Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PhenoStor® Kartenlesegerät GRE100010
BSI-DSZ-CC-0373-2007
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
JISEC-CC-CRP-C0200
name PhenoStor® Kartenlesegerät GRE100010 Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
category ICs, Smart Cards and Smart Card-Related Devices and Systems Access Control Devices and Systems
scheme DE JP
not_valid_after 01.09.2019 08.04.2014
not_valid_before 09.03.2007 24.12.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0373a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0373b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf
manufacturer Bayer Innovation GmbH Hitachi, Ltd.
manufacturer_web https://www.bayer-innovation.com/ https://www.hitachi.com/
security_level EAL3 EAL2
dgst 8813a6c03f1bba58 96e36510c2c8ba64
heuristics/cert_id BSI-DSZ-CC-0373-2007 JISEC-CC-CRP-C0200
heuristics/cert_lab BSI []
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ATE_COV.2, ASE_TSS.1, AGD_ADM.1, ATE_FUN.1, ATE_DPT.1, AVA_VLA.4, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions - 14, 32, 00, 02, 60
heuristics/report_references/directly_referencing ANSSI-CC-2005/41 {}
heuristics/report_references/indirectly_referencing ANSSI-CC-2003/18, ANSSI-CC-2005/39, ANSSI-CC-2005/41 {}
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0200
  • certification_date: 01.12.2008
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
    • product_type: IT Product (Storage Control Software)
    • report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
    • toe_version: 60-02-32-00/00(R6-02A-14)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.04.2014
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
  • toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename 0373a.pdf c0200_erpt.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0373-2007
    • cert_item: PhenoStor® Card Reader GRE100010
    • cert_lab: BSI
    • developer: Bayer Innovation GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • AU:
    • Certification Report 2005/41: 2
  • DE:
    • BSI-DSZ-CC-0373-2007: 20
  • FR:
    • Certification Report 2005/41: 2
  • JP:
    • CRP-C0200-01: 1
    • Certification No. C0200: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 3
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 6
    • EAL4: 5
    • EAL5: 7
    • EAL5 augmented: 1
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_CAP.3: 1
    • ACM_SCP: 2
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.1: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 4
    • AGD_USR: 2
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_PPC.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.1: 1
    • AVA_MSU.3: 1
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA: 3
    • AVA_VLA.1: 1
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 2
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
    • FDP_ETC.2: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP.1: 1
    • FDP_SDI.2: 1
    • FDP_UCT.1: 2
    • FDP_UIT.1: 2
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_PHP.3: 1
    • FPT_SEP.1: 1
    • FPT_TST.1: 1
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.ILLEGAL_SOFT: 1
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.ILLEGAL_XCNTL: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
  • STMicroelectronics:
    • STMicroelectronics: 4
  • Cisco:
    • Cisco: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 1
    • AIS 36: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
pdf_data/report_keywords/javacard_packages
  • com:
    • com.zip: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 1.2, 18.12.2006, Evaluation Technical Report BSI-CC-DSZ-0373, T-Systems GEI GmbH (confidential document) [9] Smartcard IC Platform Protection Profile, Version 1.0, July 2001, BSI registration ID: 1
    • Version 1.8, 30.10.2006 , Security Target PhenoStor® Card Reader GRE100010, Bayer Innovation GmbH (confidential document) [7] Security Target BSI-DSZ-0373-2007, Version 1.1, 08.03.2007 , Security Target Lite PhenoStor®: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20070320111017+01'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung, Bayer Innovation GmbH, PhenoStor® Card Reader GRE100010
  • /ModDate: D:20070326135055+02'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20070320100956
  • /Title: Certification Report BSI-DSZ-CC-0373-2007
  • pdf_file_size_bytes: 326817
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
  • /CreationDate: D:20090401163719+09'00'
  • /ModDate: D:20090401163719+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 147813
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename 0373b.pdf c0200_est.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002-2001: 3
    • BSI-PP-0002-2001: 10
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 3
    • EAL 5+: 1
    • EAL3: 14
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 5
