| name |
CypherNET Multi-Protocol Encryptor |
Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z) |
| category |
Network and Network-Related Devices and Systems |
Access Control Devices and Systems |
| scheme |
AU |
JP |
| status |
archived |
archived |
| not_valid_after |
01.09.2019 |
06.06.2021 |
| not_valid_before |
06.06.2008 |
06.06.2016 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_CR_1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Senetas_CypherNet_ST_1.18.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0514_est.pdf |
| manufacturer |
Senetas Corporation Ltd, Distributed by Thales SA (SafeNet) |
Hitachi, Ltd. |
| manufacturer_web |
https://www.senetas.com/ |
https://www.hitachi.com/ |
| security_level |
EAL4 |
EAL2+, ALC_FLR.1 |
| dgst |
f5dc68d06d0b7de8 |
4b794daffbae517d |
| heuristics/cert_id |
Certificate Number: 2008/46 |
JISEC-CC-CRP-C0514 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
- |
00, 80, 01, 25 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0514
- certification_date: 01.06.2016
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0514_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system : " Hitachi Unified Storage VM" (as known as “Hitachi Virtual Storage Platform VX7”). This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0514_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0514_est.pdf
- toe_version: 80-01-25-00/00(R8-01A-06_Z)
- vendor: Hitachi, Ltd.
- expiration_date: 01.07.2021
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program 80-01-25-00/00(R8-01A-06_Z)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0514_it4504.html
- toe_overseas_name: Hitachi Virtual Storage Platform G1000, Hitachi Virtual Storage Platform VX7 Control Program80-01-25-00/00(R8-01A-06_Z)
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
Senetas_CypherNet_CR_1.0.pdf |
c0514_erpt.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- AU:
- Certificate Number: 2008/46: 1
|
- JP:
- CRP-C0514-01: 1
- Certification No. C0514: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 1
- A.MAINTENCE_PC: 1
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- X509:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- out of scope: 1
- was identified it required significant time and effort to exploit and was therefore considered out of scope for an EAL 4 evaluation. 48 The evaluators focused their efforts on the 1G Ethernet Encryptors: 1
|
|
| pdf_data/report_metadata |
- /AISEF: CSC Australia
- /Author: AISEP Certification Authority
- /Category: Report
- /Cert_Level: EAL 4
- /Company: Australasian Information Security Evaluation Program
- /CreationDate: D:20080611100719+10'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Developer: Senetas
- /IssueDate: 6 June 2008
- /ModDate: D:20080611101433+10'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Product: Cyphernet Multifunction Encryptor - Product
- /SourceModified: D:20080606065101
- /Subject: Certificate Number: 2008/46
- /Title: Certification Report
- /docVersion: 1.0
- pdf_file_size_bytes: 158443
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20160906162354+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160906162432+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 473024
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 41
|
| pdf_data/st_filename |
Senetas_CypherNet_ST_1.18.pdf |
c0514_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 9
- ACM_CAP.4: 18
- ACM_SCP.2: 6
- ADO:
- ADO_DEL.2: 8
- ADO_IGS.1: 5
- ADV:
- ADV_FSP.2: 9
- ADV_HLD.2: 13
- ADV_IMP.1: 6
- ADV_LLD.1: 14
- ADV_RCR.1: 5
- ADV_SPM.1: 17
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 11
- AGD_USR.1: 10
- ALC:
- ALC_DVS.1: 6
- ALC_LCD.1: 7
- ALC_TAT.1: 8
- ATE:
- ATE_COV.2: 6
- ATE_DPT.1: 5
- ATE_FUN.1: 10
- ATE_IND.2: 6
- AVA:
- AVA_MSU.2: 10
- AVA_SOF.1: 6
- AVA_VLA.2: 7
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 5
- FAU_GEN.1.1: 9
- FAU_GEN.1.2: 7
- FAU_SAR.1: 4
- FAU_SAR.1.1: 8
- FAU_SAR.1.2: 6
- FCS:
- FCS_CKM.1: 25
- FCS_CKM.1.1: 24
- FCS_CKM.2: 6
- FCS_CKM.2.1: 8
- FCS_CKM.4: 23
- FCS_CKM.4.1: 12
- FCS_COP.1: 23
- FCS_COP.1.1: 57
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 9
- FDP_ACC.1.1: 8
- FDP_ACF.1: 5
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 8
- FDP_DAU.1: 5
- FDP_DAU.1.1: 9
- FDP_DAU.1.2: 7
- FDP_IFC.1: 11
- FDP_IFC.1.1: 8
- FDP_IFF.1: 6
- FDP_IFF.1.1: 6
- FDP_IFF.1.2: 8
- FDP_IFF.1.3: 6
- FDP_IFF.1.4: 8
- FDP_IFF.1.5: 6
- FDP_IFF.1.6: 8
- FDP_UCT.1: 4
- FDP_UCT.1.1: 8
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 6
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 10
- FIA_UID.1: 3
- FIA_UID.2: 7
- FIA_UID.2.1: 5
- FMT:
- FMT_MSA.1: 16
- FMT_MSA.1.1: 16
- FMT_MSA.2: 30
- FMT_MSA.2.1: 23
- FMT_MSA.3: 8
- FMT_MSA.3.1: 16
- FMT_MSA.3.2: 16
- FMT_MTD.1: 5
- FMT_MTD.1.1: 10
- FMT_SMR.1: 18
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 7
- FPT:
- FPT_AMT.1: 6
- FPT_AMT.1.1: 8
- FPT_FLS.1: 4
- FPT_FLS.1.1: 5
- FPT_ITT.1: 4
- FPT_ITT.1.1: 8
- FPT_PHP.3: 5
- FPT_PHP.3.1: 16
- FPT_STM.1: 6
- FPT_STM.1.1: 9
- FPT_TST.1: 5
- FPT_TST.1.1: 8
- FPT_TST.1.2: 6
- FPT_TST.1.3: 8
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 8
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 6
- FTP_ITC.1.1: 8
- FTP_ITC.1.2: 6
- FTP_ITC.1.3: 7
|
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 18
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 18
- FIA_UID.2.1: 1
- FIA_USB: 19
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.AUDIT: 3
- A.CYPHERMANAGER: 3
- A.INSTALL: 3
- A.LOCATE: 3
- A.PRIVATEKEY: 3
- O:
- O.ADMIN: 11
- O.AUDIT: 9
- O.AUDITLOG: 9
- O.AUTHDATA: 5
- O.CERTGEN: 11
- O.CONNECT: 2
- O.ENCRYPT: 9
- O.FAILSAFE: 6
- O.IDENT: 9
- O.INFOFLOW: 10
- O.INSTALL: 7
- O.KEYMAN: 10
- O.PERSONNEL: 7
- O.PHYSICAL: 4
- O.REMOTEMGT: 9
- O.ROLEMGT: 5
- O.ROLES: 6
- O.TAMPER: 8
- T:
- T.ABUSE: 3
- T.ATTACK: 3
- T.CAPTURE: 3
- T.CONNECT: 3
- T.IMPERSON: 3
- T.LINK: 3
- T.MAL: 3
- T.OBSERVE: 3
- T.PHYSICAL: 3
- T.PRIVILEGE: 3
|
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MAINTENANCE_PC: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM_AUTH: 8
- O.ADM_ROLE: 5
- O.AUD_GEN: 7
- O.HDD_: 2
- O.HDD_ENC: 6
- O.HDD_SHRED: 3
- O.HOST_ACCESS: 8
- O.SEC_COMM: 8
- O.SWITCH_AUTH: 6
- OE:
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-: 1
- OE.FC-SP_HBA: 2
- OE.HDD_ENC: 2
- OE.MAINTENANCE_PC: 3
- OE.MANAGEMENT_PC: 2
- OE.MANAGE_SECRET: 3
- OE.NOEVIL: 2
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 3
- FIPS PUB 140-2: 5
- FIPS PUB 180-1: 3
- FIPS PUB 186-2: 3
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- FIPS PUB 81: 2
- PKCS:
- PKCS #1: 2
- PKCS 12: 1
- PKCS#1: 2
- RFC:
- RFC 1661: 1
- RFC 1968: 1
- RFC 1969: 1
- RFC 2246: 1
- RFC 2401: 1
- RFC 2402: 1
- RFC 2403: 1
- RFC 2404: 1
- RFC 2405: 1
- RFC 2406: 1
- RFC 2408: 1
- RFC 2409: 1
- RFC 2412: 1
- RFC 2459: 1
- RFC 2574: 1
- RFC2574: 2
- X509:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
- RFC:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Peter Sim
- /Company:
- /CreationDate: D:20080313112226+11'00'
- /Creator: Acrobat PDFMaker 6.0 for Word
- /Date: 28-Mar-07
- /ModDate: D:20080313113304+11'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20080313002134
- /Title: CypherNET
- /Version: 1.17
- pdf_file_size_bytes: 1578004
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 95
|
- /Author: 八木
- /CreationDate: D:20160901154400+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20160901154400+09'00'
- /Producer: Microsoft® Word 2010
- /Subject: CC EAL2 Security Target
- /Title: USP_V ST
- pdf_file_size_bytes: 1477873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |