street
  • /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
  • /Company: Hewlett-Packard
  • /CreationDate: D:20110708105045-04'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer Long Name: EMC Corporation
  • /Developer Short Name: EMC
  • /EAL Level: 3+
  • /EAL Level Base: 3
  • /EAL Level Text: 3 augmented
  • /EAL Long: EAL 3 Augmented
  • /EAL Short: EAL 3+
  • /ER Document Date: 15 September 2010
  • /ER Version: Version 1.0
  • /ETPlan_Doc#: 1683-000-D003
  • /ETPlan_Title: Evaluation Test Plan
  • /ETPlan_Version: 1.0
  • /ETPlan_date: 7 April 2011
  • /ETProcRes_Date: 7 April 2011
  • /ETProcRes_Doc#: 1683-000-D004
  • /ETProcRes_Title: Evaluation Test Procedures and Test results
  • /ETProcRes_Version: 1.0
  • /ETProc_Date: 7 April 2011
  • /ETProc_Doc#: 1683-000-D004
  • /ETProc_Title: Evaluation Test Procedures and Test results
  • /ETProc_Version: 1.0
  • /ETReport_Date: 30 May 2011
  • /ETReport_Doc#: 1683-000-D002
  • /ETReport_Title: Evaluation Technical Report
  • /ETReport_TitleShort: ETR
  • /ETReport_Version: 1.2
  • /EWP_Date: 12 November 2010
  • /EWP_Doc#: 1683-000-D001
  • /EWP_Title: Evaluation Work Plan
  • /EWP_Version: 1.0
  • /Eval number: 383-4-172
  • /Eval_End_Date: 1 July 2011
  • /Eval_Start_Date: 2 August 2010
  • /Keywords:
  • /LeadEvaluator: Greg Lague
  • /LeadEvaluatorInitials: GL
  • /ModDate: D:20110708105130-04'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ProjectManager: M. Gauvreau
  • /ProjectManagerInitials: MG
  • /ProjectNumber: 1683
  • /ST_Date: 27 May 2011
  • /ST_Title: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /ST_Version: 0.8
  • /SVC_Date: 9 December 2009
  • /SVC_Doc#: 1683-000-D007
  • /SVC_Title: Site Visit Checklist
  • /SVC_Version: 0.1
  • /SVR_Date: 7 April 2011
  • /SVR_Doc#: 1683-000-D006
  • /SVR_Title: Site Visit Report
  • /SVR_Version: 1.0
  • /SV_City: Hopkinton, MA
  • /Security Classification: EWA-Canada & EMC Proprietary
  • /SourceModified: D:20110708141631
  • /Sponsor: EMC
  • /Sponsor City: Hopkinton
  • /Sponsor Country: USA
  • /Sponsor Postal Code: 01748
  • /Sponsor State: MA
  • /Sponsor Street: 171 South Street
  • /Subject:
  • /TOE: EMC® VNX OE for Block v5.31 with Unisphere™ running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE (VNX for File v7.0 and VNX for Block v5.31) with Unisphere™ running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /TOE Short: EMC® VNX OE
  • /TOE Short with version: EMC® VNX OE
  • /TOE Short-NoTM: EMC® VNX OE
  • /TOE Version: Block v5.31 and File v7.0
  • /TOE with version: EMC® VNX OE for Block v5.31 and File v7.0 with Unisphere™ running on VNX Series Hardware
  • /TOE-NoTM: EMC VNX OE for Block v5.31 and File v7.0 with Unisphere running on VNX Series Hardware
  • /Title: EAL X+ Evaluation of [Developer Long Name]
  • pdf_file_size_bytes: 89946
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 12
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110726170118+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110726170221+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 577395
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename emc-vnx-v531-sec-eng.pdf c0286_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 4
  • EAL:
    • EAL3: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_FLR.2: 3
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 2
    • FDP_ACF: 17
    • FDP_ACF.1: 8
    • FDP_SDI.1: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 32
    • FMT_MSA.1: 2
    • FMT_MSA.3: 4
    • FMT_MTD: 18
    • FMT_MTD.1: 3
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 7
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 32
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 7
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 28
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 4
    • FPT_FDI_EXP.1: 10
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 12
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.PROTECT: 2
    • A.TIMESTAMP: 2
  • O:
    • O.ADMIN: 23
    • O.AUDIT: 4
    • O.AUDIT_REVIEW: 4
    • O.BYPASS: 7
    • O.PROTECT: 16
  • OE:
    • OE.PROPER_NAME_ASSIGNME: 2
    • OE.PROPER_NAME_ASSIGNMEN: 1
    • OE.SECURE_COMMUNICATIO: 6
    • OE.SECURE_COMMUNICATION: 1
    • OE.SECURE_SERVERS: 7
    • OE.TIME: 3
  • T:
    • T.DATA_CORRUPTION: 2
    • T.IMPROPER_CONFIG: 2
    • T.IMPROPER_SERVER: 2
    • T.MEDIATE_ACCESS: 2
    • T.UNAUTH: 2
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 2
  • O:
    • O.AUDIT: 9
    • O.CONF: 16
    • O.DOC: 14
    • O.FUNC: 8
    • O.INTERFACE: 8
    • O.PROT: 8
    • O.SOFTWARE: 8
    • O.STORAGE: 9
    • O.USER: 20
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 5
    • OE.USER: 18
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 4
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • FIPS:
    • FIPS197: 2
pdf_data/st_metadata
  • /Author: Greg Milliken
  • /CreationDate: D:20110527131502Z
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110621111006-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: EMC® VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Model VNX5100™ and EMC® VNX OE for File v7.0 and VNX OE for Block v5.31 with Unisphere™ v7.0 running on VNX Series Hardware Models VNX5300™, VNX5500™, VNX5700™, and VNX7500™
  • /Title: Security Target
  • pdf_file_size_bytes: 887892
  • pdf_hyperlinks: mailto:[email protected], http://www.corsec.com/, http://www.emc.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author: p000266068
  • /CreationDate: D:20110601142541
  • /Creator: MP_2851_P2600_ST_1.00_ENG20110520.doc - Microsoft Word
  • /Producer: Acrobat PDFWriter 5.0 Windows NT
  • /Title: MP_2851_P2600_ST_1.00_ENG20110520.doc
  • pdf_file_size_bytes: 789628
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different