name |
Voltage SecureMail Suite 2.0 |
Data Security Kit DA-SC03 V1.01 |
category |
Other Devices and Systems |
Multi-Function Devices |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
07.09.2012 |
13.12.2010 |
not_valid_before |
29.05.2007 |
31.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0060_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10129-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0060_est.pdf |
manufacturer |
Voltage Security |
Panasonic Communications Co., Ltd. |
manufacturer_web |
https://www.voltage.com/ |
https://www.panasonic.com/ |
security_level |
EAL2 |
EAL2 |
dgst |
71199d48be16022d |
0b538ce58096907c |
heuristics/cert_id |
CCEVS-VR-0029-2007 |
JISEC-CC-CRP-C0060 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 |
heuristics/extracted_versions |
2.0 |
1.01 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Secure Messaging
- certification_date: 29.05.2007
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date:
- id: CCEVS-VR-VID10129
- product: Voltage SecureMail Suite 2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10129
- vendor: Voltage Security
|
- cert_id: JISEC-CC-CRP-C0060
- certification_date: 01.10.2006
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cert_link: https://www.ipa.go.jp/en/security/c0060_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is a software product to protect the used document data which had been already stored on the HDD (Hard Disk Drive) after being processed by the digital imaging system from being disclosed illicitly. To realize them, The TOE offers the function to overwrite for residual data and the function to delete the security information including set values of the unit. Moreover, the hard disk drive lock mechanism is used to prevent any information leak in case of removing and taking out the HDD illegally. The TOE is offered as an optional product of Panasonic Communications Co., Ltd. Digital Imaging System DP-2330 / 3030, and provides the security functions by replacing with the standard bundled software of the digital imaging system.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Data Security Kit DA-SC03
- product_type: IT Product (data protection function in digital imaging system)
- report_link: https://www.ipa.go.jp/en/security/c0060_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0060_est.pdf
- toe_version: V1.01
- vendor: Panasonic System Networks Co., Ltd.
- expiration_date: 01.01.2011
- supplier: Panasonic System Networks Co., Ltd.
- toe_japan_name: Data Security Kit DA-SC03 V1.01
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0060_it6077.html
- toe_overseas_name: Data Security Kit DA-SC03 V1.01
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10129-vr.pdf |
c0060_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-07-0029
- cert_item: ® TM Voltage Security, Inc. Palo Alto, CA Voltage SecureMail Suite 2.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0060: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL2: 1
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.4: 1
- FCS_COP: 5
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.AUDIT_BACKUP: 1
- A.EXTSRVPROT: 1
- A.LOCATE: 1
- A.LOWEXP: 1
- A.NO_EVIL: 1
- A.PHYSICAL: 1
- A.SECURE_COMMS: 1
- A.USERDOCS: 1
|
- A:
- A.ADMIN: 1
- A.SE: 1
- A.SETSEC: 1
- T:
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
|
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:1999: 1
- ISO/IEC 18045:2005: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20070606103547-07'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /ModDate: D:20070606145721-04'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20070606173502
- /Title: D
- /_AdHocReviewCycleID: 301627650
- /_AuthorEmail: [email protected]
- /_AuthorEmailDisplayName: Rose Ignacio
- /_EmailSubject: Voltage VID 10129 Validation Report
- pdf_file_size_bytes: 223595
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author:
- /CreationDate: D:20070205121513+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20070205121619+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 265550
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
st_vid10129-st.pdf |
c0060_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 10
- ADO_IGS: 1
- ADO_IGS.1: 9
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 15
- ADV_RCR.1: 8
- ADV_SPM.1: 4
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 15
- AGD_USR: 1
- AGD_USR.1: 13
- ATE:
- ATE_COV.1: 8
- ATE_FUN.1: 13
- ATE_IND.2: 11
- AVA:
- AVA_SOF.1: 11
- AVA_VLA.1: 12
|
- ACM:
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 11
- ADV_HLD.1: 2
- ADV_RCR.1: 5
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 4
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN_EXP: 30
- FAU_GEN_EXP.1: 4
- FAU_GEN_EXP.2: 9
- FAU_GEN_EXP.2.1: 1
- FAU_SAR_EXP: 26
- FAU_SAR_EXP.1: 6
- FAU_SAR_EXP.3: 9
- FAU_SAR_EXP.3.1: 1
- FCO:
- FCO_NRO_EXP.1: 9
- FCO_NRO_EXP.1.1: 1
- FCO_NRO_EXP.1.2: 1
- FCO_NRO_EXP.1.3: 1
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 17
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_CKM_EXP: 33
- FCS_CKM_EXP.1: 4
- FCS_COP: 17
- FCS_COP.1: 25
- FCS_COP_EXP.1: 10
- FCS_COP_EXP.1.1: 1
- FDP:
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_SAR_EXP: 1
- FIA:
- FIA_UAU_EXP: 53
- FIA_UAU_EXP.2: 5
- FIA_UID: 5
- FIA_UID_EXP: 68
- FIA_UID_EXP.2: 5
- FMT:
- FMT_MSA: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 37
- FMT_MSA.2.1: 1
- FMT_MTD_EXP: 19
- FMT_MTD_EXP.1: 5
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.2: 1
- FMT_SMR_EXP: 21
- FMT_SMR_EXP.1: 9
- FPT:
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_RVM.1: 1
- FPT_RVM_EXP: 17
- FPT_RVM_EXP.1: 2
- FPT_SEP.1: 1
- FPT_SEP_EXP: 17
- FPT_SEP_EXP.1: 4
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FTP:
|
- FAU:
- FDP:
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 26
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_SOS.1: 30
- FIA_SOS.1.1: 2
- FIA_UAU.1: 19
- FIA_UAU.2: 34
- FIA_UAU.7: 26
- FIA_UAU.7.1: 2
- FIA_UID.1: 19
- FIA_UID.2: 36
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MTD.1: 41
- FMT_MTD.1.1: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 30
- FPT_RVM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 4
- A.AUDIT: 2
- A.AUDIT_BACKUP: 2
- A.EXTSRVPROT: 4
- A.LOCATE: 2
- A.LOWEXP: 2
- A.NO_EVIL: 2
- A.PHYSICAL: 4
- A.SECURE_COMMS: 2
- A.USERDOCS: 4
- O:
- O.ACCESS: 8
- O.ACCOUN: 4
- O.ALGS: 6
- O.AUDREC: 4
- O.DESTROY: 6
- O.GUIDAN: 6
- O.IDENTITY: 6
- O.KEYGEN: 4
- O.MANAGE: 8
- O.MEDIAT: 4
- O.PART_SEL_PRO: 6
- O.PROOF: 4
- O.SECUREKEYS: 6
- O.SECURE_COM: 5
- OE:
- OE.ACCOUN: 5
- OE.ADMTRA: 9
- OE.DOMAIN_SEP: 5
- OE.GENPUR: 5
- OE.MANAGE: 9
- OE.MEDIAT: 5
- OE.NOEVIL: 8
- OE.NO_BYPASS: 5
- OE.PHYSEC: 10
- OE.TIME: 6
- T:
- T.AUDACC: 4
- T.BYPASS: 2
- T.COMPROMISE: 2
- T.MISUSE: 4
- T.NOAUTH: 4
- T.SPOOF: 2
- T.USAGE: 4
|
- A:
- A.ADMIN: 4
- A.SE: 5
- A.SETSEC: 5
- O:
- O.HDLMNG: 6
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 3
- OE.AUTH: 4
- OE.HDD: 7
- OE.SE: 3
- T:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 2
- FIPS 140-2: 12
- FIPS 180-2: 1
- FIPS 186-2: 9
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- PKCS:
- X509:
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: 1800072
- /CreationDate: D:20070112151614+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20070112151614+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - DA-SC03英文ST20070112.doc
- pdf_file_size_bytes: 466258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 37
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |