name |
Symfoware Server Enterprise Extended Edition 7.0.2 |
Groove Workspace, Groove Enterprise Management Server, and Groove Enterprise Relay Server, Version 2.5 |
category |
Databases |
Data Protection |
scheme |
JP |
US |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
06.09.2012 |
not_valid_before |
31.10.2006 |
01.09.2003 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0061_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3010-vr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3010-st.pdf |
manufacturer |
Fujitsu Limited |
Groove Networks, Inc |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.groove.net/ |
security_level |
EAL1 |
EAL2+, ADV_SPM.1 |
dgst |
99f7dcbd9b823ee5 |
d8eb8333ba04d631 |
heuristics/cert_id |
JISEC-CC-CRP-C0061 |
CCEVS-VR-0038-2003 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_RCR.1, ADV_FSP.1, AVA_MSU.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1, ADV_SPM.1 |
heuristics/extracted_versions |
7.0.2 |
2.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0144
- certification_date: 01.01.2008
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symfoware Server offers the security functions of the user control, the resource control, and the audit log, etc. to protect the data base from malicious access in addition to the function for such a data base access. Symfoware Server runs on Red Hat Enterprise Linux 5(for Intel Itanium).
- evaluation_facility: Information Technology Security Center
- product: Symfoware Server Enterprise Extended Edition
- product_type: IT Product (Database)
- toe_version: 9.0.1
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0144_it7181.html
- toe_japan_name: Symfoware Server Enterprise Extended Edition 9.0.1
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0061_ecvr.pdf |
st_vid3010-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-03-0038
- cert_item: Groove Cryptographic Services (GrooveMisc.dll 2.5.0.1774; cryptopp.dll 5.0.4.0
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0061: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 2
- EAL 2 augmented: 1
- EAL2: 4
|
pdf_data/report_keywords/cc_sar |
|
- ADO:
- ADV:
- AGD:
- ALC:
- ASE:
- ATE:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- T:
- T.HACK_CRYPTO: 1
- T.MALFUNCTION: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 180-1: 1
- FIPS 46-3: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102205911+09'00'
- /ModDate: D:20061102205911+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 11633
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Jim Brosey
- /CreationDate: D:20030930100341-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030930100448-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: 1 Executive Summary
- pdf_file_size_bytes: 335135
- pdf_hyperlinks: http://www.rsa.com/, http://www.smat.us/crypto/inet-crypto/#pgfId=32767
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
|
st_vid3010-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ACM_CAP: 1
- ACM_CAP.2: 3
- ACM_SCP: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 3
- ADO_IGS.1: 7
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.1: 3
- ADV_RCR.1: 3
- ADV_SPM.1: 14
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 7
- AGD_USR: 1
- AGD_USR.1: 3
- ALC:
- ASE:
- ATE:
- ATE_COV: 1
- ATE_COV.1: 3
- ATE_DPT: 1
- ATE_FUN.1: 3
- ATE_IND.2: 3
- AVA:
- AVA_MSU.2: 1
- AVA_SOF: 3
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 41
- FCS_CKM.1.1: 5
- FCS_CKM.4: 43
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 68
- FCS_COP.1.1: 11
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ETC.1: 10
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_ITC.1: 32
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 14
- FIA_UID.1: 8
- FIA_UID.2: 16
- FMT:
- FMT_MOF: 1
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 46
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 2
- FPT_PHP: 1
- FPT_RCV: 1
- FPT_SEP.2: 1
- FPT_SEP.3: 1
- FPT_TST.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.ALGORITHMS: 8
- O.SELF_TEST: 7
- O.TRUSTED_ADMIN: 1
- OE:
- OE.DAC: 8
- OE.DESTRUCT: 8
- OE.EXPORT: 7
- OE.IMPORT: 7
- OE.INIT_SECURE: 7
- OE.LIMIT_ACTIONS: 8
- OE.OS: 6
- OE.SECURE: 7
- OE.SECURITY_MGT: 8
- OE.SECURITY_ROLES: 7
- OE.TRUSTED_ADMIN: 5
- T:
- T.HACK_CRYPTO: 4
- T.MALFUNCTION: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 12
- Diffie-Hellman: 15
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 3
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 3
- FIPS 180-1: 2
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 3
- FIPS PUB 197: 2
- FIPS PUB 198: 2
- FIPS PUB 46-3: 2
- ISO:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Kris Rogers
- /CreationDate: D:20030925151409-04'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20030925151946-03'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
- pdf_file_size_bytes: 738149
- pdf_hyperlinks: http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |