name |
Hitachi Unified Storage 110 Microprogram Version:0917/A |
IBM Tivoli Directory Server Version 6.2 |
category |
Access Control Devices and Systems |
Key Management Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
09.01.2019 |
01.09.2019 |
not_valid_before |
12.12.2013 |
16.03.2009 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0421_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0535a.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0421_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0535B.pdf |
manufacturer |
Hitachi, Ltd. |
IBM Corporation |
manufacturer_web |
https://www.hitachi.com/ |
https://www.ibm.com |
security_level |
EAL2 |
EAL4+, ALC_FLR.1 |
dgst |
c855912a0bee12b9 |
2a967f12da0a46c2 |
heuristics/cert_id |
JISEC-CC-CRP-C0421 |
BSI-DSZ-CC-0535-2009 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.5:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.44:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.15:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.21:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.41:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.48:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.20:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.36:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.27:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.35:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.13:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.52:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.25:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.8:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.46:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.30:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.32:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.14:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.4:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.56:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.3:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.2:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.51:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.49:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.31:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.12:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.26:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.6:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.53:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.10:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.19:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.37:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.42:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.34:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.55:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.39:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.40:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.50:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.24:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.7:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.11:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.43:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.33:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.29:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.45:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.54:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.47:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.38:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.23:*:*:*:*:*:*:*, cpe:2.3:a:ibm:tivoli_directory_server:6.2.0.22:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2014-6100, CVE-2011-2759, CVE-2012-0740, CVE-2011-1206, CVE-2012-0743, CVE-2015-1978, CVE-2011-1820, CVE-2015-1974, CVE-2011-2758, CVE-2012-2191, CVE-2015-1977, CVE-2015-1976, CVE-2012-0726, CVE-2015-1959, CVE-2015-2019, CVE-2015-0138, CVE-2015-1975, CVE-2015-1972, CVE-2012-2203 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_CCL.1, ASE_REQ.2 |
ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, AGD_SPM.1, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
heuristics/extracted_versions |
0917, 110 |
6.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0283-2006 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0283-2006 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0421
- certification_date: 01.12.2013
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release3
- cert_link: https://www.ipa.go.jp/en/security/c0421_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 110” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser's login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Hitachi Unified Storage 110 Microprogram
- product_type: Storage System control software
- report_link: https://www.ipa.go.jp/en/security/c0421_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0421_est.pdf
- toe_version: 0917/A
- vendor: Hitachi, Ltd.
- expiration_date: 01.01.2019
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Unified Storage 110 Microprogram0917/A
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0421_it2418.html
- toe_overseas_name: Hitachi Unified Storage 110 Microprogram0917/A
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0421_erpt.pdf |
0535a.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0535-2009
- cert_item: IBM Tivoli Directory Server Version 6.2
- cert_lab: BSI
- developer: IBM Corporation
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0421-01: 1
- Certification No. C0421: 1
|
- DE:
- BSI-DSZ-CC-0283-2006: 2
- BSI-DSZ-CC-0535-2009: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 4: 4
- EAL 4 augmented: 2
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 9
- EAL4 augmented: 1
- EAL5: 6
- EAL6: 3
- EAL7: 4
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.1: 4
- ALC_LCD: 1
- ALC_TAT: 2
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- OE:
- OE.BACKUP: 1
- OE.DATABASE: 1
- OE.ENCRYPT: 1
- OE.ENVMANAGE: 1
- OE.MANAGE: 1
- OE.PHYSICAL: 1
- OE.ROUTE: 1
- OE.SOPHISTICATED: 1
- OE.TIME: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- ISO:
|
- BSI:
- AIS 14: 1
- AIS 19: 1
- AIS 32: 1
- AIS 34: 1
- AIS 38: 1
- ISO:
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7] Evaluation Technical Report, Version 3, 24.02.2009, atsec information security GmbH (confidential document) 13.1 Guidance documentation [8] IBM Tivoli Directory Server Version 6.2, Administration Guide: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20140529133557+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140529133629+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 509194
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090512082323+02'00'
- /Creator: Writer
- /Keywords: "IBM Tivoli Directory Server Version 6.2, IBM Corporation, BSI-DSZ-CC-0535-2009, Common Criteria, Certification, Zertifizierung"
- /ModDate: D:20090513082602+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0535-2009
- pdf_file_size_bytes: 380147
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
c0421_est.pdf |
0535B.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 9
- EAL 4 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ACM:
- ACM_AUT.1: 2
- ACM_CAP.4: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL.2: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 2
- ADV_HLD.2: 1
- ADV_IMP.1: 2
- ADV_LLD.1: 1
- ADV_RCR.1: 2
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_SPM.1: 1
- AGD_USR.1: 2
- ALC:
- ALC_DVS.1: 2
- ALC_FLR.1: 10
- ALC_LCD.1: 2
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 1
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.1: 1
- AVA_VLA.2: 1
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 2
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_REV.1: 8
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FRU:
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 12
- FAU_GEN.2.1: 1
- FAU_SAR.1: 12
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 10
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 3
- FCS_CKM.4: 3
- FCS_COP: 28
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 3
- FDP_ACC.2: 13
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FIA:
- FIA_AFL: 23
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_SOS: 28
- FIA_SOS.1: 3
- FIA_SOS.1.1: 2
- FIA_UAU.1: 18
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 26
- FMT_MOF.1: 1
- FMT_MOF.1.1: 2
- FMT_MSA.1: 17
- FMT_MSA.1.1: 1
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_STM.1: 17
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 2
- A.COMM: 2
- A.COOP: 3
- A.ENCRYPT: 3
- A.PHYSICAL: 3
- A.ROUTE: 2
- A.TIME: 3
- A.TOEENV: 3
- O:
- O.ACCOUNT: 6
- O.AUTHENTICATE: 7
- O.AUTHORIZE: 7
- O.BYPASS: 4
- OE:
- OE.BACKUP: 4
- OE.COMMUNICATION: 8
- OE.DATABASE: 7
- OE.ENCRYPT: 6
- OE.ENVMANAGE: 6
- OE.MANAGE: 9
- OE.PHYSICAL: 8
- OE.ROUTE: 4
- OE.SOPHISTICATED: 6
- OE.TIME: 8
- T:
- T.ACCESS: 2
- T.ACCOUNT: 3
- T.BYPASS: 2
- T.ENTRY: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC15408: 12
|
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 180-2: 1
- FIPS 186-2: 1
- FIPS140-2: 2
- FIPS180-2: 2
- FIPS186-2: 2
- RFC:
- RFC 1274: 1
- RFC 1777: 3
- RFC 1778: 1
- RFC 1779: 1
- RFC 1823: 1
- RFC 2052: 1
- RFC 2219: 1
- RFC 2222: 1
- RFC 2247: 1
- RFC 2251: 2
- RFC 2252: 1
- RFC 2253: 1
- RFC 2254: 1
- RFC 2255: 1
- RFC 2256: 1
- RFC 2596: 1
- RFC 2696: 1
- RFC 2829: 1
- RFC 2830: 1
- RFC 2831: 2
- RFC 2849: 1
- RFC 2891: 1
- RFC1274: 1
- RFC1777: 1
- RFC1778: 1
- RFC1779: 1
- RFC1823: 1
- RFC2052: 1
- RFC2219: 1
- RFC2222: 1
- RFC2247: 1
- RFC2251: 1
- RFC2252: 1
- RFC2253: 1
- RFC2254: 1
- RFC2255: 1
- RFC2256: 1
- RFC2596: 1
- RFC2696: 1
- RFC2829: 1
- RFC2830: 1
- RFC2831: 2
- RFC2849: 1
- RFC2891: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: ODA-USER
- /CreationDate: D:2014052817405909'00'
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:2014052817405909'00'
- /Producer: PrimoPDF
- /Title: Microsoft Word - HUS110_ST.doc
- pdf_file_size_bytes: 433611
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
- /Author: IBM
- /CreationDate: D:20090512084028-04'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /Keywords: Lightweight Directory Access Protocol (LDAP), Access Control List (ACL), Password Policy (PP), Audit Service (AS), IBM Tivoli Directory Server (TDS)
- /ModDate: D:20090513082915+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Subject: Security Target
- /Title: IBM Tivoli Directory Server 6.2 Security Target
- pdf_file_size_bytes: 552394
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |