name |
System Software for e-STUDIO202L/232/282 V1.0 |
CA Directory r8.1 0608 (build 942) |
category |
Other Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
06.09.2012 |
not_valid_before |
29.03.2006 |
30.04.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3022-st.pdf |
manufacturer |
Toshiba TEC Corporation |
CA Technologies |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.ca.com |
security_level |
EAL3 |
EAL3 |
dgst |
79cf3cf36c8217af |
2be2ede185c90a0b |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
CCEVS-VR-0040-2007 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
1.0 |
8.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
- category: Network Access Control
- certification_date: 30.04.2007
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date:
- id: CCEVS-VR-VID3022
- product: CA Directory r8.1 0608 (build 942)
- scheme: US
- url: https://www.niap-ccevs.org/product/3022
- vendor: CA Technologies
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
st_vid3022-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-07-0040
- cert_item: CA Directory, r8.1 0608 (build 942) for the Sun Solaris Platform
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
- US:
- CCEVS-VR-06-3022: 23
- CCEVS-VR-07-0040: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_CAP.3: 1
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 1
- ADV_HLD.2: 1
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV: 1
- ATE_COV.2: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 2
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_SAR.1: 1
- FAU_SEL.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 3
- FIA_ATD.1: 1
- FIA_SOS.1: 2
- FIA_UAU: 3
- FIA_UAU.1: 1
- FIA_UAU.2: 1
- FIA_UID.1: 1
- FIA_UID.2: 1
- FMT:
- FMT_MSA: 2
- FMT_MTD: 2
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
- CVE:
- CVE-2004-0079: 1
- CVE-2005-3653: 1
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- Only - Out of Scope DXconsole DUA/LDUA The system configuration consists of two Sun SPARC Solaris 9 machines. On one: 1
- Out of Scope: 3
- and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA Figure 3. TOE’s physical scope by product components used 16 CA: 1
- before use. RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote Machine and Software is Out of Scope DXconsole SSLD Ingres db DUA/LDUA RPC DSA RPB DSA RPA DSA DXserver DUA/LDUA TOE machine Remote: 1
- iGateway affects the DXmanager module of eTrust Directory 8.1. DXmanager is not installed and out of scope for the evaluation. Also applies to the HTTP interface which is not an interface to the TOE. •: 1
- in scope) and the SSLD (out of scope) though not depicted: 1
- of the evaluation. Therefore, the cryptographic algorithms performed within the SSLD component are out of scope and not verified by this evaluation. Aspects of the following security functions are controlled : 1
- out of scope: 3
- used for the Developers Testing. The TOE DSA box includes the Ingres db (in scope) and the SSLD (out of scope) though not depicted. RPC DSA RPB DSA RPA DSA TOE DSA DUA/LDUA TOE machine Remote Machine For Test: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: wshanahan
- /CreationDate: D:20070717085537-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085839-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070717125458
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 184938
- pdf_hyperlinks: http://www.cygnacom.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
c0043_est.pdf |
st_vid3022-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 3
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 3
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 3
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 4
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 17
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 7
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 16
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 17
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 34
- FMT_MSA.1: 2
- FMT_MSA.3: 2
- FMT_MTD: 45
- FMT_MTD.1: 2
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 5
- FPT_RVM_EXP: 1
- FPT_SEP: 1
- FPT_SEP.1: 5
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC_EXP.1: 2
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.DIRECTORY_SYSTEM: 1
- A.DIRECTORY_SYSTEM_SECURITY_: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLI: 1
- A.DIRECTORY_SYSTEM_SECURITY_POLICY_: 1
- A.INTEROP: 2
- A.NO_EVIL: 2
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 3
- A.REMOTE_ADMIN_DUA_: 1
- A.REMOTE_ADMIN_DUA_ENVIRONMENT: 2
- A.USERS: 2
- D:
- O:
- O.AUDIT: 6
- O.MANAGE: 9
- O.MEDIATE: 7
- O.PARTIAL_SELF_: 1
- O.PARTIAL_SELF_PROTECTION: 3
- O.PARTIAL_TRUSTEDCOMM: 6
- O.TOE_ACCESS: 4
- OE:
- OE.AUDIT_ACCESS: 7
- OE.DISTRIBUTED_AUTHENTICA: 1
- OE.DISTRIBUTED_AUTHENTICATION: 4
- OE.PARTIAL_SELF_: 1
- OE.PARTIAL_SELF_PROTECTION: 2
- OE.PARTIAL_TRUSTEDCOMM: 7
- OE.TIME: 6
- T:
- T.MASQUERADE: 4
- T.TSF_COMPROMISE: 6
- T.UNAUTHORIZED_ACCESS: 3
- T.UNIDENTIFIED_ACTIONS: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /Author: krogers
- /Company: CygnaCom Solutions, Inc.
- /CreationDate: D:20070717085137-04'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20070717085341-04'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20070711135902
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 620673
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |