name |
Hitachi Unified Storage 110 Microprogram Version:0917/A |
Biocryptodisk Encryptor Model SD302 (Ver5.11 -3.03), SD302CR(Ver5.11 -5.03), ST302(Ver5.11 -1.00), and ST302B(Ver5.11 -1.00) with Remote Token Management System v1.00 |
category |
Access Control Devices and Systems |
Data Protection |
scheme |
JP |
MY |
status |
archived |
archived |
not_valid_after |
09.01.2019 |
19.03.2020 |
not_valid_before |
12.12.2013 |
19.03.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0421_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C054-CR-v1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0421_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-12-%2029-Encryptor-ST-0.7.pdf |
manufacturer |
Hitachi, Ltd. |
Biocryptodisk Sdn Bhd |
manufacturer_web |
https://www.hitachi.com/ |
https://www.biocryptodisk.com/ |
security_level |
EAL2 |
EAL2+, ALC_FLR.1 |
dgst |
c855912a0bee12b9 |
bed091a5f3af98b3 |
heuristics/cert_id |
JISEC-CC-CRP-C0421 |
ISCB-5-RPT-C054-CR-v1 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1, ALC_DEL.1, ALC_CMC.2, ASE_CCL.1, ASE_REQ.2, ADV_ARC.1, ATE_COV.1, ATE_IND.2, ADV_TDS.1, AVA_VAN.2, ASE_INT.1, ASE_TSS.1 |
ALC_FLR.1, AGD_OPE.1, ASE_ECD.1, ADV_FSP.2, ALC_DEL.1, ALC_CMS.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_IND.2, ADV_TDS.1, ASE_TSS.1, ATE_FUN.1, AGD_PRE.1, ALC_CMC.2 |
heuristics/extracted_versions |
0917, 110 |
5.11, 3.03, 5.03, 1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0421
- certification_date: 01.12.2013
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release3
- cert_link: https://www.ipa.go.jp/en/security/c0421_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 110” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser's login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Hitachi Unified Storage 110 Microprogram
- product_type: Storage System control software
- report_link: https://www.ipa.go.jp/en/security/c0421_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0421_est.pdf
- toe_version: 0917/A
- vendor: Hitachi, Ltd.
- expiration_date: 01.01.2019
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Unified Storage 110 Microprogram0917/A
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0421_it2418.html
- toe_overseas_name: Hitachi Unified Storage 110 Microprogram0917/A
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0421_erpt.pdf |
ISCB-5-RPT-C054-CR-v1.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0421-01: 1
- Certification No. C0421: 1
|
- MY:
- ISCB-5-RPT-C054-CR-v1: 38
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 2
- EAL2+: 12
- EAL4: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 1
- SHA-256: 1
- SHA-384: 1
- SHA256: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- ISO:
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20140529133557+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140529133629+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 509194
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: ISCB Department
- /Category: PUBLIC
- /Caveat: FINAL
- /Classification: PUBLIC
- /Company: CyberSecurity Malaysia
- /CreationDate: D:20150320121647+08'00'
- /Creator: Acrobat PDFMaker 11 for Word
- /Developer: Biocryptodisk Sdn Bhd
- /Document Type: TEMPLATE
- /Identifier: ISCB-5-RPT-C054-CR-v1
- /Index: MyCB_TMP_002
- /Keywords: MyCB_TMP_002
- /ModDate: D:20150320121808+08'00'
- /Phase: Released
- /Producer: Adobe PDF Library 11.0
- /Project Code: C054
- /Released: 11 March 2015
- /ST Title: Biocryptodisk Encryptor Model SD302(Ver5.11-3.03), SD302CR(Ver5.11-5.03), ST302(Ver5.11-1.00), and ST302B(Ver5.11-1.00) with Remote Token Management System v1.00 Security Target
- /ST Version: 1.0
- /SourceModified: D:20150320041546
- /Sponsor: Biocryptodisk Sdn Bhd
- /Subject: Biocryptodisk Encryptor Model SD302 (Ver5.11-3.03), SD302CR(Ver5.11-5.03), ST302(Ver5.11-1.00), and ST302B(Ver5.11-1.00) with Remote Token Management System v1.00
- /TOE Name: Biocryptodisk Encryptor Model SD302 (Ver5.11-3.03), SD302CR(Ver5.11-5.03), ST302(Ver5.11-1.00), and ST302B(Ver5.11-1.00) with Remote Token Management System v1.00
- /TOE Version: Biocryptodisk Encryptor Model SD302 (Ver5.11-3.03), SD302CR(Ver5.11-5.03), ST302(Ver5.11-1.00), and ST302B(Ver5.11-1.00) with Remote Token Management System v1.00
- /Title: C054 Certification Report
- /Version: v1
- pdf_file_size_bytes: 1091251
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, mailto:mycc@cybersecurity.my, http://www.cybersecurity.my/mycc
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
c0421_est.pdf |
2014-12- 29-Encryptor-ST-0.7.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 2
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_REV.1: 8
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FRU:
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 3
- FAU_GEN.1.1: 1
- FAU_GEN.3: 7
- FAU_GEN.3.1: 2
- FAU_GEN.3.2: 2
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 5
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM.1: 30
- FCS_CKM.2: 6
- FCS_CKM.4: 17
- FCS_CKM.4.1: 1
- FCS_COP.1: 38
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 11
- FDP_ITC.2: 11
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UAU.5: 3
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 3
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 7
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 7
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_STM.1: 4
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMIN: 2
- A.BACKUP: 2
- A.IDLE: 2
- A.NETSECURE: 2
- A.PHY: 2
- A.STORAGE: 2
- A.TIMESTAMP: 3
- O:
- O.AUDIT: 3
- O.BRUTEFORCE: 3
- O.CONFIG: 3
- O.DATA: 3
- O.EAVESDROP: 3
- O.INTEGRITY: 3
- OE:
- OE.ADMIN: 3
- OE.BACKUP: 2
- OE.IDLE: 2
- OE.NETSECURE: 2
- OE.PHY: 2
- OE.STORAGE: 2
- OE.TIMESTAMP: 2
- OSP:
- T:
- T.AUDIT: 2
- T.BRUTEFORCE: 2
- T.CONFIG: 2
- T.DATA: 2
- T.EAVESDROP: 2
- T.INTEGRITY: 2
- T.SESSIONHIJACK: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 56
- AES-128: 1
- AES-192: 1
- AES-256: 4
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-2: 6
- SHA-256: 2
- SHA-384: 1
- SHA256: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- NIST:
- Curve P-256: 2
- P-256: 12
- P-384: 6
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- physical tampering: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC15408: 12
|
- FIPS:
- FIPS 180-3: 1
- FIPS 186-3: 4
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 198: 1
- FIPS186-3: 1
- FIPS197: 1
- NIST:
- NIST SP 800-90A: 1
- SP 800-90: 3
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- in order to allow the authorized workers who have Biocryptodisk Encryptor to en-/decrypt the confidential documents from computer detected storage such as virtual drives. The activities of en-/decrypting process: 1
|
pdf_data/st_metadata |
- /Author: ODA-USER
- /CreationDate: D:2014052817405909'00'
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:2014052817405909'00'
- /Producer: PrimoPDF
- /Title: Microsoft Word - HUS110_ST.doc
- pdf_file_size_bytes: 433611
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
- /Author: nurshazwani
- /CreationDate: D:20150311144554
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20150311144554
- /Producer: GPL Ghostscript 8.15
- /Title: Microsoft Word - 2014-12- 29-Encryptor-ST-0.7
- pdf_file_size_bytes: 1020283
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |