Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
JISEC-CC-CRP-C0200
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
JISEC-CC-CRP-C0514
name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
not_valid_before 2008-12-24 2016-06-06
not_valid_after 2014-04-08 2021-06-06
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf
security_level EAL2 ALC_FLR.1, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf
state/report/pdf_hash 50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c 93a52189ac3baf26ac00310474d1b238aa438951331d1f5b6f10ceb65c03d5a7
state/report/txt_hash affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658 3af7b5bf795117fd27bedb5264d03826302b23ac65df033e4afdf09040e1fcd0
state/st/pdf_hash 22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800 d4924797a53b58c23d0fce46516f98abc901c012f6caca39f69cc5a41200ba41
state/st/txt_hash 06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5 8f4a9a82c5a3b00ee7ff8044c894a6a53acc5759c4f381948ab6ab714960598a
heuristics/cert_id JISEC-CC-CRP-C0200 JISEC-CC-CRP-C0514
heuristics/scheme_data
  • cert_id: C0200
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2014-04
  • claim: EAL2
  • certification_date: 2008-12
  • toe_overseas_link: None
  • toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
  • enhanced:
    • product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
    • toe_version: 60-02-32-00/00(R6-02A-14)
    • product_type: IT Product (Storage Control Software)
    • certification_date: 2008-12-24
    • cc_version: 2.3
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
  • cert_id: C0514
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
  • expiration_date: 2021-07
  • claim: EAL2+ALC_FLR.1
  • certification_date: 2016-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
  • toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
  • enhanced:
    • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
    • toe_version: 80-01-25-00/00(R8-01A-06_Z)
    • product_type: Control Program for storage system
    • certification_date: 2016-06-06
    • cc_version: 3.1 Release4
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
    • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
    • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
heuristics/scheme_data/cert_id C0200 C0514
heuristics/scheme_data/certification_date 2008-12 2016-06
heuristics/scheme_data/claim EAL2 EAL2+ALC_FLR.1
heuristics/scheme_data/enhanced
  • product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
  • toe_version: 60-02-32-00/00(R6-02A-14)
  • product_type: IT Product (Storage Control Software)
  • certification_date: 2008-12-24
  • cc_version: 2.3
  • assurance_level: EAL2
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
  • report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
  • product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
  • toe_version: 80-01-25-00/00(R8-01A-06_Z)
  • product_type: Control Program for storage system
  • certification_date: 2016-06-06
  • cc_version: 3.1 Release4
  • assurance_level: EAL2 Augmented with ALC_FLR.1
  • vendor: Hitachi, Ltd.
  • evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
  • report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
  • cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
  • target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
  • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
heuristics/scheme_data/enhanced/assurance_level EAL2 EAL2 Augmented with ALC_FLR.1
heuristics/scheme_data/enhanced/cc_version 2.3 3.1 Release4
heuristics/scheme_data/enhanced/certification_date 2008-12-24 2016-06-06
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings. PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
heuristics/scheme_data/enhanced/evaluation_facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
heuristics/scheme_data/enhanced/product Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
heuristics/scheme_data/enhanced/product_type IT Product (Storage Control Software) Control Program for storage system
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0200_erpt.pdf https://www.ipa.go.jp/en/security/c0514_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0200_est.pdf https://www.ipa.go.jp/en/security/c0514_est.pdf
heuristics/scheme_data/enhanced/toe_version 60-02-32-00/00(R6-02A-14) 80-01-25-00/00(R8-01A-06_Z)
heuristics/scheme_data/expiration_date 2014-04 2021-07
heuristics/scheme_data/toe_japan_name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14) Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
heuristics/scheme_data/toe_overseas_name ----- Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
pdf_data/report_filename c0200_erpt.pdf c0514_erpt.pdf
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0200-01: 1
  • Certification No. C0200: 1
  • CRP-C0514-01: 1
  • Certification No. C0514: 1
pdf_data/report_keywords/cc_claims/A
  • A.NOEVIL: 1
  • A.NOEVIL_MNT: 1
  • A.PHYSICAL_SEC: 1
  • A.ILLEGAL_SOFT: 1
  • A.CONNECT_STORAGE: 1
  • A.NOEVIL: 1
  • A.PHYSICAL_SEC: 1
  • A.MANAGE_SECRET: 1
  • A.MANAGEMENT_PC: 1
  • A.MAINTENCE_PC: 1
  • A.CONNECT_STORAGE: 1
  • A.EXTERNAL_SERVER: 1
pdf_data/report_keywords/cc_claims/T
  • T.ILLEGAL_XCNTL: 1
  • T.TSF_COMP: 1
  • T.LP_LEAK: 1
  • T.CHG_CONFIG: 1
  • T.TSF_COMP: 1
  • T.LP_LEAK: 1
  • T.CHG_CONFIG: 1
  • T.HDD_THEFT: 1
  • T.HDD_REUSE: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 4
pdf_data/report_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL2: 4
  • EAL2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL2 3 4
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/crypto_protocol/TLS
  • SSL:
    • SSL: 1
  • SSL:
    • SSL: 1
  • TLS:
    • TLS: 8
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/report_keywords/standard_id/CC
  • CCMB-2005-08-001: 2
  • CCMB-2005-08-002: 2
  • CCMB-2005-08-003: 2
  • CCMB-2005-08-004: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 147813
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /ModDate: D:20090401163719+09'00'
  • /CreationDate: D:20090401163719+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 473024
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /CreationDate: D:20160906162354+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20160906162432+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20090401163719+09'00' D:20160906162354+09'00'
pdf_data/report_metadata//ModDate D:20090401163719+09'00' D:20160906162432+09'00'
pdf_data/report_metadata//Producer Acrobat Distiller 6.0 (Windows) Microsoft® Word 2010
pdf_data/report_metadata/pdf_file_size_bytes 147813 473024
pdf_data/report_metadata/pdf_is_encrypted False True
pdf_data/report_metadata/pdf_number_of_pages 24 41
pdf_data/st_filename c0200_est.pdf c0514_est.pdf
pdf_data/st_keywords/cc_claims/A
  • A.NOEVIL: 3
  • A.NOEVIL_MNT: 3
  • A.PHYSICAL_SEC: 3
  • A.ILLEGAL_SOFT: 3
  • A.CONNECT_STORAGE: 3
  • A.NOEVIL: 3
  • A.PHYSICAL_SEC: 3
  • A.MANAGE_SECRET: 3
  • A.MANAGEMENT_PC: 3
  • A.MAINTENANCE_PC: 3
  • A.CONNECT_STORAGE: 3
  • A.EXTERNAL_SERVER: 3
pdf_data/st_keywords/cc_claims/O
  • O.ADM_AUTH: 9
  • O.ADM_ROLE: 5
  • O.SEC_COMM: 8
  • O.HOST_AUTH: 5
  • O.HOST_ACCESS: 8
  • O.AUD_GEN: 6
  • O.ADM_AUTH: 8
  • O.ADM_ROLE: 5
  • O.SEC_COMM: 8
  • O.SWITCH_AUTH: 6
  • O.HOST_ACCESS: 8
  • O.HDD_ENC: 6
  • O.HDD_SHRED: 3
  • O.AUD_GEN: 7
  • O.HDD_: 2
pdf_data/st_keywords/cc_claims/O/O.ADM_AUTH 9 8
pdf_data/st_keywords/cc_claims/O/O.AUD_GEN 6 7
pdf_data/st_keywords/cc_claims/OE
  • OE.NOEVIL: 2
  • OE.NOEVIL-MNT: 1
  • OE.PHYSICAL_SEC: 3
  • OE.ILLEGAL_SOFT: 2
  • OE.CONNECT_STORAGE: 3
  • OE.NOEVIL_MNT: 1
  • OE.NOEVIL: 2
  • OE.PHYSICAL_SEC: 3
  • OE.MANAGE_SECRET: 3
  • OE.MANAGEMENT_PC: 2
  • OE.MAINTENANCE_PC: 3
  • OE.CONNECT_STORAGE: 2
  • OE.EXTERNAL_SERVER: 3
  • OE.FC-SP_HBA: 2
  • OE.HDD_ENC: 2
  • OE.FC-: 1
pdf_data/st_keywords/cc_claims/OE/OE.CONNECT_STORAGE 3 2
pdf_data/st_keywords/cc_claims/T
  • T.ILLEGAL_XCNTL: 3
  • T.TSF_COMP: 3
  • T.LP_LEAK: 3
  • T.CHG_CONFIG: 3
  • T.TSF_COMP: 3
  • T.LP_LEAK: 3
  • T.CHG_CONFIG: 3
  • T.HDD_THEFT: 3
  • T.HDD_REUSE: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.1: 2
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.1: 4
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.1: 2
  • ADV_HLD.1: 2
  • ADV_RCR.1: 1
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 3
  • AGD_USR.1: 3
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 2 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 2 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_SOF.1: 2
  • AVA_VLA.1: 2
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL 2: 1
  • EAL2: 1
  • EAL2: 3
pdf_data/st_keywords/cc_security_level/EAL/EAL2 1 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 21
    • FAU_GEN.2: 11
    • FAU_SAR.1: 12
    • FAU_STG.1: 13
    • FAU_STG.3: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_COP.1: 17
    • FCS_CKM.1: 20
    • FCS_CKM.2: 16
    • FCS_CKM.4: 18
    • FCS_COP.1.1: 1
    • FCS_CKM.1.1: 1
    • FCS_CKM.2.1: 1
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_IFC.1: 2
    • FDP_ACF.1: 16
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_ATD: 27
    • FIA_ATD.1: 6
    • FIA_USB: 27
    • FIA_USB.1: 6
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 21
    • FIA_SOS: 29
    • FIA_SOS.1: 2
    • FIA_UAU.2: 17
    • FIA_UID.1: 8
    • FIA_UAU.7: 13
    • FIA_UAU.7.1: 1
    • FIA_UID.2: 22
    • FIA_MSA.1.1: 1
    • FIA_MSA.3.1: 1
    • FIA_MSA.3.2: 1
    • FIA_UAU.5: 19
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MSA.1: 16
    • FMT_SMF.1: 18
    • FMT_SMR.1: 20
    • FMT_MSA.3: 16
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1.1: 1
    • FMT_MOF.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.2: 9
    • FMT_MOF.1.1: 1
  • FPT:
    • FPT_STM.1: 17
    • FPT_RVM.1: 32
    • FPT_SEP.1: 32
    • FPT_STM.1.1: 1
    • FPT_RVM.1.1: 1
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_SAR.1: 9
    • FAU_STG.1: 12
    • FAU_STG.3: 10
    • FAU_STG.4: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.4: 11
    • FCS_CKM.2: 1
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACF.1: 13
    • FDP_RIP.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_ATD: 19
    • FIA_SOS: 20
    • FIA_UAU.2: 18
    • FIA_UID.2: 18
    • FIA_USB: 19
    • FIA_UID.1: 6
    • FIA_UAU.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_SOS.1: 2
    • FIA_UAU: 1
    • FIA_UID: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MSA.1: 12
    • FMT_MSA.3: 13
    • FMT_MTD.1: 15
    • FMT_MTD.3: 10
    • FMT_SMF.1: 15
    • FMT_SMR.1: 18
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
    • FPT_STM: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_TRP.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_GEN.1: 21
  • FAU_GEN.2: 11
  • FAU_SAR.1: 12
  • FAU_STG.1: 13
  • FAU_STG.3: 12
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3.1: 1
  • FAU_GEN.1: 18
  • FAU_GEN.1.1: 1
  • FAU_GEN.1.2: 1
  • FAU_GEN.2: 8
  • FAU_SAR.1: 9
  • FAU_STG.1: 12
  • FAU_STG.3: 10
  • FAU_STG.4: 8
  • FAU_GEN.2.1: 1
  • FAU_SAR.1.1: 1
  • FAU_SAR.1.2: 1
  • FAU_STG.1.1: 1
  • FAU_STG.1.2: 1
  • FAU_STG.3.1: 1
  • FAU_STG.4.1: 1
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.1 21 18
pdf_data/st_keywords/cc_sfr/FAU/FAU_GEN.2 11 8
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAR.1 12 9
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.1 13 12
pdf_data/st_keywords/cc_sfr/FAU/FAU_STG.3 12 10
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_COP.1: 17
  • FCS_CKM.1: 20
  • FCS_CKM.2: 16
  • FCS_CKM.4: 18
  • FCS_COP.1.1: 1
  • FCS_CKM.1.1: 1
  • FCS_CKM.2.1: 1
  • FCS_CKM.4.1: 1
  • FCS_CKM.1: 12
  • FCS_CKM.4: 11
  • FCS_CKM.2: 1
  • FCS_COP.1: 2
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 20 12
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 16 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 18 11
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 17 2
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 19
  • FDP_IFC.1: 2
  • FDP_ACF.1: 16
  • FDP_ITC.1: 6
  • FDP_ITC.2: 6
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ACC.1: 16
  • FDP_ACF.1: 13
  • FDP_RIP.1: 10
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 19 16
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 16 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 6 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 6 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_ATD: 27
  • FIA_ATD.1: 6
  • FIA_USB: 27
  • FIA_USB.1: 6
  • FIA_AFL.1: 13
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_UAU.1: 21
  • FIA_SOS: 29
  • FIA_SOS.1: 2
  • FIA_UAU.2: 17
  • FIA_UID.1: 8
  • FIA_UAU.7: 13
  • FIA_UAU.7.1: 1
  • FIA_UID.2: 22
  • FIA_MSA.1.1: 1
  • FIA_MSA.3.1: 1
  • FIA_MSA.3.2: 1
  • FIA_UAU.5: 19
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_AFL.1: 10
  • FIA_ATD: 19
  • FIA_SOS: 20
  • FIA_UAU.2: 18
  • FIA_UID.2: 18
  • FIA_USB: 19
  • FIA_UID.1: 6
  • FIA_UAU.1: 2
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 6
  • FIA_SOS.1: 2
  • FIA_UAU: 1
  • FIA_UID: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_AFL.1 13 10
pdf_data/st_keywords/cc_sfr/FIA/FIA_ATD 27 19
pdf_data/st_keywords/cc_sfr/FIA/FIA_SOS 29 20
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 21 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.2 17 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 6
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 22 18
pdf_data/st_keywords/cc_sfr/FIA/FIA_USB 27 19
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MSA.1: 16
  • FMT_SMF.1: 18
  • FMT_SMR.1: 20
  • FMT_MSA.3: 16
  • FMT_MTD.1: 12
  • FMT_MTD.1.1: 1
  • FMT_SMF.1.1: 1
  • FMT_MOF.1: 13
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.2: 9
  • FMT_MOF.1.1: 1
  • FMT_MOF.1: 14
  • FMT_MSA.1: 12
  • FMT_MSA.3: 13
  • FMT_MTD.1: 15
  • FMT_MTD.3: 10
  • FMT_SMF.1: 15
  • FMT_SMR.1: 18
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_MTD.3.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MOF.1 13 14
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 16 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 16 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 12 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 18 15
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 20 18
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 17
  • FPT_RVM.1: 32
  • FPT_SEP.1: 32
  • FPT_STM.1.1: 1
  • FPT_RVM.1.1: 1
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
  • FPT_STM.1: 13
  • FPT_STM.1.1: 1
  • FPT_STM: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 17 13
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/crypto_protocol/TLS/SSL
  • SSLv3.0: 3
  • SSL: 16
  • SSL: 8
pdf_data/st_keywords/crypto_protocol/TLS/SSL/SSL 16 8
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLS 3 2
pdf_data/st_keywords/crypto_protocol/TLS/TLS/TLSv1.0 3 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 1
  • SHA2:
    • SHA-256: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • PKCS:
    • PKCS#1: 1
  • CC:
    • CCMB-2005-08-001: 4
    • CCMB-2005-08-002: 3
    • CCMB-2005-08-003: 2
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • RFC:
    • RFC2865: 2
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/CC
  • CCMB-2005-08-001: 4
  • CCMB-2005-08-002: 3
  • CCMB-2005-08-003: 2
  • CCMB-2012-09-001: 2
  • CCMB-2012-09-002: 2
  • CCMB-2012-09-003: 2
  • CCMB-2012-09-004: 2
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 1 2
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 1 2
pdf_data/st_keywords/vendor/Microsoft
  • Microsoft: 1
  • Microsoft Corporation: 1
  • Microsoft: 2
pdf_data/st_keywords/vendor/Microsoft/Microsoft 1 2
pdf_data/st_metadata
  • pdf_file_size_bytes: 516948
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
  • /CreationDate: D:20090330094022+09'00'
  • /Subject: CC EAL2 Security Target
  • /Author: 八木
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20090330094033+09'00'
  • /Company: Hitachi
  • /Title: USP_V ST
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 1477873
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
  • /Title: USP_V ST
  • /Author: 八木
  • /Subject: CC EAL2 Security Target
  • /Creator: Microsoft® Word 2010
  • /CreationDate: D:20160901154400+09'00'
  • /ModDate: D:20160901154400+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20090330094022+09'00' D:20160901154400+09'00'
pdf_data/st_metadata//Creator Word 用 Acrobat PDFMaker 7.0.7 Microsoft® Word 2010
pdf_data/st_metadata//ModDate D:20090330094033+09'00' D:20160901154400+09'00'
pdf_data/st_metadata//Producer Acrobat Distiller 7.0.5 (Windows) Microsoft® Word 2010
pdf_data/st_metadata/pdf_file_size_bytes 516948 1477873
pdf_data/st_metadata/pdf_number_of_pages 93 78
dgst 96e36510c2c8ba64 4b794daffbae517d