Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Vforce 1700 V1.0
KECS-NISS-0052-2006
Hitachi Command Suite Common Component Version: 7.0.1-00
JISEC-CC-CRP-C0303
name Vforce 1700 V1.0 Hitachi Command Suite Common Component Version: 7.0.1-00
category Boundary Protection Devices and Systems Access Control Devices and Systems
scheme KR JP
not_valid_after 01.06.2019 01.09.2016
not_valid_before 27.10.2006 15.08.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NISS-52-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NISS-52-ST-EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0303_est.pdf
manufacturer NexG Co., Ltd Hitachi, Ltd.
manufacturer_web https://eng.nexg.net https://www.hitachi.com/
security_level ADV_IMP.2, ATE_DPT.2, ADV_LLD.1, ALC_TAT.1, EAL3+, AVA_VLA.2 EAL2+, ALC_FLR.1
dgst bc9cbcf094abf937 3d4662c844b7ac14
heuristics/cert_id KECS-NISS-0052-2006 JISEC-CC-CRP-C0303
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, ADV_FSP.1, AVA_VLA.2, ATE_DPT.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_MSU.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ADV_IMP.2, AVA_SOF.1, ADV_SPM.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.0 7.0.1
heuristics/scheme_data
  • category: FW+VPN
  • cert_id: KECS-NISS-0052-2006
  • certification_date: 27.10.2006
  • enhanced:
  • level: EAL3+
  • product: VForce 1700 V1.0
  • product_link: https://itscc.kr/certprod/view.do?product_id=52&product_class=4
  • vendor: NexG Co., Ltd.
  • cert_id: JISEC-CC-CRP-C0303
  • certification_date: 01.08.2011
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: Hitachi Device Manager Software, Hitachi Replication Manager Software, Hitachi Tiered Storage Manager Software, and Hitachi Tuning Manager Software. These products, in combination with TOE, are commonly referred to as Hitachi Command Suite. TOE is a foundational module for Hitachi Command Suite, and is packaged with all products. TOE security functionality TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Hitachi Command Suite Common Component
    • product_type: Foundational Module Software
    • report_link: https://www.ipa.go.jp/en/security/c0303_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0303_est.pdf
    • toe_version: 7.0.1-00
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.09.2016
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0303_it0311.html
  • toe_japan_name: Hitachi Command Suite Common Component 7.0.1-00
  • toe_overseas_link: None
  • toe_overseas_name: -----
pdf_data/report_filename NISS-52-EN.pdf c0303_erpt.pdf
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-NISS-0052-2006: 1
  • JP:
    • CRP-C0303-01: 1
    • Certification No. C0303: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 2
    • EAL3+: 1
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_IMP.2: 3
    • ADV_LLD.1: 3
  • ALC:
    • ALC_TAT.1: 3
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_DPT.2: 3
  • AVA:
    • AVA_VLA.2: 3
  • ALC:
    • ALC_FLR.1: 3
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 1
    • A.CLIENTS: 1
    • A.NETWORKS: 1
    • A.PASSWORD: 1
    • A.PHYSICAL: 1
    • A.SECURE_CHANNEL: 1
    • A.SRV_MGMT: 1
    • A.VERSION: 1
  • T:
    • T.ILLEGAL_ACCESS: 2
    • T.UNAUTHORISED_ACCESS: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 6
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 3
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 6
  • SSH:
    • SSH: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /Author: jedi
  • /CreationDate: D:20061229121349+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20061229121349+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /Title: KECS-NISS-0052-2006인증보고서(VForce 1700)V1.0-en.hwp
  • pdf_file_size_bytes: 166450
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: IPA/JISEC
  • /Company: IPA
  • /CreationDate: D:20110928100804+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 8.1
  • /Manager: IPA
  • /ModDate: D:20110928100931+09'00'
  • /Producer: Acrobat Distiller 8.3.0 (Windows)
  • /Title: CRP-e
  • pdf_file_size_bytes: 345195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 38
pdf_data/st_filename NISS-52-ST-EN.pdf c0303_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3+: 3
    • EAL3: 2
    • EAL3+: 2
  • EAL:
    • EAL2: 7
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP: 1
    • ACM_CAP.3: 19
    • ACM_CAP.3.1: 1
    • ACM_SCP: 1
    • ACM_SCP.1: 7
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.1: 8
    • ADO_IGS: 2
    • ADO_IGS.1: 8
  • ADV:
    • ADV_FSP: 9
    • ADV_FSP.1: 12
    • ADV_HLD: 4
    • ADV_HLD.2: 18
    • ADV_IMP: 6
    • ADV_IMP.1: 2
    • ADV_IMP.2: 13
    • ADV_LLD: 7
    • ADV_LLD.1: 21
    • ADV_RCR: 5
    • ADV_RCR.1: 8
    • ADV_SPM.1: 3
    • ADV_TAT: 1
  • AGD:
    • AGD_ADM: 5
    • AGD_ADM.1: 15
    • AGD_USR: 4
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 9
    • ALC_TAT: 4
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 8
    • ATE_DPT: 4
    • ATE_DPT.2: 8
    • ATE_FUN: 3
    • ATE_FUN.1: 13
    • ATE_IND: 1
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.1: 12
    • AVA_SOF: 1
    • AVA_SOF.1: 10
    • AVA_VLA: 4
    • AVA_VLA.2: 17
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_APR.1: 1
    • FAU_ARP: 2
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN: 3
    • FAU_GEN.1: 10
    • FAU_SAA: 2
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAR: 6
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL: 2
    • FAU_SEL.1: 9
    • FAU_SEL.1.1: 1
    • FAU_STG: 6
    • FAU_STG.1: 8
    • FAU_STG.3: 7
    • FAU_STG.3.1: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP: 3
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
    • FCS_ESP: 2
    • FCS_ESP.1: 1
    • FCS_ESP.2: 1
    • FCS_ESP.3: 1
    • FCS_ESP.4: 1
    • FCS_IKE: 2
    • FCS_IKE.1: 1
    • FCS_IKE.2: 1
    • FCS_IKE.3: 1
  • FDP:
    • FDP_ACC: 4
    • FDP_ACC.1: 5
    • FDP_ACC.2: 11
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF: 2
    • FDP_ACF.1: 15
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_DAU: 2
    • FDP_DAU.1: 8
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_IFC: 4
    • FDP_IFC.1: 14
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 25
    • FDP_IFC.2.1: 3
    • FDP_IFC.2.2: 3
    • FDP_IFF: 1
    • FDP_IFF.1: 56
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 4
    • FDP_IFF.1.6: 1
    • FDP_ITC: 6
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
    • FDP_NID: 2
    • FDP_NID.1: 1
    • FDP_VPN: 3
    • FDP_VPN.1: 1
    • FDP_VPN.2: 1
    • FDP_VPN.3: 1
    • FDP_VPN.4: 1
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 13
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 2
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOF.1: 1
    • FIA_SOS: 2
    • FIA_SOS.1: 11
    • FIA_SOS.1.1: 1
    • FIA_UAU: 8
    • FIA_UAU.1: 9
    • FIA_UAU.2: 19
    • FIA_UAU.4: 13
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 3
    • FIA_UID.1: 3
    • FIA_UID.2: 10
  • FMT:
    • FMT_AMT.1: 1
    • FMT_ARP: 5
    • FMT_DHCP: 5
    • FMT_MOF: 1
    • FMT_MOF.1: 23
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 11
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 19
    • FMT_MSA.3: 17
    • FMT_MSA.3.2: 1
    • FMT_MTD: 6
    • FMT_MTD.1: 58
    • FMT_MTD.1.1: 3
    • FMT_MTD.2: 9
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_MTD.3: 11
    • FMT_SMF: 10
    • FMT_SMF.1: 16
    • FMT_SMR: 7
    • FMT_SMR.1: 19
  • FPR:
    • FPR_DNAT: 4
    • FPR_DNAT.1: 1
    • FPR_PSE.1: 5
    • FPR_SNAT: 2
    • FPR_SNAT.1: 1
    • FPR_UNO: 2
    • FPR_UNO.4: 8
  • FPT:
    • FPT_AMT: 2
    • FPT_AMT.1: 7
    • FPT_AMT.1.1: 1
    • FPT_PRL.1: 1
    • FPT_RPL: 2
    • FPT_RPL.1: 8
    • FPT_RPL.1.2: 1
    • FPT_RVM: 2
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SMR.1: 1
    • FPT_SSL.1: 1
    • FPT_SSL.3: 1
    • FPT_STM: 3
    • FPT_STM.1: 13
    • FPT_TST: 4
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.2: 11
    • FPT_UNO.4: 1
  • FTA:
    • FTA_SSL: 4
    • FTA_SSL.1: 10
    • FTA_SSL.1.2: 1
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_TST: 1
    • FTP_TST.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 11
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATORS: 3
    • A.ADMINISTROTORS: 1
    • A.CLIENTS: 4
    • A.NETWORKS: 3
    • A.PASSWORD: 3
    • A.PHYSICAL: 4
    • A.SECURE_CHANNEL: 3
    • A.SRV_MGMT: 3
    • A.VERSION: 4
  • O:
    • O.BANNER: 6
    • O.MGMT: 9
    • O.PASSWORD: 7
  • OE:
    • OE.BANNER: 4
    • OE.PASSWORD: 4
    • OE.SECURE_CHANNEL: 4
  • T:
    • T.ILLEGAL_ACCESS: 4
    • T.UNAUTHORISED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 4
pdf_data/st_keywords/eval_facility
  • KISA:
    • KISA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 3
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 8
  • miscellaneous:
    • SEED:
      • SEED: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
      • SHA1: 1
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 14
  • TLS:
    • SSL:
      • SSL: 8
  • VPN:
    • VPN: 60
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC2404: 1
    • RFC2451: 1
pdf_data/st_metadata
  • /Author: mahnduck
  • /CreationDate: D:20061218175559+09'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20061218175559+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - ST-VF1700-V10-00_en.doc
  • pdf_file_size_bytes: 747114
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 156
  • /Author: Hitachi, Ltd. Software Division
  • /CreationDate: D:20110926112144
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110926112144
  • /Producer: Microsoft® Office Word 2007
  • /Subject: HSCC-ST
  • /Title: Hitachi Command Suite Common Component ST
  • pdf_file_size_bytes: 455862
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 58
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different