name |
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)
|
SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
|
category |
Access Control Devices and Systems
|
Access Control Devices and Systems
|
not_valid_before |
2008-12-24
|
2007-06-27
|
not_valid_after |
2014-04-08
|
2013-10-07
|
scheme |
JP
|
JP
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf
|
status |
archived
|
archived
|
manufacturer |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
manufacturer_web |
https://www.hitachi.com/
|
https://www.hitachi.com/
|
security_level |
EAL2 |
EAL2 |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf
|
cert_link |
None
|
None
|
protection_profiles |
|
|
maintenance_updates |
|
|
state/cert |
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
- _type:
sec_certs.sample.cc.CCCertificate.DocumentState
- download_ok:
False
- convert_garbage:
False
- convert_ok:
False
- extract_ok:
False
- pdf_hash:
None
- txt_hash:
None
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c
|
2e60ea5270fbc0f11c2112143832445e6142b856f0a0892f3ab31b05cfe3884a
|
state/report/txt_hash |
affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658
|
9ad5433a32d590aac96300931d64097f1b55f8e70fd739f8c5e99d49e13e407c
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800
|
30bcb2eaa6f18b4fe7c9926057263a785d8c053585dc6ee05d495c733c9af099
|
state/st/txt_hash |
06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5
|
b52cd8c677fe4c51cf6d131f8b55862970d9b7f0953c265a60a45887d1a5b538
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
JISEC-CC-CRP-C0200
|
JISEC-CC-CRP-C0102
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/scheme_data |
- cert_id:
C0200
- supplier:
Hitachi, Ltd.
- toe_overseas_name:
-----
- expiration_date:
2014-04
- claim:
EAL2
- certification_date:
2008-12
- toe_overseas_link:
None
- toe_japan_name:
Hitachi Universal
Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi
Universal Storage Platform VM, Hitachi Universal Storage Platform H20000
Control Program 60-02-32-00/00(R6-02A-14)
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
- enhanced:
- product:
Hitachi Universal Storage
Platform V, Hitachi Universal
Storage Platform H24000,
Hitachi Universal Storage
Platform VM, Hitachi Universal
Storage Platform H20000
Control Program
- toe_version:
60-02-32-00/00(R6-02A-14)
- product_type:
IT Product (Storage Control Software)
- certification_date:
2008-12-24
- cc_version:
2.3
- assurance_level:
EAL2
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0200_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0200_est.pdf
- description:
PRODUCT DESCRIPTION
Description of TOE
TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users.
TOE security functions
TOE has the following security functions.
- Storage Navigator function
It sets, changes, etc. the configuration of each function to manage the storage
subsystem.
- Virtual Partition Manager function
It partitions the resources of the entire storage subsystem into multiple virtual disks to
control access.
- LUN Manager function
It associates ports and logical devices that can be accessed by the host.
- Host identification/authentication function
When a host is connected to SAN, this function identifies/authenticates the host so that
invalid host would not be connected.
- Audit log function
It records events related to security, such as success/failure of login, changes in
configuration settings.
|
- cert_id:
C0102
- supplier:
Hitachi, Ltd.
- toe_overseas_name:
TagmaStore Universal Storage
Platform CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
50-04-34-00/00
- expiration_date:
2013-10
- claim:
EAL2
- certification_date:
2007-06
- toe_overseas_link:
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
- toe_japan_name:
SANRISE Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
50-04-34-00/00
- enhanced:
- product:
SANRISE Universal Storage Platform CHA/DKA Program
TagmaStore Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
- toe_version:
50-04-34-00/00
- product_type:
IT Product (Storage Control Software)
- certification_date:
2007-06-27
- cc_version:
2.1
- assurance_level:
EAL2
- vendor:
Hitachi, Ltd.
- evaluation_facility:
Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- report_link:
https://www.ipa.go.jp/en/security/c0102_erpt.pdf
- target_link:
https://www.ipa.go.jp/en/security/c0102_est.pdf
- description:
PRODUCT DESCRIPTION
TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”.
TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
|
heuristics/scheme_data/cert_id |
C0200
|
C0102
|
heuristics/scheme_data/certification_date |
2008-12
|
2007-06
|
heuristics/scheme_data/claim |
EAL2
|
EAL2
|
heuristics/scheme_data/enhanced/assurance_level |
EAL2
|
EAL2
|
heuristics/scheme_data/enhanced/cc_version |
2.3
|
2.1
|
heuristics/scheme_data/enhanced/certification_date |
2008-12-24
|
2007-06-27
|
heuristics/scheme_data/enhanced/description |
PRODUCT DESCRIPTION
Description of TOE
TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users.
TOE security functions
TOE has the following security functions.
- Storage Navigator function
It sets, changes, etc. the configuration of each function to manage the storage
subsystem.
- Virtual Partition Manager function
It partitions the resources of the entire storage subsystem into multiple virtual disks to
control access.
- LUN Manager function
It associates ports and logical devices that can be accessed by the host.
- Host identification/authentication function
When a host is connected to SAN, this function identifies/authenticates the host so that
invalid host would not be connected.
- Audit log function
It records events related to security, such as success/failure of login, changes in
configuration settings.
|
PRODUCT DESCRIPTION
TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”.
TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
|
heuristics/scheme_data/enhanced/evaluation_facility |
Electronic Commerce Security Technology Laboratory Inc.
Evaluation Center
|
Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
|
heuristics/scheme_data/enhanced/product |
Hitachi Universal Storage
Platform V, Hitachi Universal
Storage Platform H24000,
Hitachi Universal Storage
Platform VM, Hitachi Universal
Storage Platform H20000
Control Program
|
SANRISE Universal Storage Platform CHA/DKA Program
TagmaStore Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
|
heuristics/scheme_data/enhanced/product_type |
IT Product (Storage Control Software)
|
IT Product (Storage Control Software)
|
heuristics/scheme_data/enhanced/report_link |
https://www.ipa.go.jp/en/security/c0200_erpt.pdf
|
https://www.ipa.go.jp/en/security/c0102_erpt.pdf
|
heuristics/scheme_data/enhanced/target_link |
https://www.ipa.go.jp/en/security/c0200_est.pdf
|
https://www.ipa.go.jp/en/security/c0102_est.pdf
|
heuristics/scheme_data/enhanced/toe_version |
60-02-32-00/00(R6-02A-14)
|
50-04-34-00/00
|
heuristics/scheme_data/enhanced/vendor |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
heuristics/scheme_data/expiration_date |
2014-04
|
2013-10
|
heuristics/scheme_data/supplier |
Hitachi, Ltd.
|
Hitachi, Ltd.
|
heuristics/scheme_data/toe_japan_name |
Hitachi Universal
Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi
Universal Storage Platform VM, Hitachi Universal Storage Platform H20000
Control Program 60-02-32-00/00(R6-02A-14)
|
SANRISE Universal Storage Platform CHA/DKA Program
SANRISE Network Storage Controller CHA/DKA Program
SANRISE H12000 CHA/DKA Program
SANRISE H10000 CHA/DKA Program
50-04-34-00/00
|
heuristics/scheme_data/toe_overseas_link |
None
|
https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
|
heuristics/scheme_data/toe_overseas_name |
-----
|
TagmaStore Universal Storage
Platform CHA/DKA Program
TagmaStore Network Storage Controller CHA/DKA Program
50-04-34-00/00
|
heuristics/st_references |
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
- _type:
sec_certs.sample.certificate.References
- directly_referenced_by:
None
- indirectly_referenced_by:
None
- directly_referencing:
None
- indirectly_referencing:
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
None
|
pdf_data/cert_metadata |
None
|
None
|
pdf_data/report_filename |
c0200_erpt.pdf
|
c0102_erpt.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/JP |
- CRP-C0200-01:
1
- Certification No. C0200:
1
|
- CRP-C0102-01:
1
- Certification No. C0102:
1
|
pdf_data/report_keywords/cc_claims |
- T:
- T.ILLEGAL_XCNTL:
1
- T.TSF_COMP:
1
- T.LP_LEAK:
1
- T.CHG_CONFIG:
1
- A:
- A.NOEVIL:
1
- A.NOEVIL_MNT:
1
- A.PHYSICAL_SEC:
1
- A.ILLEGAL_SOFT:
1
- A.CONNECT_STORAGE:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2005-08-001:
2
- CCMB-2005-08-002:
2
- CCMB-2005-08-003:
2
- CCMB-2005-08-004:
2
|
- CCIMB-99-032:
2
- CCIMB-99-033:
2
- CCIMB-99-031:
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:2005:
1
- ISO/IEC 18045:2005:
2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20090401163719+09'00'
|
D:20070918163642+09'00'
|
pdf_data/report_metadata//ModDate |
D:20090401163719+09'00'
|
D:20070918163642+09'00'
|
pdf_data/report_metadata//Producer |
Acrobat Distiller 6.0 (Windows)
|
Acrobat Distiller 6.0 (Windows)
|
pdf_data/report_metadata//Title |
untitled
|
untitled
|
pdf_data/report_metadata/pdf_file_size_bytes |
147813
|
104544
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
24
|
20
|
pdf_data/st_filename |
c0200_est.pdf
|
c0102_est.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.ADM_AUTH:
9
- O.ADM_ROLE:
5
- O.SEC_COMM:
8
- O.HOST_AUTH:
5
- O.HOST_ACCESS:
8
- O.AUD_GEN:
6
- T:
- T.ILLEGAL_XCNTL:
3
- T.TSF_COMP:
3
- T.LP_LEAK:
3
- T.CHG_CONFIG:
3
- A:
- A.NOEVIL:
3
- A.NOEVIL_MNT:
3
- A.PHYSICAL_SEC:
3
- A.ILLEGAL_SOFT:
3
- A.CONNECT_STORAGE:
3
- OE:
- OE.NOEVIL:
2
- OE.NOEVIL-MNT:
1
- OE.PHYSICAL_SEC:
3
- OE.ILLEGAL_SOFT:
2
- OE.CONNECT_STORAGE:
3
- OE.NOEVIL_MNT:
1
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar/ACM |
|
|
pdf_data/st_keywords/cc_sar/ADO |
- ADO_DEL.1:
2
- ADO_IGS.1:
3
|
- ADO_DEL.1:
2
- ADO_IGS.1:
3
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_FSP.1:
2
- ADV_HLD.1:
2
- ADV_RCR.1:
1
|
- ADV_SPM.1: 4
- ADV_FSP.1:
2
- ADV_HLD.1:
3
- ADV_RCR.1:
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 |
2
|
2
|
pdf_data/st_keywords/cc_sar/ADV/ADV_HLD.1 |
2
|
3
|
pdf_data/st_keywords/cc_sar/ADV/ADV_RCR.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_ADM.1:
3
- AGD_USR.1:
3
|
- AGD_ADM.1:
3
- AGD_USR.1:
3
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.1:
2
- ATE_FUN.1:
2
- ATE_IND.2:
2
|
- ATE_COV.1:
2
- ATE_FUN.1:
2
- ATE_IND.2:
2
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_SOF.1:
2
- AVA_VLA.1:
2
|
- AVA_SOF.1:
2
- AVA_VLA.1:
2
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1:
21
- FAU_GEN.2:
11
- FAU_SAR.1:
12
- FAU_STG.1:
13
- FAU_STG.3:
12
- FAU_GEN.1.1:
1
- FAU_GEN.1.2:
1
- FAU_GEN.2.1:
1
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_STG.3.1:
1
- FCS:
- FCS_COP.1:
17
- FCS_CKM.1:
20
- FCS_CKM.2:
16
- FCS_CKM.4:
18
- FCS_COP.1.1:
1
- FCS_CKM.1.1:
1
- FCS_CKM.2.1:
1
- FCS_CKM.4.1:
1
- FDP:
- FDP_ACC.1:
19
- FDP_IFC.1:
2
- FDP_ACF.1:
16
- FDP_ITC.1:
6
- FDP_ITC.2:
6
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FIA:
- FIA_ATD:
27
- FIA_ATD.1:
6
- FIA_USB:
27
- FIA_USB.1:
6
- FIA_AFL.1:
13
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU.1:
21
- FIA_SOS:
29
- FIA_SOS.1:
2
- FIA_UAU.2:
17
- FIA_UID.1:
8
- FIA_UAU.7:
13
- FIA_UAU.7.1:
1
- FIA_UID.2:
22
- FIA_MSA.1.1:
1
- FIA_MSA.3.1:
1
- FIA_MSA.3.2:
1
- FIA_UAU.5:
19
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.5.1:
1
- FIA_UAU.5.2:
1
- FMT:
- FMT_MSA.1:
16
- FMT_SMF.1:
18
- FMT_SMR.1:
20
- FMT_MSA.3:
16
- FMT_MTD.1:
12
- FMT_MTD.1.1:
1
- FMT_SMF.1.1:
1
- FMT_MOF.1:
13
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.2:
9
- FMT_MOF.1.1:
1
- FPT:
- FPT_STM.1:
17
- FPT_RVM.1:
32
- FPT_SEP.1:
32
- FPT_STM.1.1:
1
- FPT_RVM.1.1:
1
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
|
- FDP:
- FDP_ACC.1:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1:
8
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
4
- FIA:
- FIA_UID.1:
4
- FIA_UID.2:
13
- FMT:
- FMT_MSA.3:
11
- FMT_MSA.3.1:
1
- FMT_MSA.3.2:
1
- FMT_MSA.1:
13
- FMT_SMR.1:
14
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1.1:
1
- FMT_SMF.1:
13
- FMT_MSA.2:
11
- FMT_MSA.2.1:
1
- FMT_SMF.1.1:
1
- FMT_SAE.1:
10
- FMT_SAE.1.1:
1
- FMT_SAE.1.2:
1
- FPT:
- FPT_RVM.1:
13
- FPT_RVM.1.1:
1
- FPT_STM.1:
14
- FPT_STM.1.1:
1
- FPT_SEP.1:
12
- FPT_SEP.1.1:
1
- FPT_SEP.1.2:
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
19
- FDP_IFC.1:
2
- FDP_ACF.1:
16
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
|
- FDP_ACC.1:
15
- FDP_ACC.1.1:
1
- FDP_ACF.1:
8
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
1
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
1
- FDP_IFC.1:
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
19
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
16
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_ATD: 27
- FIA_ATD.1: 6
- FIA_USB: 27
- FIA_USB.1: 6
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU.1: 21
- FIA_SOS: 29
- FIA_SOS.1: 2
- FIA_UAU.2: 17
- FIA_UID.1:
8
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.2:
22
- FIA_MSA.1.1: 1
- FIA_MSA.3.1: 1
- FIA_MSA.3.2: 1
- FIA_UAU.5: 19
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
|
- FIA_UID.1:
4
- FIA_UID.2:
13
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
8
|
4
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 |
22
|
13
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_MSA.1:
16
- FMT_SMF.1:
18
- FMT_SMR.1:
20
- FMT_MSA.3:
16
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1.1:
1
- FMT_MOF.1: 13
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.2:
9
- FMT_MOF.1.1: 1
|
- FMT_MSA.3:
11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.1:
13
- FMT_SMR.1:
14
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1.1: 1
- FMT_SMF.1:
13
- FMT_MSA.2:
11
- FMT_MSA.2.1: 1
- FMT_SMF.1.1:
1
- FMT_SAE.1: 10
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
16
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.2 |
9
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
16
|
11
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
18
|
13
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
20
|
14
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_RVM.1 |
32
|
13
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_RVM.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_SEP.1 |
32
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_SEP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_SEP.1.2 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 |
17
|
14
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1.1 |
1
|
1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 197:
1
- FIPS PUB 46-3:
1
- FIPS PUB 180-2:
1
- PKCS:
- CC:
- CCMB-2005-08-001:
4
- CCMB-2005-08-002:
3
- CCMB-2005-08-003:
2
|
- CC:
- CCIMB-99-031:
1
- CCIMB-99-032:
1
- CCIMB-99-033:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2005-08-001:
4
- CCMB-2005-08-002:
3
- CCMB-2005-08-003:
2
|
- CCIMB-99-031:
1
- CCIMB-99-032:
1
- CCIMB-99-033:
1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft:
1
- Microsoft Corporation:
1
|
- Microsoft:
- Microsoft:
1
- Microsoft Corporation:
1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
516948
- pdf_is_encrypted:
False
- pdf_number_of_pages:
93
- /CreationDate:
D:20090330094022+09'00'
- /Subject: CC EAL2 Security Target
- /Author:
八木
- /Creator:
Word 用 Acrobat PDFMaker 7.0.7
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20090330094033+09'00'
- /Company: Hitachi
- /Title:
USP_V ST
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
231671
- pdf_is_encrypted:
False
- pdf_number_of_pages:
57
- /CreationDate:
D:20070918131359+09'00'
- /Author:
hiwa.sysdeptdm
- /Creator:
PScript5.dll Version 5.2
- /Producer:
Acrobat Distiller 7.0.5 (Windows)
- /ModDate:
D:20070918131359+09'00'
- /Title:
Microsoft Word - User Data Protection Security Target_Eng.doc
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
八木
|
hiwa.sysdeptdm
|
pdf_data/st_metadata//CreationDate |
D:20090330094022+09'00'
|
D:20070918131359+09'00'
|
pdf_data/st_metadata//Creator |
Word 用 Acrobat PDFMaker 7.0.7
|
PScript5.dll Version 5.2
|
pdf_data/st_metadata//ModDate |
D:20090330094033+09'00'
|
D:20070918131359+09'00'
|
pdf_data/st_metadata//Producer |
Acrobat Distiller 7.0.5 (Windows)
|
Acrobat Distiller 7.0.5 (Windows)
|
pdf_data/st_metadata//Title |
USP_V ST
|
Microsoft Word - User Data Protection Security Target_Eng.doc
|
pdf_data/st_metadata/pdf_file_size_bytes |
516948
|
231671
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
93
|
57
|
dgst |
96e36510c2c8ba64
|
5647d3c66dfdd6f9
|