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
    • ADV_SPM: 2
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 3
    • ALC_DVS.2: 1
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_MSU.3: 1
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
    • AVA_VLA.4: 1
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 87
    • FCS_CKM.1: 16
    • FCS_CKM.2: 2
    • FCS_CKM.4: 17
    • FCS_COP: 83
    • FCS_COP.1: 18
    • FCS_RND: 8
    • FCS_RND.1: 13
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 14
    • FDP_ACC.2: 14
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 7
    • FDP_ITC: 2
    • FDP_ITC.1: 27
    • FDP_ITC.1.1: 2
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 2
    • FDP_ITC.2: 3
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDI: 1
    • FDP_SDI.2: 7
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT: 17
    • FDP_UCT.1: 3
    • FDP_UIT: 26
    • FDP_UIT.1: 8
  • FIA:
    • FIA_UAU: 1
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 10
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 38
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 4
    • FMT_MTD: 14
    • FMT_MTD.1: 3
    • FMT_SMF: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 16
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 10
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 19
    • FTP_ITC.1: 12
    • FTP_TRP.1: 3
  • FAU:
    • FAU_GEN.1: 21
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 11
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 13
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 12
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 16
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 27
    • FIA_ATD.1: 6
    • FIA_MSA.1.1: 1
    • FIA_MSA.3.1: 1
    • FIA_MSA.3.2: 1
    • FIA_SOS: 29
    • FIA_SOS.1: 2
    • FIA_UAU.1: 21
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 17
    • FIA_UAU.5: 19
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 22
    • FIA_USB: 27
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.2: 9
    • FMT_MSA.3: 16
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 32
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 32
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 17
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.USE_DIAG: 3
    • A.USE_SYS: 3
  • A:
    • A.CONNECT_STORAGE: 3
    • A.ILLEGAL_SOFT: 3
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 6
    • O.HOST_ACCESS: 8
    • O.HOST_AUTH: 5
    • O.SEC_COMM: 8
  • OE:
    • OE.CONNECT_STORAGE: 3
    • OE.ILLEGAL_SOFT: 2
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.NOEVIL_MNT: 1
    • OE.PHYSICAL_SEC: 3
  • T:
    • T.CHG_CONFIG: 3
    • T.ILLEGAL_XCNTL: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 8
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 31
      • Triple-DES: 18
      • TripleDES: 4
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA-PSS: 2
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 20
      • SHA1: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
  • TLS:
    • SSL:
      • SSL: 16
      • SSLv3.0: 3
    • TLS:
      • TLS: 3
      • TLSv1.0: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 13
  • ECB:
    • ECB: 1
  • OFB:
    • OFB: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • SCA:
    • physical probing: 3
    • side channel: 1
    • side-channel: 4
pdf_data/st_keywords/tee_name
  • other:
    • T6: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS20: 4
  • FIPS:
    • FIPS PUB 180-1: 3
  • ISO:
    • ISO/IEC 11770-: 2
  • PKCS:
    • PKCS #1: 5
  • CC:
    • CCMB-2005-08-001: 4
    • CCMB-2005-08-002: 3
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • end devices over the interface unit (the IU – Interface Unit – and the peripheral devices are out of scope of the evaluation) using cryptographically protected external communication interfaces. All the: 1
    • out of scope: 2
    • the IU – Interface Unit – and the peripheral devices are out of scope of the evaluation: 1
    • the TOE security functional requirements is SOF-medium. The strength of cryptographic algorithms is out of scope of the CC evaluation [5]. This chapter contains the descriptions of all derived functional: 1
pdf_data/st_metadata
  • /Author: escrypt GmbH - Embedded Security
  • /CreationDate: D:20070308174144+01'00'
  • /Creator: pdfFactory www.context-gmbh.de
  • /ModDate: D:20070326135153+02'00'
  • /Producer: pdfFactory 2.44 (Windows XP Professional German)
  • /Title: Security Target Lite, PhenoStor GRE100010 Card Reader
  • pdf_file_size_bytes: 494120
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 99
  • /Author: 八木
  • /Company: Hitachi
  • /CreationDate: D:20090330094022+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /ModDate: D:20090330094033+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Subject: CC EAL2 Security Target
  • /Title: USP_V ST
  • pdf_file_size_bytes: 516948
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different