Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
MX-FR11 Version:C.10
JISEC-CC-CRP-C0227
Hitachi Command Suite Common Component Version: 7.0.1-00
JISEC-CC-CRP-C0303
name MX-FR11 Version:C.10 Hitachi Command Suite Common Component Version: 7.0.1-00
category Other Devices and Systems Access Control Devices and Systems
not_valid_after 31.07.2014 01.09.2016
not_valid_before 27.07.2009 15.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0227_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0227_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
manufacturer Sharp Corporation Hitachi, Ltd.
manufacturer_web https://sharp-world.com/ https://www.hitachi.com/
security_level EAL3 EAL2+, ALC_FLR.1
dgst 8b4a9c9bed43325e 3d4662c844b7ac14
heuristics/cert_id JISEC-CC-CRP-C0227 JISEC-CC-CRP-C0303
heuristics/extracted_sars ATE_DPT.1, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, AVA_VAN.2, ALC_DVS.1, ADV_ARC.1, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMS.3, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ADV_TDS.2, ADV_FSP.3, ASE_CCL.1, ALC_CMC.3 AGD_OPE.1, ADV_TDS.1, ALC_DEL.1, ALC_FLR.1, ALC_CMC.2, ASE_INT.1, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, ASE_ECD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ADV_FSP.2, ALC_CMS.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1
heuristics/extracted_versions 10 7.0.1
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0227
  • certification_date: 01.07.2009
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0227_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an “MFD”. One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD or the Flash memory in the MFD, - the erasure function, which overwrites random or constant numbers onto storage areas that store encrypted data, - the confidential file function, which protects image data that a user files with a password so as not to be abused by others, - the network protection function, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: MX-FR11
    • product_type: data protection function in Multi Function Device
    • report_link: https://www.ipa.go.jp/en/security/c0227_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0227_est.pdf
    • toe_version: C.10
    • vendor: Sharp Corporation
  • expiration_date: 01.07.2014
  • supplier: Sharp Corporation
  • toe_japan_name: MX-FR11 C.10
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0227_it9253.html
  • toe_overseas_name: MX-FR11 C.11
  • cert_id: JISEC-CC-CRP-C0303
  • certification_date: 01.08.2011
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Command Suite Common Component
    • product_type: Foundational Module Software
    • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
    • toe_version: 7.0.1-00
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.09.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
  • toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename c0227_erpt.pdf c0303_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0227-01: 1
    • Certification No. C0227: 1
  • JP:
    • CRP-C0303-01: 1
    • Certification No. C0303: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 3
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 3
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NETWORK: 1
    • A.OPERATOR: 1
  • T:
    • T.RECOVER: 1
    • T.REMOTE: 1
    • T.SPOOF: 1
    • T.TAMPER: 1
    • T.TAP: 1
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
    • A.VERSION: 1
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.UNAUTHORISED_ACCESS: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 2
  • TLS:
    • SSL:
      • SSL: 5
  • SSH:
    • SSH: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110907094910+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110907095202+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 314350
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 23
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110928100804+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110928100931+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 345195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename c0227_est.pdf c0303_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 3
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 17
    • FCS_CKM.1: 5
    • FCS_CKM.2: 3
    • FCS_CKM.4: 12
    • FCS_COP: 19
    • FCS_COP.1: 5
  • FDP:
    • FDP_IFC.1: 9
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 9
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_RIP: 1
    • FDP_RIP.1: 12
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL: 22
    • FIA_AFL.1: 4
    • FIA_SOS: 16
    • FIA_SOS.1: 2
    • FIA_UAU: 44
    • FIA_UAU.1: 10
    • FIA_UAU.2: 2
    • FIA_UAU.7: 2
    • FIA_UID: 24
    • FIA_UID.1: 10
    • FIA_UID.2: 2
  • FMT:
    • FMT_MOF: 27
    • FMT_MOF.1: 3
    • FMT_MSA.3: 5
    • FMT_MTD: 30
    • FMT_MTD.1: 4
    • FMT_SMF.1: 32
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 16
  • FTA:
    • FTA_TSE.1: 9
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 15
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NETWORK: 4
    • A.OPERATOR: 4
  • O:
    • O.FAXTONET: 6
    • O.FILTER: 9
    • O.MANAGE: 11
    • O.REMOVE: 7
    • O.RESIDUAL: 7
    • O.TRP: 8
    • O.USER: 6
  • OE:
    • OE.CIPHER: 3
    • OE.ERASEALL: 3
    • OE.FIREWALL: 3
    • OE.OPERATE: 3
    • OE.PC-USER: 4
    • OE.SUBNET: 3
    • OE.USER: 3
  • T:
    • T.RECOVER: 5
    • T.REMOTE: 3
    • T.SPOOF: 4
    • T.TAMPER: 3
    • T.TAP: 4
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.CLIENTS: 4
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 3
    • A.VERSION: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 4
    • OE.PASSWORD: 4
    • OE.SECURE_CHANNEL: 4
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
    • Rijndael:
      • Rijndael: 4
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 17
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 15
  • TLS:
    • SSL:
      • SSL: 11
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
  • ISO:
    • ISO/IEC 646: 4
pdf_data/st_metadata
  • /CreationDate: D:20110830154000+09'00'
  • /ModDate: D:20110830154000+09'00'
  • pdf_file_size_bytes: 326359
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
  • /Author: Hitachi, Ltd. Software Division
  • /CreationDate: D:20110926112144
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110926112144
  • /Producer: Microsoft® Office Word 2007
  • /Subject: HSCC-ST
  • /Title: Hitachi Command Suite Common Component ST
  • pdf_file_size_bytes: 455862
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different