Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
System Software for e-STUDIO520/600/720/850, e-STUDIO523/603/723/853 V2.0
JISEC-CC-CRP-C0178
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
JISEC-CC-CRP-C0200
name System Software for e-STUDIO520/600/720/850, e-STUDIO523/603/723/853 V2.0 Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
category Multi-Function Devices Access Control Devices and Systems
not_valid_after 10.12.2010 08.04.2014
not_valid_before 12.08.2008 24.12.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0178_erpt2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0178_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf
manufacturer Toshiba TEC Corporation Hitachi, Ltd.
manufacturer_web https://www.toshibatec.co.jp/en/ https://www.hitachi.com/
security_level EAL3 EAL2
dgst 92a911021007658d 96e36510c2c8ba64
heuristics/cert_id JISEC-CC-CRP-C0178 JISEC-CC-CRP-C0200
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1
heuristics/extracted_versions 2.0 14, 32, 00, 02, 60
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0178
  • certification_date:
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the system software of the digital multi function device "e-STUDIO520/600/720/850, e-STUDIO523/603/723/853" manufactured by TOSHIBA TEC CORPORATION. The TOE controls general functions as a digital multi function device (Copy, Scan, Print and Fax), and provides functions of e-Filing Box and Shared folder. TOE security functions The TOE provides function of data overwrite and complete deletion on the user document data deleted from HDD in the "e-STUDIO520/600/720/850, e-STUDIO523/603/723/853" (except following data: fax reception; expired user document data stored in e-Filing Box and Shared folder after such data's effective period). The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: System Software for e-STUDIO520/600/720/850, e-STUDIO523/603/723/853
    • product_type: IT product (data protection function in Multi Function Device)
    • toe_version: V2.0
    • vendor: TOSHIBA TEC CORPORATION
  • expiration_date: 01.01.2011
  • supplier: TOSHIBA TEC CORPORATION
  • toe_japan_name: e-STUDIO520/600/720/850, e-STUDIO523/603/723/853 System Software V2.0
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0178_it8196.html
  • toe_overseas_name: System Software for e-STUDIO 520/600/720/850, e-STUDIO523/603/723/853 V2.0
  • cert_id: JISEC-CC-CRP-C0200
  • certification_date: 01.12.2008
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
    • product_type: IT Product (Storage Control Software)
    • report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
    • toe_version: 60-02-32-00/00(R6-02A-14)
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.04.2014
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
  • toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename c0178_erpt2.pdf c0200_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0178-01: 1
    • Certification No. C0178: 2
  • JP:
    • CRP-C0200-01: 1
    • Certification No. C0200: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL2: 3
pdf_data/report_keywords/cc_claims
  • T:
    • T.STOREDATA_ACCESS: 1
    • T.TEMPDATA_ACCESS: 1
  • A:
    • A.CONNECT_STORAGE: 1
    • A.ILLEGAL_SOFT: 1
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
  • T:
    • T.CHG_CONFIG: 1
    • T.ILLEGAL_XCNTL: 1
    • T.LP_LEAK: 1
    • T.TSF_COMP: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Cisco:
    • Cisco: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
pdf_data/report_metadata
  • /CreationDate: D:20090428144612+09'00'
  • /ModDate: D:20120817151013+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 577293
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 23
  • /CreationDate: D:20090401163719+09'00'
  • /ModDate: D:20090401163719+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 147813
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename c0178_est.pdf c0200_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL3: 4
  • EAL:
    • EAL 2: 1
    • EAL2: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 1
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 3
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF.1: 2
    • AVA_VLA.1: 3
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
    • FDP_RIP.2: 8
  • FPT:
    • FPT_RVM.1: 12
    • FPT_RVM.1.1: 1
  • FAU:
    • FAU_GEN.1: 21
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 11
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 13
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 12
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 16
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 17
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
  • FIA:
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 27
    • FIA_ATD.1: 6
    • FIA_MSA.1.1: 1
    • FIA_MSA.3.1: 1
    • FIA_MSA.3.2: 1
    • FIA_SOS: 29
    • FIA_SOS.1: 2
    • FIA_UAU.1: 21
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 17
    • FIA_UAU.5: 19
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 22
    • FIA_USB: 27
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 13
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.2: 9
    • FMT_MSA.3: 16
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 18
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 32
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 32
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 17
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.STOREDATA_OVERWRITE: 4
    • O.TEMPDATA_OVERWRITE: 6
  • OE:
    • OE.HDD_ERASE: 3
    • OE.OVERWRITE_COMPLETE: 3
  • T:
    • T.STOREDATA_ACCESS: 3
    • T.TEMPDATA_ACCESS: 4
  • A:
    • A.CONNECT_STORAGE: 3
    • A.ILLEGAL_SOFT: 3
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.AUD_GEN: 6
    • O.HOST_ACCESS: 8
    • O.HOST_AUTH: 5
    • O.SEC_COMM: 8
  • OE:
    • OE.CONNECT_STORAGE: 3
    • OE.ILLEGAL_SOFT: 2
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.NOEVIL_MNT: 1
    • OE.PHYSICAL_SEC: 3
  • T:
    • T.CHG_CONFIG: 3
    • T.ILLEGAL_XCNTL: 3
    • T.LP_LEAK: 3
    • T.TSF_COMP: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
  • RSA:
    • RSA 512: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 16
      • SSLv3.0: 3
    • TLS:
      • TLS: 3
      • TLSv1.0: 3
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 4
    • CCMB-2005-08-002: 3
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20090428113531+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /Keywords:
  • /ModDate: D:20090428113531+09'00'
  • /Producer: Adobe LiveCycle PDFG 7.2
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 189527
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: 八木
  • /Company: Hitachi
  • /CreationDate: D:20090330094022+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /ModDate: D:20090330094033+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Subject: CC EAL2 Security Target
  • /Title: USP_V ST
  • pdf_file_size_bytes: 516948
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different