name |
IBM Tivoli Access Manager for e-business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2 |
Hitachi Command Suite Common Component Version: 7.0.1-00 |
category |
Access Control Devices and Systems |
Access Control Devices and Systems |
scheme |
DE |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2016 |
not_valid_before |
22.06.2012 |
15.08.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0636b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf |
manufacturer |
IBM Corporation |
Hitachi, Ltd. |
manufacturer_web |
https://www.ibm.com |
https://www.hitachi.com/ |
security_level |
EAL4+, ALC_FLR.3 |
EAL2+, ALC_FLR.1 |
dgst |
ab61ad860c8f4c38 |
3d4662c844b7ac14 |
heuristics/cert_id |
BSI-DSZ-CC-0636-2012 |
JISEC-CC-CRP-C0303 |
heuristics/cert_lab |
BSI |
[] |
heuristics/cpe_matches |
cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.16:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1.14:*:*:*:*:*:*:* |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
CVE-2010-4623, CVE-2017-1489, CVE-2010-4120, CVE-2011-0494 |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
6.1.1, 6.2.1 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0303
- certification_date: 01.08.2011
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Hitachi Command Suite Common Component
- product_type: Foundational Module Software
- report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
- toe_version: 7.0.1-00
- vendor: Hitachi, Ltd.
- expiration_date: 01.09.2016
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
- toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0636a_pdf.pdf |
c0303_erpt.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0636-2012
- cert_item: IBM Tivoli Access Manager for e-Business version 6.1.1 FP4 with IBM Tivoli Federated Identity Manager version 6.2.1 FP2
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0303-01: 1
- Certification No. C0303: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 6
- EAL 4 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 6
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 1
|
- ALC:
- ALC_FLR.1: 3
- ALC_FLR.2: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- A.VERSION: 1
- T:
- T.ILLEGAL_ACCESS: 2
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Version 3, 25th May 2012, Final Evaluation Technical Report, atsec information security GmbH (confidential document) [8] Configuration lists for the TOE (confidential documents) [CIL-FLR] Lists the security flaw: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120731090521+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Access Control, TAMeb, TFIM, ISO 10181-3, aznAPI, Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli FederatedIdentity Manager 6.2.1 FP2"
- /ModDate: D:20120731090934+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0636-2012
- pdf_file_size_bytes: 1396851
- pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110928100804+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110928100931+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 345195
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
0636b_pdf.pdf |
c0303_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 7
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FAU_STG.3.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_ACC.2: 16
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 13
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 2
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 25
- FIA_UAU.2.1: 4
- FIA_UAU.5: 5
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 25
- FIA_UID.2.1: 4
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 12
- FMT_MOF.1.1: 1
- FMT_MSA.1: 14
- FMT_MSA.1.1: 2
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 6
- FPT_STM.1.1: 1
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.ADM_PWMAN: 2
- A.AUDIT_CONFIG: 3
- A.CLIENT_KEYMAN: 2
- A.CLIENT_PWMAN: 3
- A.CRED_PROT: 5
- A.DIR_PROT: 2
- A.NOBYPASS: 6
- A.OS_CONF_MGMT: 2
- A.PHYS_PROT: 2
- A.PROTECTED_NET: 3
- A.PROTOCOL_SEC: 3
- A.SEC_COM: 3
- A.SINGLE_APP: 3
- O:
- O.ACCESS_DECISION: 16
- O.ACC_ADM: 8
- O.AUDITING: 13
- O.AUTHENT_ADMIN: 11
- O.AUTHENT_SERVER: 12
- O.AUTHENT_USER: 8
- O.AUTHENT_USERS: 1
- O.AUTHORIZATION: 7
- O.MANAGE: 11
- O.PWD_STRENGH: 1
- O.PWD_STRENGTH: 4
- O.TIME: 4
- OE:
- OE.AUDIT_CONFIG: 3
- OE.CREDEN: 5
- OE.DS_ACCESS_CNTRL: 6
- OE.DS_AUTHENT: 6
- OE.INSTALL: 8
- OE.OS_CONFFILE_PROT: 3
- OE.OS_OPERATE: 6
- OE.PHYSICAL: 4
- OE.PROTOCOL_SEC: 3
- OE.PWD_STRENGTH: 3
- OE.SEC_COM: 3
- OE.SEC_INTEGRATE: 3
- T:
- T.UAACTION: 2
- T.UAUSER: 6
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 3
- A.VERSION: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- OE:
- OE.BANNER: 4
- OE.PASSWORD: 4
- OE.SECURE_CHANNEL: 4
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- FIPS140-2: 1
- FIPS180-2: 1
- FIPS186-2: 1
- FIPS197: 1
- FIPS46-3: 1
- FIPS81: 1
- ISO:
- RFC:
- RFC 2246: 1
- RFC 2313: 1
- RFC 3268: 1
- RFC2246: 1
- RFC2313: 1
- RFC3268: 1
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Scott Chapman
- /CreationDate: D:20120516114444-05'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: TAMeb, TFIM
- /ModDate: D:20120731152053+02'00'
- /Producer: Microsoft® Office Word 2007
- /Title: Tivoli Access Manager for e-business Version 6.1.1 FP4 with Tivoli Federated Identity Manager 6.2.1 FP2 Security Target
- pdf_file_size_bytes: 996333
- pdf_hyperlinks: http://www.oasis-open.org/committees/download.php/6837/sstc-saml-tech-overview-1.1-cd.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
- /Author: Hitachi, Ltd. Software Division
- /CreationDate: D:20110926112144
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110926112144
- /Producer: Microsoft® Office Word 2007
- /Subject: HSCC-ST
- /Title: Hitachi Command Suite Common Component ST
- pdf_file_size_bytes: 455862
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |