Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A)
JISEC-CC-CRP-C0315
SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
JISEC-CC-CRP-C0102
name Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program Version: 70-02-05-00/00(R7-02-06A) SANRISE Universal Storage Platform CHA/DKA Program, TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
not_valid_before 2011-09-30 2007-06-27
not_valid_after 2016-10-03 2013-10-07
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_est.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0315_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0102_erpt.pdf
state/report/pdf_hash 7910fa810cd9502746be78793d14e72383e0989ee95fcf2b2edae3ea04068320 2e60ea5270fbc0f11c2112143832445e6142b856f0a0892f3ab31b05cfe3884a
state/report/txt_hash 09e84f380f6c4280996ba24c5edcc16300f45109113f5abbb00632ac97721f48 9ad5433a32d590aac96300931d64097f1b55f8e70fd739f8c5e99d49e13e407c
state/st/pdf_hash c38eda89a86dd5d4bd4ffc8d16634f3b14ad3ebc8cff8e16e89902c6e0568d89 30bcb2eaa6f18b4fe7c9926057263a785d8c053585dc6ee05d495c733c9af099
state/st/txt_hash ba0d62c8c43144c84519dfc3226855aab8458e47f5931aacf4e04f4ba6968689 b52cd8c677fe4c51cf6d131f8b55862970d9b7f0953c265a60a45887d1a5b538
heuristics/cert_id JISEC-CC-CRP-C0315 JISEC-CC-CRP-C0102
heuristics/scheme_data
  • cert_id: C0315
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: -----
  • expiration_date: 2016-10
  • claim: EAL2
  • certification_date: 2011-09
  • toe_overseas_link: None
  • toe_japan_name: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A)
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html
  • enhanced:
    • product: Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program
    • toe_version: 70-02-05-00/00(R7-02-06A)
    • product_type: Control Program for storage system
    • certification_date: 2011-09-30
    • cc_version: 3.1
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • report_link: https://www.ipa.go.jp/en/security/c0315_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0315_est.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging
  • cert_id: C0102
  • supplier: Hitachi, Ltd.
  • toe_overseas_name: TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
  • expiration_date: 2013-10
  • claim: EAL2
  • certification_date: 2007-06
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
  • toe_japan_name: SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
  • enhanced:
    • product: SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
    • toe_version: 50-04-34-00/00
    • product_type: IT Product (Storage Control Software)
    • certification_date: 2007-06-27
    • cc_version: 2.1
    • assurance_level: EAL2
    • vendor: Hitachi, Ltd.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
    • report_link: https://www.ipa.go.jp/en/security/c0102_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0102_est.pdf
    • description: PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
heuristics/scheme_data/cert_id C0315 C0102
heuristics/scheme_data/certification_date 2011-09 2007-06
heuristics/scheme_data/enhanced/cc_version 3.1 2.1
heuristics/scheme_data/enhanced/certification_date 2011-09-30 2007-06-27
heuristics/scheme_data/enhanced/description PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. TOE security functionality The TOE has the following security functions to protect user data stored in the storage system. - Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources - Controlling accesses from host computers to the granted logical devices in the storage system. - Authentication of host computers - Identification and authentication of Storage Navigator users and support personnel - Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. - Encryption of stored data(Encryption key management) - Shredding - Audit logging PRODUCT DESCRIPTION TOEs are software programs that run on the storage subsystems manufactured by Hitachi, Ltd. and control these subsystems. The subsystems are “SANRISE Universal Storage Platform”, “SANRISE Network Storage Controller”, “TagmaStore Universal Storage Platform”, “TagmaStore Network Storage Controller”, “SANRISE H12000”, and “SANRISE H10000”. TOEs have security feature to control access so that unintended access to user data on the storage subsystems would not be performed (i.e. User data that should not be changed would not be changed due to illegal access or operation mistakes)
heuristics/scheme_data/enhanced/evaluation_facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
heuristics/scheme_data/enhanced/product Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program SANRISE Universal Storage Platform CHA/DKA Program TagmaStore Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program
heuristics/scheme_data/enhanced/product_type Control Program for storage system IT Product (Storage Control Software)
heuristics/scheme_data/enhanced/report_link https://www.ipa.go.jp/en/security/c0315_erpt.pdf https://www.ipa.go.jp/en/security/c0102_erpt.pdf
heuristics/scheme_data/enhanced/target_link https://www.ipa.go.jp/en/security/c0315_est.pdf https://www.ipa.go.jp/en/security/c0102_est.pdf
heuristics/scheme_data/enhanced/toe_version 70-02-05-00/00(R7-02-06A) 50-04-34-00/00
heuristics/scheme_data/expiration_date 2016-10 2013-10
heuristics/scheme_data/toe_japan_name Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program 70-02-05-00/00(R7-02-06A) SANRISE Universal Storage Platform CHA/DKA Program SANRISE Network Storage Controller CHA/DKA Program SANRISE H12000 CHA/DKA Program SANRISE H10000 CHA/DKA Program 50-04-34-00/00
heuristics/scheme_data/toe_overseas_link None https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0102_it5068.html
heuristics/scheme_data/toe_overseas_name ----- TagmaStore Universal Storage Platform CHA/DKA Program TagmaStore Network Storage Controller CHA/DKA Program 50-04-34-00/00
pdf_data/report_filename c0315_erpt.pdf c0102_erpt.pdf
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/cc_cert_id/JP
  • CRP-C0315-01: 1
  • Certification No. C0315: 1
  • CRP-C0102-01: 1
  • Certification No. C0102: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.ILLEGAL_XCNTL: 1
    • T.TSF_COMP: 1
    • T.LP_LEAK: 1
    • T.CHG_CONFIG: 1
    • T.HDD_THEFT: 1
    • T.HDD_REUSE: 1
  • A:
    • A.NOEVIL: 1
    • A.NOEVIL_MNT: 1
    • A.PHYSICAL_SEC: 1
    • A.MANAGE_SECRET: 1
    • A.MANAGEMENT_PC: 1
    • A.CONNECT_STORAGE: 1
    • A.EXTERNAL_SERVER: 2
pdf_data/report_keywords/cc_security_level/EAL/EAL2 4 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 7
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • ISO:
    • ISO/IEC 15408:1999: 1
  • CC:
    • CCIMB-99-032: 2
    • CCIMB-99-033: 2
    • CCIMB-99-031: 1
pdf_data/report_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCIMB-99-032: 2
  • CCIMB-99-033: 2
  • CCIMB-99-031: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 3
pdf_data/report_metadata
  • pdf_file_size_bytes: 474751
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 41
  • /CreationDate: D:20111222113805+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20111222113848+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 104544
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /ModDate: D:20070918163642+09'00'
  • /CreationDate: D:20070918163642+09'00'
  • /Title: untitled
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • pdf_hyperlinks:
pdf_data/report_metadata//CreationDate D:20111222113805+09'00' D:20070918163642+09'00'
pdf_data/report_metadata//ModDate D:20111222113848+09'00' D:20070918163642+09'00'
pdf_data/report_metadata//Producer Microsoft® Word 2010 Acrobat Distiller 6.0 (Windows)
pdf_data/report_metadata/pdf_file_size_bytes 474751 104544
pdf_data/report_metadata/pdf_is_encrypted True False
pdf_data/report_metadata/pdf_number_of_pages 41 20
pdf_data/st_filename c0315_est.pdf c0102_est.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 512: 1
  • FF:
    • DH:
      • DH: 2
    • DSA:
      • DSA: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.ADM_AUTH: 9
    • O.ADM_ROLE: 5
    • O.SEC_COMM: 8
    • O.HOST_AUTH: 5
    • O.HOST_ACCESS: 8
    • O.HDD_ENC: 6
    • O.HDD_SHRED: 3
    • O.AUD_GEN: 8
    • O.HDD_: 2
  • T:
    • T.ILLEGAL_XCNTL: 3
    • T.TSF_COMP: 3
    • T.LP_LEAK: 3
    • T.CHG_CONFIG: 3
    • T.HDD_THEFT: 3
    • T.HDD_REUSE: 3
  • A:
    • A.NOEVIL: 3
    • A.NOEVIL_MNT: 3
    • A.PHYSICAL_SEC: 3
    • A.MANAGE_SECRET: 3
    • A.MANAGEMENT_PC: 3
    • A.CONNECT_STORAGE: 3
    • A.EXTERNAL_SERVER: 3
  • OE:
    • OE.NOEVIL: 2
    • OE.NOEVIL-MNT: 1
    • OE.PHYSICAL_SEC: 4
    • OE.MANAGE_SECRET: 2
    • OE.MANAGEMENT_PC: 3
    • OE.CONNECT_STORAGE: 2
    • OE.EXTERNAL_SERVER: 3
    • OE.FC-SP_HBA: 3
    • OE.HDD_ENC: 2
    • OE.NOEVIL_MNT: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ACM:
    • ACM_CAP.2: 2
  • ADO:
    • ADO_DEL.1: 2
    • ADO_IGS.1: 3
  • ADV:
    • ADV_SPM.1: 4
    • ADV_FSP.1: 2
    • ADV_HLD.1: 3
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 3
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_SOF.1: 2
    • AVA_VLA.1: 2
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
  • ADV_SPM.1: 4
  • ADV_FSP.1: 2
  • ADV_HLD.1: 3
  • ADV_RCR.1: 2
pdf_data/st_keywords/cc_sar/AGD
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_ADM.1: 3
  • AGD_USR.1: 3
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 1 2
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 1 2
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.2: 1
  • AVA_SOF.1: 2
  • AVA_VLA.1: 2
pdf_data/st_keywords/cc_security_level/EAL
  • EAL2: 3
  • EAL 2: 1
  • EAL2: 1
pdf_data/st_keywords/cc_security_level/EAL/EAL2 3 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_SAR.1: 9
    • FAU_STG.1: 12
    • FAU_STG.3: 10
    • FAU_STG.4: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3.1: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.4: 11
    • FCS_CKM.2: 1
    • FCS_COP.1: 2
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACF.1: 13
    • FDP_RIP.1: 10
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1.1: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_ATD: 19
    • FIA_SOS: 20
    • FIA_UAU.1: 15
    • FIA_UAU.2: 11
    • FIA_UID.2: 16
    • FIA_USB: 18
    • FIA_UID.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_SOS.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_USB.1: 6
  • FMT:
    • FMT_MOF.1: 14
    • FMT_MSA.1: 12
    • FMT_MSA.3: 13
    • FMT_MTD.1: 15
    • FMT_MTD.3: 10
    • FMT_SMF.1: 15
    • FMT_SMR.1: 18
    • FMT_MOF.1.1: 1
    • FMT_MSA.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1.1: 1
    • FMT_MTD.3.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 13
    • FPT_STM.1.1: 1
    • FPT_STM: 1
  • FTP:
    • FTP_ITC.1: 10
    • FTP_TRP.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 4
  • FIA:
    • FIA_UID.1: 4
    • FIA_UID.2: 13
  • FMT:
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1: 13
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.1.1: 1
    • FMT_SMF.1: 13
    • FMT_MSA.2: 11
    • FMT_MSA.2.1: 1
    • FMT_SMF.1.1: 1
    • FMT_SAE.1: 10
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
  • FPT:
    • FPT_RVM.1: 13
    • FPT_RVM.1.1: 1
    • FPT_STM.1: 14
    • FPT_STM.1.1: 1
    • FPT_SEP.1: 12
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_ACC.1: 16
  • FDP_ACF.1: 13
  • FDP_RIP.1: 10
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1.1: 1
  • FDP_IFC.1: 2
  • FDP_ACC.1: 15
  • FDP_ACC.1.1: 1
  • FDP_ACF.1: 8
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_IFC.1: 4
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 16 15
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 13 8
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 2 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_AFL.1: 10
  • FIA_ATD: 19
  • FIA_SOS: 20
  • FIA_UAU.1: 15
  • FIA_UAU.2: 11
  • FIA_UID.2: 16
  • FIA_USB: 18
  • FIA_UID.1: 8
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 1
  • FIA_ATD.1: 6
  • FIA_SOS.1: 2
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_USB.1: 6
  • FIA_UID.1: 4
  • FIA_UID.2: 13
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 8 4
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.2 16 13
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_MOF.1: 14
  • FMT_MSA.1: 12
  • FMT_MSA.3: 13
  • FMT_MTD.1: 15
  • FMT_MTD.3: 10
  • FMT_SMF.1: 15
  • FMT_SMR.1: 18
  • FMT_MOF.1.1: 1
  • FMT_MSA.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MTD.1.1: 1
  • FMT_MTD.3.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 11
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1: 13
  • FMT_SMR.1: 14
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.1.1: 1
  • FMT_SMF.1: 13
  • FMT_MSA.2: 11
  • FMT_MSA.2.1: 1
  • FMT_SMF.1.1: 1
  • FMT_SAE.1: 10
  • FMT_SAE.1.1: 1
  • FMT_SAE.1.2: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 12 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 13 11
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 15 13
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 18 14
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_STM.1: 13
  • FPT_STM.1.1: 1
  • FPT_STM: 1
  • FPT_RVM.1: 13
  • FPT_RVM.1.1: 1
  • FPT_STM.1: 14
  • FPT_STM.1.1: 1
  • FPT_SEP.1: 12
  • FPT_SEP.1.1: 1
  • FPT_SEP.1.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_STM.1 13 14
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
      • SSLv3.0: 2
    • TLS:
      • TLSv1.0: 2
      • TLS: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key exchange: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 180-2: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
pdf_data/st_keywords/standard_id/CC
  • CCMB-2009-07-001: 2
  • CCMB-2009-07-002: 2
  • CCMB-2009-07-003: 2
  • CCMB-2009-07-004: 2
  • CCIMB-99-031: 1
  • CCIMB-99-032: 1
  • CCIMB-99-033: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 1
pdf_data/st_keywords/vendor/Microsoft
  • Microsoft: 2
  • Microsoft: 1
  • Microsoft Corporation: 1
pdf_data/st_keywords/vendor/Microsoft/Microsoft 2 1
pdf_data/st_metadata
  • pdf_file_size_bytes: 1094064
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 77
  • /Title: VSP ST
  • /Subject: CC EAL2 Security Target
  • /Creator: Microsoft® Office Word 2007
  • /CreationDate: D:20111221190410
  • /ModDate: D:20111221190410
  • /Producer: Microsoft® Office Word 2007
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 231671
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
  • /CreationDate: D:20070918131359+09'00'
  • /Author: hiwa.sysdeptdm
  • /Creator: PScript5.dll Version 5.2
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20070918131359+09'00'
  • /Title: Microsoft Word - User Data Protection Security Target_Eng.doc
  • pdf_hyperlinks:
pdf_data/st_metadata//CreationDate D:20111221190410 D:20070918131359+09'00'
pdf_data/st_metadata//Creator Microsoft® Office Word 2007 PScript5.dll Version 5.2
pdf_data/st_metadata//ModDate D:20111221190410 D:20070918131359+09'00'
pdf_data/st_metadata//Producer Microsoft® Office Word 2007 Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Title VSP ST Microsoft Word - User Data Protection Security Target_Eng.doc
pdf_data/st_metadata/pdf_file_size_bytes 1094064 231671
pdf_data/st_metadata/pdf_number_of_pages 77 57
dgst eecf16a3a9948989 5647d3c66dfdd6f9