| name |
Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) |
Oberthur ID-ONE Cosmo V7.0.1-n Smartcard masked on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components |
| category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
08.04.2014 |
01.09.2019 |
| not_valid_before |
24.12.2008 |
06.07.2010 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-40en.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0200_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-40en.pdf |
| manufacturer |
Hitachi, Ltd. |
Oberthur Technologies / NXP Semiconductors GmbH |
| manufacturer_web |
https://www.hitachi.com/ |
https://www.oberthur.com/ |
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
96e36510c2c8ba64 |
68d342964a89bb5d |
| heuristics/cert_id |
JISEC-CC-CRP-C0200 |
ANSSI-CC-2010/40 |
| heuristics/cert_lab |
[] |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_HLD.1, AVA_VLA.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ADV_RCR.1, AGD_ADM.1, AVA_SOF.1, AGD_USR.1, ADV_FSP.1 |
ALC_DVS.2, AVA_VAN.5, ADV_IMP.2 |
| heuristics/extracted_versions |
00, 02, 32, 60, 14 |
7.0.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2010/58, 2011-15-INF-1098, ANSSI-CC-2013/70, 2011-13-INF-1092, 2011-12-INF-1089, ANSSI-CC-2011/64, 2011-14-INF-1095, ANSSI-CC-2012/10 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2010/58, 2011-15-INF-1098, CRP272, ANSSI-CC-2013/70, ANSSI-CC-2012/30, 2011-13-INF-1092, 2011-12-INF-1089, ANSSI-CC-2012/71, ANSSI-CC-2011/64, 2011-14-INF-1095, ANSSI-CC-2012/10 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0200
- certification_date: 01.12.2008
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
- product_type: IT Product (Storage Control Software)
- report_link: https://www.ipa.go.jp/en/security/c0200_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0200_est.pdf
- toe_version: 60-02-32-00/00(R6-02A-14)
- vendor: Hitachi, Ltd.
- expiration_date: 01.04.2014
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
- toe_japan_name: Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
| heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2010/58, 2011-15-INF-1098, ANSSI-CC-2013/70, 2011-12-INF-1089, 2011-13-INF-1092, 2011-14-INF-1095 |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
| heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2010/58, 2011-15-INF-1098, ANSSI-CC-2013/70, 2011-12-INF-1089, 2011-13-INF-1092, 2011-14-INF-1095 |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009 |
| heuristics/protection_profiles |
{} |
8ab4bd8434014a92 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/jcsppc.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0200_erpt.pdf |
ANSSI-CC_2010-40en.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmented ALC_DVS.2, AVA_VAN5
- cc_version: Common Criteria version 3.1
- cert_id: ANSSI-CC-2010/40
- cert_item: ID-ONE Cosmo V7.0.1-n Smartcard masked on NXP P5CD081 V1A (Standard Dual), P5CC081 V1A (Standard) and P5CD041 V1A (Basic Dual) components
- cert_item_version: Java Card platform Version corresponding to all configurations : 7.0.1-n
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01, mail : [email protected]
- developer: Oberthur Technologies NXP Semiconductors GmbH 50 quai Michelet Stresemannallee 101 92300 Levallois-Perret, France D-22502 Hamburg, Germany Sponsor Oberthur Technologies 50 quai Michelet 92300 Levallois-Perret, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: PP/0304], version 1.0b PP SUN Java Card™ System Protection Profile Collection, august 2003, certified by l’ANSSI
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0200-01: 1
- Certification No. C0200: 1
|
- DE:
- BSI-DSZ-CC-0555-: 1
- BSI-DSZ-CC-0555-2009: 2
- FR:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 4
- EAL 5 augmented: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 1
- A.ILLEGAL_SOFT: 1
- A.NOEVIL: 1
- A.NOEVIL_MNT: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.ILLEGAL_XCNTL: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 29
- NXP Semiconductors: 3
- Oberthur:
- Oberthur Technologies: 10
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
| pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20090401163719+09'00'
- /ModDate: D:20090401163719+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 147813
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
- /CreationDate: D:20101005174858+02'00'
- /Keywords:
- /ModDate: D:20101005174858+02'00'
- /Producer: AFPL Ghostscript 8.53
- pdf_file_size_bytes: 376803
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
| pdf_data/st_filename |
c0200_est.pdf |
ANSSI-CC-cible_2010-40en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 3
- EAL5 augmented: 3
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.1: 2
- ADV_RCR.1: 1
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 3
- ATE:
- ATE_COV.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 21
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 11
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 13
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 12
- FAU_STG.3.1: 1
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 1
- FCS_CKM.2: 16
- FCS_CKM.2.1: 1
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 19
- FDP_ACC.1.1: 1
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FIA:
- FIA_AFL.1: 13
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 27
- FIA_ATD.1: 6
- FIA_MSA.1.1: 1
- FIA_MSA.3.1: 1
- FIA_MSA.3.2: 1
- FIA_SOS: 29
- FIA_SOS.1: 2
- FIA_UAU.1: 21
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 17
- FIA_UAU.5: 19
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 13
- FIA_UAU.7.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 22
- FIA_USB: 27
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MSA.1: 16
- FMT_MSA.2: 9
- FMT_MSA.3: 16
- FMT_MTD.1: 12
- FMT_MTD.1.1: 1
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 32
- FPT_RVM.1.1: 1
- FPT_SEP.1: 32
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM.1: 17
- FPT_STM.1.1: 1
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 3
- FAU_GEN: 1
- FAU_GEN.1: 2
- FAU_SAR: 1
- FAU_SAR.1: 2
- FCO:
- FCS:
- FCS_CKM: 8
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 10
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RNG: 4
- FCS_RNG.1: 7
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.2: 9
- FDP_ACF: 4
- FDP_ACF.1: 18
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 10
- FDP_ITC: 2
- FDP_ITC.1: 3
- FDP_ITC.2: 5
- FDP_RIP: 8
- FDP_RIP.1: 9
- FDP_ROL: 1
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.1.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 1
- FDP_UCT.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 4
- FIA_UID.1: 6
- FIA_UID.2: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 2
- FMT_MSA: 11
- FMT_MSA.1: 6
- FMT_MSA.2: 1
- FMT_MSA.3: 8
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 4
- FMT_SMR: 6
- FMT_SMR.1: 9
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 3
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 5
- FPT_FLS.1: 5
- FPT_PHP: 2
- FPT_PHP.3: 2
- FPT_RCV: 3
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 6
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_RSA: 1
- FRU_RSA.1: 1
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CONNECT_STORAGE: 3
- A.ILLEGAL_SOFT: 3
- A.NOEVIL: 3
- A.NOEVIL_MNT: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 9
- O.ADM_ROLE: 5
- O.AUD_GEN: 6
- O.HOST_ACCESS: 8
- O.HOST_AUTH: 5
- O.SEC_COMM: 8
- OE:
- OE.CONNECT_STORAGE: 3
- OE.ILLEGAL_SOFT: 2
- OE.NOEVIL: 2
- OE.NOEVIL-MNT: 1
- OE.NOEVIL_MNT: 1
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.ILLEGAL_XCNTL: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
- A:
- A.APPLET: 1
- A.NATIVE: 1
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APPLILIFECYC: 1
- D.APP_CODE: 5
- D.APP_C_DATA: 3
- D.APP_I_DATA: 3
- D.ARRAY: 3
- D.AUDITLOG: 1
- D.CONFIG: 2
- D.CRYPTO: 4
- D.GLPIN: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.KEY: 2
- D.LOADFILE: 1
- D.NB_REMAINTRYGLB: 1
- D.PIN: 6
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 1
- O:
- O.ALARM: 1
- O.APPLET: 16
- O.CARD-MANAGEMENT: 3
- O.CIPHER: 1
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.DELETION: 1
- O.FIREWALL: 1
- O.INSTALL: 1
- O.JAVAOBJEC: 3
- O.JAVAOBJECT: 32
- O.KEY-MNGT: 1
- O.LOAD: 3
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 3
- O.SECURE_COMPARE: 1
- O.SHRD_VAR_CONFID: 1
- O.SHRD_VAR_INTEG: 1
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.NATIVE: 1
- OE.VERIFICATION: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 5
- OP.DELETE_APPLET: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 4
- OP.PUT: 4
- OP.RECEIVE: 1
- OP.SEND: 1
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFIGURATION: 2
- T.CONF_DATA_APPLET: 2
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-APPLICODE: 1
- T.INTEG-APPLIDATA: 1
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESSOURCES: 1
- T.SID: 2
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 1
- Microsoft Corporation: 1
|
- NXP:
- Oberthur:
- OBERTHUR: 2
- Oberthur: 1
- Oberthur Technologies: 190
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 4
- CCMB-2005-08-002: 3
- CCMB-2005-08-003: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
|
- FIPS:
- FIPS PUB 180-2: 2
- FIPS PUB 186-2: 1
- FIPS PUB 197: 5
- FIPS PUB 46-3: 5
- FIPS PUB 81: 4
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.security: 1
- javacardx:
- javacardx.framework.util: 1
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: 八木
- /Company: Hitachi
- /CreationDate: D:20090330094022+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0.7
- /ModDate: D:20090330094033+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Subject: CC EAL2 Security Target
- /Title: USP_V ST
- pdf_file_size_bytes: 516948
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
- /CreationDate: D:20100825120924+02'00'
- /Keywords:
- /ModDate: D:20100906104511+02'00'
- /Producer: AFPL Ghostscript 8.50
- pdf_file_size_bytes: 650373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 93
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |