Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A1.18-C1.14-P1.12-K1.04
JISEC-CC-CRP-C0277
IBM Tivoli Directory Server version 6.1
BSI-DSZ-CC-0428-2008
name Remote Communication Gate A Version: Machine Code (First 4 characters): D459, Firmware Version: A1.18-C1.14-P1.12-K1.04 IBM Tivoli Directory Server version 6.1
category Network and Network-Related Devices and Systems Key Management Systems
scheme JP DE
not_valid_after 01.11.2015 01.09.2019
not_valid_before 22.10.2010 22.04.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0277_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0428a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0277_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0428b.pdf
manufacturer Ricoh Company, Ltd. IBM Informationssysteme Deutschland GmbH
manufacturer_web https://www.ricoh.com/ https://www.ibm.com/de/
security_level EAL3 EAL4+, ALC_FLR.1
dgst abdd4db80056ee35 1d46d5a8d694c0f5
heuristics/cert_id JISEC-CC-CRP-C0277 BSI-DSZ-CC-0428-2008
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.39:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.55:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.67:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.43:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.32:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.52:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.65:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.60:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.28:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.64:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.22:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.17:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.45:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.73:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.9:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.59:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.38:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.69:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.37:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.14:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.33:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.53:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.34:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.35:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.49:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.63:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.72:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.31:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.66:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.44:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.18:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.61:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.48:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.40:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.62:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.46:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.36:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.41:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.58:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.70:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.47:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.56:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.51:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.57:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.42:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.71:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.54:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.68:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.74:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.1.0.50:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2015-1977, CVE-2015-1978, CVE-2014-6100, CVE-2008-2943, CVE-2011-1820, CVE-2015-0138, CVE-2015-1974, CVE-2011-1206, CVE-2010-4217, CVE-2012-0726, CVE-2015-1976, CVE-2012-2191, CVE-2015-2019, CVE-2015-1959, CVE-2015-1975, CVE-2015-1972, CVE-2012-2203, CVE-2012-0743
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AGD_SPM.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions 1.04, 1.18, 1.12, 1.14 6.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0283-2006
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0283-2006
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0277
  • certification_date: 01.10.2010
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0277_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a communication device that enables digital MFPs and printers (hereafter "devices") to be connected to the communication server (hereafter "CS") in the maintenance center. Functions this TOE can provide include notification of device troubles (service call function), automatic counter checking of prints (device counter collection function), automatic ordering of supplies such as toner (supply call function), and device firmware updating. It also provides Web-based user interface functions for TOE operations. TOE security functionality The major security functions this TOE can provide are as follows: - Communication data protection function between the TOE and the device for the service This function is used for communication between the TOE and devices for the service if the service call function, the device counter collection function, and the supply call function are enabled. The communication data between the TOE and the Ricoh device will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and the CS The TOE specifies only the CS as the communication destination via Internet. The communication data between the TOE and the CS will be secured, and the data tampering will be detected by using a SSL protocol. - Communication data protection function between the TOE and computers This function is applied to data communication between the TOE and computers if Web-based functions are enabled. The communication data will be secured by using a SSL protocol. - User identification and authentication function The TOE identifies and authenticates users who access Web-based user interface functions. - Access control function This function restricts user access according to specified user roles. - RC Gate firmware verification function This function enables the TOE to check that the firmware (applications, shared parts of firmware, platforms, and the operating system) is genuine. - Security management function This function provides TOE management methods for the Administrator only.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • product: Remote Communication Gate A
    • product_type: Appliance for remote service
    • report_link: https://www.ipa.go.jp/en/security/c0277_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0277_est.pdf
    • toe_version: Machine Code (First 4 characters) :D459 Firmware Version :A1.18-C1.14-P1.12-K1.04
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.11.2015
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_name: Remote Communication Gate A Machine Code (First 4 characters) :D459 Firmware Version :A1.18-C1.14-P1.12-K1.04
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0277_it0287.html
  • toe_overseas_name: Remote Communication Gate A Machine Code (First 4 characters) :D459 Firmware Version :A1.18-C1.14-P1.12-K1.04
pdf_data/report_filename c0277_erpt.pdf 0428a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0428-2008
    • cert_item: IBM Tivoli Directory Server 6.1
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0277-01: 1
    • Certification No. C0277: 1
  • DE:
    • BSI-DSZ-CC-0283-2006: 4
    • BSI-DSZ-CC-0428: 1
    • BSI-DSZ-CC-0428-2008: 21
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 4
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 4 augmented: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 5
    • ALC_LCD: 1
    • ALC_TAT: 2
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_SOF: 3
    • AVA_VLA: 4
    • AVA_VLA.3: 1
    • AVA_VLA.4: 1
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_SOS.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINSHIP: 2
    • A.CE: 1
    • A.DEVICE: 1
    • A.NETWORK: 2
    • A.TOE_ADMIN: 1
  • T:
    • T.ACCESS: 2
    • T.FAKE_CS: 2
    • T.INTERNET: 2
  • A:
    • A.ADMIN: 2
    • A.COMM: 2
    • A.COOP: 2
    • A.ENCRYPT: 1
    • A.PHYSICAL: 2
    • A.ROUTE: 2
    • A.TIME: 2
    • A.TOEENV: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 26
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 34: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
  • RFC:
    • RFC 1777: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, Version 3, 2008-04-15, atsec information security GmbH (confidential document) 13.1 User Guidance Documents [8] IBM Tivoli Directory Server Version 6.1, Administration Guide: 1
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110411121028+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110411121032+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 213268
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20080423130110+02'00'
  • /Creator: Writer
  • /Keywords: "IBM Tivoli Firectory Server 6.1, IBM Corporation, Common Criteria, BSI-DSZ-CC-0428-2008"
  • /ModDate: D:20080617144541+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0428-2008
  • pdf_file_size_bytes: 412325
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename c0277_est.pdf 0428b.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 7
  • EAL:
    • EAL 4: 9
    • EAL 4 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 1
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 1
    • ADV_IMP.1: 2
    • ADV_LLD.1: 1
    • ADV_RCR.1: 2
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_SPM.1: 1
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.1: 2
    • ALC_FLR.1: 10
    • ALC_LCD.1: 2
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.1: 1
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.1: 1
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.3: 5
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
  • FAU:
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 12
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 12
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 8
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.4: 3
    • FCS_COP: 28
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_ACC.2: 13
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
  • FIA:
    • FIA_AFL: 23
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS: 26
    • FIA_SOS.1: 2
    • FIA_SOS.1.1: 2
    • FIA_UAU.1: 18
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 25
    • FMT_MOF.1: 1
    • FMT_MOF.1.1: 2
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 17
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINSHIP: 3
    • A.CE: 3
    • A.DEVICE: 3
    • A.NETWORK: 3
    • A.TOE_ADMIN: 3
  • O:
    • O.ACCESS: 9
    • O.COM_ATR_DEVICE: 10
    • O.COM_CS: 8
    • O.COM_OPERATOR: 7
    • O.GENUINE: 6
  • OE:
    • OE.ADMIN: 3
    • OE.CE: 3
    • OE.DEVICE: 3
    • OE.NETWORK: 4
    • OE.SUPER: 4
  • T:
    • T.ACCESS: 2
    • T.FAKE_CS: 2
    • T.INTERNET: 2
  • A:
    • A.ADMIN: 2
    • A.COMM: 2
    • A.COOP: 3
    • A.ENCRYPT: 3
    • A.PHYSICAL: 3
    • A.ROUTE: 2
    • A.TIME: 3
    • A.TOEENV: 3
  • O:
    • O.ACCOUNT: 6
    • O.AUTHENTICATE: 7
    • O.AUTHORIZE: 7
    • O.BYPASS: 4
  • OE:
    • OE.BACKUP: 4
    • OE.COMMUNICATION: 8
    • OE.DATABASE: 7
    • OE.ENCRYPT: 6
    • OE.ENVMANAGE: 6
    • OE.MANAGE: 9
    • OE.PHYSICAL: 8
    • OE.ROUTE: 4
    • OE.SOPHISTICATED: 6
    • OE.TIME: 8
  • T:
    • T.ACCESS: 2
    • T.ACCOUNT: 3
    • T.BYPASS: 2
    • T.ENTRY: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 10
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
  • TLS:
    • SSL:
      • SSL: 7
    • TLS:
      • TLS: 9
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 1
    • FIPS140-2: 2
    • FIPS180-2: 2
    • FIPS186-2: 2
  • RFC:
    • RFC 1274: 1
    • RFC 1777: 3
    • RFC 1778: 1
    • RFC 1779: 1
    • RFC 1823: 1
    • RFC 2052: 1
    • RFC 2219: 1
    • RFC 2222: 1
    • RFC 2247: 1
    • RFC 2251: 2
    • RFC 2252: 1
    • RFC 2253: 1
    • RFC 2254: 1
    • RFC 2255: 1
    • RFC 2256: 1
    • RFC 2596: 1
    • RFC 2696: 1
    • RFC 2829: 1
    • RFC 2830: 1
    • RFC 2831: 2
    • RFC 2849: 1
    • RFC 2891: 1
    • RFC1274: 1
    • RFC1777: 1
    • RFC1778: 1
    • RFC1779: 1
    • RFC1823: 1
    • RFC2052: 1
    • RFC2219: 1
    • RFC2222: 1
    • RFC2247: 1
    • RFC2251: 1
    • RFC2252: 1
    • RFC2253: 1
    • RFC2254: 1
    • RFC2255: 1
    • RFC2256: 1
    • RFC2596: 1
    • RFC2696: 1
    • RFC2829: 1
    • RFC2830: 1
    • RFC2831: 2
    • RFC2849: 1
    • RFC2891: 1
pdf_data/st_metadata
  • /Author: ui
  • /Company:
  • /CreationDate: D:20110411120858+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /ModDate: D:20110411120902+09'00'
  • /Producer: Acrobat Distiller 8.2.3 (Windows)
  • /Title:
  • pdf_file_size_bytes: 203391
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /Author: Staffan Persson, Scott Chapman
  • /CreationDate: D:20080423153803Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: IBM Tivoli Directory Server, Security Target
  • /ModDate: D:20080617144724+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: IBM Tivoli Directory Server
  • /Title: IBM Tivoli Directory Server 6.1 Security Target
  • pdf_file_size_bytes: 913356
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 73
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different