name |
Thales NFC422 v1.0 JCS |
HP StorageWorks P9000 Command View Advanced Edition Software Common Component Version: 7.0.1-00 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Access Control Devices and Systems |
scheme |
NL |
JP |
status |
active |
archived |
not_valid_after |
08.10.2026 |
01.09.2016 |
not_valid_before |
08.10.2021 |
15.08.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB%20cert%2021-0089864.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0089864_2-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0089864_2-STLite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0305_est.pdf |
manufacturer |
Thales |
Hewlett-Packard Company |
manufacturer_web |
|
https://www.hp.com |
security_level |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
ALC_FLR.1, EAL2+ |
dgst |
e44a74b98fd8579b |
c63773cb15a5150c |
heuristics/cert_id |
NSCIB-CC-0089864-CR2 |
JISEC-CC-CRP-C0305 |
heuristics/cert_lab |
|
[] |
heuristics/cpe_matches |
{} |
cpe:2.3:h:hp:9000:-:*:*:*:*:*:*:*, cpe:2.3:a:hp:p9000_command_view_advanced_edition_software:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2010-4107, CVE-2016-2003 |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_TAT.1, ADV_FSP.4, ASE_SPD.1, ASE_CCL.1, ADV_TDS.3, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AVA_VAN.5, AGD_PRE.1, ASE_ECD.1, ATE_FUN.1, ADV_IMP.1, ALC_DEL.1, AGD_OPE.1, ALC_DVS.2, ADV_ARC.1, ATE_DPT.1, ALC_CMS.4 |
ASE_INT.1, ASE_SPD.1, ASE_CCL.1, ADV_TDS.1, AVA_VAN.2, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AGD_PRE.1, ASE_ECD.1, ALC_DEL.1, ADV_FSP.2, ATE_FUN.1, AGD_OPE.1, ATE_COV.1, ALC_CMS.2, ALC_FLR.1, ADV_ARC.1, ALC_CMC.2, ATE_IND.2 |
heuristics/extracted_versions |
1.0 |
7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
NSCIB-CC-0089911-CR2 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
NSCIB-CC-0089911-CR2 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0305
- certification_date: 01.08.2011
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0305_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE is a module that provides common functionality for storage management software that manages storage devices connected via a SAN environment. The following are examples of storage management software: HP StorageWorks P9000 Device Manager Software, HP StorageWorks P9000 Replication Manager Software, HP StorageWorks P9000 Tiered Storage Manager Software, and HP StorageWorks P9000 Tuning Manager Software. These products, in combination with TOE, are commonly referred to as HP StorageWorks P9000 Command View Advanced Edition Software. TOE is a foundational module for HP StorageWorks P9000 Command View Advanced Edition Software, and is packaged with all products. TOE security functions TOE provides the following security functionality: - Identification/authentication functionality (External authentication functionality provided by external authentication servers, or the use of linkage functionality for external authentication groups) - Security management functionality (Functionality that manages TOE user account information, and allows the user to set security parameters) - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: HP StorageWorks P9000 Command View Advanced Edition Software Common Component
- product_type: Foundational Module Software
- report_link: https://www.ipa.go.jp/en/security/c0305_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0305_est.pdf
- toe_version: 7.0.1-00
- vendor: Hewlett-Packard Company
- expiration_date: 01.09.2016
- supplier: Hewlett-Packard Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0305_it0331.html
- toe_overseas_name: HP StorageWorks P9000 Command View Advanced Edition Software Common Component 7.0.1-00
|
heuristics/st_references/directly_referenced_by |
NSCIB-CC-0089911-CR2 |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
NSCIB-CC-0089911-CR2 |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
94167fd161e87d71 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
{} |
pdf_data/cert_filename |
NSCIB cert 21-0089864.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 7: 1
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20211021163617+01'00'
- /Creator: C458-M
- /ModDate: D:20211021163607+02'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S21102116361
- pdf_file_size_bytes: 75670
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
NSCIB-CC-0089864_2-CR.pdf |
c0305_erpt.pdf |
pdf_data/report_frontpage |
- NL:
- cert_id: NSCIB-CC-0089864-CR2
- cert_item: NFC422 v1.0 JCS
- cert_lab: SGS Brightsight B.V.
- developer: Thales DIS France SA
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0305-01: 1
- Certification No. C0305: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
- EAL:
- EAL2: 4
- EAL2 augmented: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_FLR.1: 3
- ALC_FLR.2: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 1
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- A.VERSION: 1
- T:
- T.ILLEGAL_ACCESS: 2
- T.UNAUTHORISED_ACCESS: 2
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- BrightSight:
- CESTI:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- FI:
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110927171053+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110928093233+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 347111
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
NSCIB-CC-0089864_2-STLite.pdf |
c0305_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0099-2017: 1
- BSI-PP- 0055-2009: 1
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 8
- EAL4 augmented: 3
- EAL4+: 2
- EAL6+: 1
|
- EAL:
- EAL2: 7
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 7
- ADV_FSP.1: 4
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 5
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 5
- AGD:
- AGD_DAP: 1
- AGD_OPE.1: 10
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 5
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS: 1
- FAU_SAS.1: 2
- FCO:
- FCS:
- FCS_CKM: 82
- FCS_CKM.1: 30
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.4: 53
- FCS_CKM.4.1: 2
- FCS_COP: 95
- FCS_COP.1: 20
- FCS_COP.1.1: 4
- FCS_RNG: 20
- FCS_RNG.1: 13
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 3
- FDP:
- FDP_ACC: 38
- FDP_ACC.1: 24
- FDP_ACC.2: 6
- FDP_ACF: 30
- FDP_ACF.1: 27
- FDP_IFC: 29
- FDP_IFC.1: 22
- FDP_IFC.2: 4
- FDP_IFF: 23
- FDP_IFF.1: 18
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 19
- FDP_ITC.1: 18
- FDP_ITC.2: 29
- FDP_ITT.1: 3
- FDP_RIP: 80
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FDP_ROL: 17
- FDP_ROL.1: 4
- FDP_SDC: 1
- FDP_SDC.1: 2
- FDP_SDI: 4
- FDP_SDI.2: 7
- FDP_UCT.1: 3
- FDP_UIT: 11
- FDP_UIT.1: 7
- FIA:
- FIA_AFL: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 18
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_ATD: 11
- FIA_ATD.1: 3
- FIA_UAU: 83
- FIA_UAU.1: 5
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 1
- FIA_UAU.6.1: 1
- FIA_UID: 49
- FIA_UID.1: 20
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 1
- FIA_USB: 5
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 22
- FMT_LIM.1: 21
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 3
- FMT_MOF: 7
- FMT_MOF.1: 1
- FMT_MSA: 113
- FMT_MSA.1: 18
- FMT_MSA.2: 1
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MTD: 46
- FMT_MTD.1: 9
- FMT_MTD.3: 2
- FMT_SMF: 55
- FMT_SMF.1: 35
- FMT_SMF.1.1: 1
- FMT_SMR: 59
- FMT_SMR.1: 42
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 5
- FPR_UNO.1: 8
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 14
- FPT_EMS.1.1: 2
- FPT_EMS.1.2: 2
- FPT_FLS: 42
- FPT_FLS.1: 19
- FPT_FLS.1.1: 1
- FPT_ITT: 6
- FPT_ITT.1: 3
- FPT_PHP: 6
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_RCV: 22
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 33
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 5
- FTP_TRP.1: 7
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 15
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 8
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APPLET: 3
- A.APPS-PROVIDER: 5
- A.CONTROLLING-: 1
- A.CONTROLLING-AUTHORITY: 4
- A.DELETION: 3
- A.VERIFICATION: 3
- A.VERIFICATION-AUTHORITY: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 6
- D.APP_KEYS: 5
- D.APSD_KEYS: 1
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 1
- D.CRYPTO: 4
- D.GASD_KEYS: 1
- D.ISD_KEYS: 1
- D.JCS_CODE: 7
- D.JCS_DATA: 9
- D.JCS_IDENTIFIER: 2
- D.OPTIONAL_SERVICE: 2
- D.OS-: 1
- D.OS-UPDATE_CODE: 5
- D.OS-UPDATE_CODE_ID: 1
- D.PIN: 4
- D.SEC_DATA: 7
- D.VASD_KEYS: 1
- O:
- O.AES: 1
- O.ALARM: 12
- O.APPLET: 16
- O.APPLI-AUTH: 8
- O.CARD-: 3
- O.CARD-MANAGEMENT: 21
- O.CIPHER: 11
- O.CODE_PCKG: 8
- O.CODE_PKG: 6
- O.COMM_AUTH: 8
- O.COMM_CONFIDENTIALITY: 7
- O.COMM_INTEGRITY: 8
- O.CONFID-OS-UPDATE: 7
- O.DELETION: 5
- O.DOMAIN-RIGHTS: 8
- O.FIREWALL: 14
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INTEG: 7
- O.INSTALL: 9
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 7
- O.LOAD: 10
- O.NATIVE: 8
- O.OBJ-DELETION: 6
- O.OPERATE: 18
- O.PIN-MNGT: 9
- O.REALLOCATION: 6
- O.REMOTE_SERVICE_ACTIVATION: 6
- O.REMOTE_SERVICE_AUDIT: 8
- O.RESOURCES: 7
- O.RND: 2
- O.RNG: 11
- O.SCP: 25
- O.SCP-SUPPORT: 18
- O.SID: 10
- O.TDES: 2
- O.TRANSACTION: 7
- OE:
- OE.APPLET: 6
- OE.APPS-PROVIDER: 6
- OE.BASIC-APPS-VALIDATION: 1
- OE.CARD-: 1
- OE.CODE-EVIDENCE: 12
- OE.CONTROLLING-AUTHORITY: 5
- OE.GEMACTIVATE-ADMIN: 6
- OE.KEY: 1
- OE.KEY-CHANGE: 5
- OE.OS-: 1
- OE.OS-UPDATE-: 1
- OE.OS-UPDATE-ENCRYPTION: 4
- OE.OS-UPDATE-EVIDENCE: 4
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURITY-DOMAINS: 4
- OE.TRUSTED-APPS-: 1
- OE.TRUSTED-APPS-DEVELOPER: 5
- OE.TRUSTED-APPS_PRE-: 1
- OE.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 4
- OE.VERIFICATION: 20
- OE.VERIFICATION-AUTHORITY: 5
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 5
- OP.ARRAY_LENGTH: 4
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 4
- OP.PUT: 4
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ACTIVATION-KEY-ACTOR: 2
- OSP.ACTIVATION_KEY_ACTOR: 2
- OSP.ADDITIONAL_CODE_ENCRYPTION: 4
- OSP.ADDITIONAL_CODE_SIGNING: 3
- OSP.ATOMIC_ACTIVATION: 4
- OSP.KEY-CHANGE: 4
- OSP.QUOTAS: 3
- OSP.SECURITY-: 1
- OSP.SECURITY-DOMAINS: 3
- OSP.SERVICE_AUDIT: 5
- OSP.TOE-IDENTIFICATION: 2
- OSP.TOE_IDENTIFICATION: 1
- OSP.TRUSTED-APPS-DEVELOPER: 5
- OSP.TRUSTED-APPS_PRE-ISSUANCE-: 1
- OSP.TRUSTED-APPS_PRE-ISSUANCE-LOADING: 3
- OSP.VERIFICATION: 3
- OT:
- R:
- T:
- T.COM_EXPLOIT: 3
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 3
- T.CONFID-OS-UPDATE_LOAD: 4
- T.DELETION: 3
- T.EXE-CODE: 6
- T.FAKE-CERT: 3
- T.INSTALL: 2
- T.INTEG-APPLI-CODE: 5
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE_LOAD: 3
- T.LIFE_CYCLE: 3
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 3
- T.RESOURCES: 2
- T.SID: 6
- T.UNAUTHORIZED_ACCESS_TO_SERVICE: 1
- T.UNAUTHORIZED_CARD_MNGT: 3
- T.UNAUTHORIZED_TOE_CODE_UPDATE: 2
- T.WRONG-UPDATE-STATE: 3
|
- A:
- A.ADMINISTRATORS: 3
- A.ADMINISTROTORS: 1
- A.CLIENTS: 4
- A.NETWORKS: 3
- A.PASSWORD: 3
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 3
- A.VERSION: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- OE:
- OE.BANNER: 4
- OE.PASSWORD: 4
- OE.SECURE_CHANNEL: 4
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 4
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 8
- TDEA: 1
- TDES: 15
- Triple-DES: 4
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 4
- SHA-384: 2
- SHA-512: 2
- SHA224: 5
- SHA256: 6
- SHA384: 6
- SHA512: 6
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 7
- Key agreement: 1
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- Physical Tampering: 2
- fault induction: 2
- malfunction: 12
- physical tampering: 2
- SCA:
- DPA: 2
- Leak-Inherent: 4
- Physical Probing: 2
- SPA: 1
- physical probing: 8
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-4: 6
- FIPS PUB 197: 4
- FIPS PUB 198-1: 1
- FIPS PUB 46-3: 3
- FIPS PUB 81: 2
- FIPS180-4: 3
- PKCS:
- PKCS #1: 3
- PKCS#1: 11
- PKCS#5: 8
- PKCS1: 1
- PKCS3: 3
- RFC:
- SCP:
- SCP02: 5
- SCP03: 5
- SCP11: 4
- SCP21: 3
|
|
pdf_data/st_keywords/javacard_version |
- GlobalPlatform:
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.5: 7
|
|
pdf_data/st_keywords/javacard_api_const |
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_MAC_128_NOPAD: 1
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_NOPAD: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- ECDSA:
- ALG_ECDSA_SHA: 1
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 1
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_SHA1: 1
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- ALG_RSA_SHA_PKCS1_PSS: 1
- ALG_RSA_SHA_RFC2409: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 1
- ALG_SHA_384: 1
- ALG_SHA_512: 1
- misc:
|
|
pdf_data/st_keywords/javacard_packages |
- javacard:
- javacard.framework: 1
- javacard.security: 2
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [AGD] for details. JCS.RNG This security function provides random value using a: 1
|
|
pdf_data/st_metadata |
|
- /Author: Hewlett-Packard Company
- /CreationDate: D:20110926112601
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110926112601
- /Producer: Microsoft® Office Word 2007
- /Subject: CVAE-ST
- /Title: HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Target
- pdf_file_size_bytes: 448528
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |