Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
STARCOS 3.4 ID Tachograph version C2
NSCIB-CC-09-11192-CR2
Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A)
JISEC-CC-CRP-C0315
name STARCOS 3.4 ID Tachograph version C2 Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A)
category ICs, Smart Cards and Smart Card-Related Devices and Systems Access Control Devices and Systems
scheme NL JP
status active archived
not_valid_after 02.09.2025 03.10.2016
not_valid_before 02.09.2010 30.09.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_est.pdf
manufacturer G+D Mobile Security GmbH Hitachi, Ltd.
manufacturer_web https://www.gi-de.com/de/de/mobile-security/ https://www.hitachi.com/
security_level ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VAN.5 EAL2
dgst 8e597216ef8fc1a9 eecf16a3a9948989
heuristics/cert_id NSCIB-CC-09-11192-CR2 JISEC-CC-CRP-C0315
heuristics/extracted_sars ALC_DVS.2, ATE_COV.2, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ADV_TDS.3, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.4 02, 70, 05, 00
heuristics/report_references/directly_referencing ANSSI-CC-2009/24 {}
heuristics/report_references/indirectly_referencing ANSSI-CC-2009/24, ANSSI-CC-2008/10, ANSSI-CC-2009/22, ANSSI-CC-2009/10 {}
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0315
  • certification_date: 01.09.2011
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
    • product_type: Control Program for storage system
    • report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
    • toe_version: 70-02-05-00/00(R7-02-06A)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.10.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html
  • toe_japan_name: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A)
  • toe_overseas_link: None
  • toe_overseas_name: -----
maintenance_updates
pdf_data/report_filename Certification_Report_NSCIB-CC-09-11192-CR2.pdf c0315_erpt.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-2009/24: 1
  • NL:
    • NSCIB-09-11192: 1
    • NSCIB-CC-09-11192: 3
    • NSCIB-CC-09-11192-CR: 1
    • NSCIB-CC-09-11192-CR2: 16
  • JP:
    • CRP-C0315-01: 1
    • Certification No. C0315: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 1
    • EAL5+: 1
    • EAL7: 1
  • EAL:
    • EAL2: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 1
    • ADV_IMP.2: 3
    • ADV_TDS: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.2: 3
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 2
    • A.MANAGEMENT_PC: 1
    • A.MANAGE_SECRET: 1
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.HDD_REUSE: 1
    • T.HDD_THEFT: 1
    • T.ILLEGAL_XCNTL: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 2
    • Giesecke & Devrient: 5
  • Cisco:
    • Cisco: 3
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
    • TLS:
      • TLS: 2
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 2
    • SPA: 3
  • other:
    • JIL: 2
pdf_data/report_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC24036RCU: 3
    • ATMEL ATV4/ATV4: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 25
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20100903105626+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
  • /Title: Certification Report NSCIB-CC-09-11192-CR2.pdf
  • pdf_file_size_bytes: 195336
  • pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 17
  • /CreationDate: D:20111222113805+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111222113848+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 474751
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
pdf_data/st_filename GDM_STA34_TACHO_ASE_Lite.pdf c0315_est.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4+: 1
    • EAL 5: 2
    • EAL4: 10
    • EAL4 augmented: 5
    • EAL5: 2
    • EAL5+: 2
  • ITSEC:
    • ITSEC E3 high: 1
  • EAL:
    • EAL2: 3
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 2
    • ADO_IGS: 1
    • ADO_IGS.1: 1
    • ADO_IGS.2: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.2: 12
    • ADV_SPM.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.5: 2
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 3
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN.5: 11
    • AVA_VLA.4: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_DAU.1.1: 4
    • FAU_GEN.1: 3
    • FAU_SAA.1: 4
    • FAU_SAA.1.1: 3
    • FAU_SAA.1.2: 1
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 3
    • FCO_NRO.1.1: 3
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 3
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 5
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 8
    • FCS_RND.1: 3
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 4
    • FDP_ACC.2: 5
    • FDP_ACC.2.1: 5
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 2
    • FDP_DAU.1: 4
    • FDP_DAU.1.2: 3
    • FDP_ETC: 1
    • FDP_ETC.1: 2
    • FDP_ETC.1.1: 4
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 4
    • FDP_ETC.2.1: 4
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 3
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 5
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 5
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 4
    • FDP_ITC.2: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 4
    • FDP_SDI: 1
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 4
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 5
    • FIA_AFL.1.2: 3
    • FIA_ATD: 1
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 4
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.3.1: 4
    • FIA_UAU.3.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 4
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 2
    • FIA_USB.1.1: 4
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 4
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 4
    • FMT_SMR: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 2
    • FPR_UNO.1.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 4
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 4
    • FPT_TDC: 2
    • FPT_TDC.1: 1
    • FPT_TDC.1.1: 4
    • FPT_TDC.1.2: 2
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_TST.1.1: 4
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 3
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 13
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 10
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 19
    • FIA_ATD.1: 6
    • FIA_SOS: 20
    • FIA_SOS.1: 2
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 16
    • FIA_UID.2.1: 1
    • FIA_USB: 18
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 15
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 15
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM: 1
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 9
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.CLON: 1
    • O.DEV: 1
    • O.DEV_DIS_ES: 4
    • O.DLV_AUDIT: 1
    • O.DLV_DATA: 1
    • O.DLV_PROTECT: 1
    • O.DLV_RESP: 1
    • O.FLAW: 1
    • O.INIT_ACS: 3
    • O.MOD_MEMORY: 1
    • O.OPERATE: 1
    • O.RND: 1
    • O.SOFT_DLV: 3
    • O.TAMPER_ES: 2
    • O.TEST_OPERATE: 1
    • O.USE_DIAG: 1
  • OT:
    • OT.PERSONALIZATION: 1
    • OT.TAMPER_ES: 13
  • T:
    • T.CLON: 2
    • T.DIS_DEL: 2
    • T.DIS_INFO: 2
    • T.DIS_TEST_ES: 1
    • T.MOD: 1
    • T.MOD_DEL: 2
    • T.MOD_EXE: 4
    • T.MOD_LOAD: 4
    • T.MOD_SHARE: 4
    • T.MOD_SOFT: 2
    • T.RND: 1
    • T.T: 2
    • T.T_CMD: 4
    • T.T_ES: 4
    • T.T_TOOLS: 1
  • A:
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
    • A.MANAGEMENT_PC: 3
    • A.MANAGE_SECRET: 3
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 8
    • O.HDD_: 2
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.HOST_ACCESS: 8
    • O.HOST_AUTH: 5
    • O.SEC_COMM: 8
  • OE:
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-SP_HBA: 3
    • OE.HDD_ENC: 2
    • OE.MANAGEMENT_PC: 3
    • OE.MANAGE_SECRET: 2
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.NOEVIL_MNT: 1
    • OE.PHYSICAL_SEC: 4
  • T:
    • T.CHG_CONFIG: 3
    • T.HDD_REUSE: 3
    • T.HDD_THEFT: 3
    • T.ILLEGAL_XCNTL: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 6
      • 3DES: 1
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
      • SSLv3.0: 2
    • TLS:
      • TLS: 2
      • TLSv1.0: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 2
    • side channel: 1
    • timing attacks: 1
  • other:
    • JIL: 6
pdf_data/st_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC24036RCU: 8
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 88
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • ISO:
    • ISO/IEC 7816-8: 1
    • ISO/IEC 9796-2: 1
    • ISO/IEC 9798-3: 2
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
pdf_data/st_metadata
  • /Author: CSRD22/stut
  • /Comments: Open
  • /Company: GuD
  • /CreationDate: D:20100629134954+02'00'
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 2.0 / Status 29.06.2010
  • /ModDate: D:20100629134956+02'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Subject: Security Target Lite STARCOS 3.4 ID Tachograph C2
  • /Title: Security Target Lite STARCOS 3.4 ID Tachograph C2
  • pdf_file_size_bytes: 475709
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 70
  • /CreationDate: D:20111221190410
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20111221190410
  • /Producer: Microsoft® Office Word 2007
  • /Subject: CC EAL2 Security Target
  • /Title: VSP ST
  • pdf_file_size_bytes: 1094064
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different