This page was not yet optimized for use on mobile
devices.
BitRaser Drive Eraser V3.0.0.6
CSV information
| Status | active |
|---|---|
| Valid from | 11.12.2023 |
| Valid until | 10.12.2028 |
| Scheme | 🇮🇳 IN |
| Manufacturer | Stellar Information Technology Pvt. Ltd. |
| Category | Data Protection |
| Security level | EAL2 |
Heuristics summary
Certificate ID: IC3S/KOL01/STELLAR/EAL2/0221/0028
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Security level
EAL 2, EAL2Certificates
IC3S/KOLO1/STELLAR/EAL2/0221/0028Evaluation facilities
Common Criteria Test Laboratory, ERTLCertification report
Extracted keywords
Hash functions
SHA256Security level
EAL2, EAL 2, EAL 4Claims
A.PLATFORM, A.PROPER_USE, OP.ERASE, OP.RAID, OP.PDF, OP.CLEANSecurity Assurance Requirements (SAR)
AGD_PRECertificates
IC3S/KOL01/STELLAR/EAL2/0221/0028/CREvaluation facilities
Common Criteria Test Laboratory, ERTLFile metadata
| Author | Tapas Bandopadhyay |
|---|---|
| Creation date | D:20231129100220+05'30' |
| Modification date | D:20231129100220+05'30' |
| Pages | 15 |
| Creator | Microsoft® Word 2010 |
| Producer | Microsoft® Word 2010 |
Security target
Extracted keywords
Symmetric Algorithms
AESHash functions
MD5Security level
EAL2Claims
O.COMPLETE_ERASURE, O.LEGIT_USE, T.INCOMPLETE_ERASURE, T.UNAUTH_USER, A.PLATFORM, A.PROPER_USE, OP.ERASE, OP.RAID, OP.PDF, OP.CLEAN, OE.PLATFORM, OE.PROPER_USESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_CKM.4, FCS_CKM.1, FDP_RIP.1, FDP_RIP.1.1, FIA_UID.2, FIA_UID.2.1, FPT_TEE, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM.1, FPT_TEE.1Standards
FIPS PUB 197, RFC 1321File metadata
| Author | Amit Shukla |
|---|---|
| Creation date | D:20230519112100+05'30' |
| Modification date | D:20230519112100+05'30' |
| Pages | 35 |
| Creator | Microsoft® Word 2013 |
| Producer | Microsoft® Word 2013 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
IC3S/KOL01/STELLAR/EAL2/0221/0028Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2Scheme data
| Serial Number | 3 | |
|---|---|---|
| Product | BitRaser Drive Eraser V3.0.0.6 | |
| Sponsor | Stellar Information Technology Private Ltd. | |
| Developer | Stellar Information Technology Private Ltd. | |
| Level | EAL2 | |
| Certification Date | 11.12.2023 | |
| Report Link | https://www.commoncriteria-india.gov.in/sites/default/files/2023-12/CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf | |
| Report Name | CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf | |
| Target Link | https://www.commoncriteria-india.gov.in/sites/default/files/2023-12/Security-Target-v11.pdf | |
| Target Name | Security-Target-v11.pdf | |
| Cert Link | https://www.commoncriteria-india.gov.in/sites/default/files/2023-12/BitRaser_Driver_CC_Certificate.pdf | |
| Cert Name | BitRaser_Driver_CC_Certificate.pdf | |
References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Data Protection",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/BitRaser_Driver_CC_Certificate.pdf",
"dgst": "f5c97e7550204b32",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "IC3S/KOL01/STELLAR/EAL2/0221/0028",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0.0.6"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2023-12/BitRaser_Driver_CC_Certificate.pdf",
"cert_name": "BitRaser_Driver_CC_Certificate.pdf",
"certification_date": "2023-12-11",
"developer": "Stellar Information Technology Private Ltd.",
"level": "EAL2",
"product": "BitRaser Drive Eraser V3.0.0.6",
"report_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2023-12/CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf",
"report_name": "CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf",
"serial_number": "3",
"sponsor": "Stellar Information Technology Private Ltd.",
"target_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2023-12/Security-Target-v11.pdf",
"target_name": "Security-Target-v11.pdf"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Stellar Information Technology Pvt. Ltd.",
"manufacturer_web": "https://www.stellarinfo.com/",
"name": "BitRaser Drive Eraser V3.0.0.6",
"not_valid_after": "2028-12-10",
"not_valid_before": "2023-12-11",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "BitRaser_Driver_CC_Certificate.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IN": {
"IC3S/KOLO1/STELLAR/EAL2/0221/0028": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ERTL": {
"Common Criteria Test Laboratory, ERTL": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IN": {
"IC3S/KOL01/STELLAR/EAL2/0221/0028/CR": 15
}
},
"cc_claims": {
"A": {
"A.PLATFORM": 1,
"A.PROPER_USE": 1
},
"OP": {
"OP.CLEAN": 1,
"OP.ERASE": 1,
"OP.PDF": 1,
"OP.RAID": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"AGD": {
"AGD_PRE": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL 4": 3,
"EAL2": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ERTL": {
"Common Criteria Test Laboratory, ERTL": 4
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tapas Bandopadhyay",
"/CreationDate": "D:20231129100220+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20231129100220+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 698607,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteria-india.gov.in/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 15
},
"st_filename": "Security-Target-v11.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.PLATFORM": 5,
"A.PROPER_USE": 7
},
"O": {
"O.COMPLETE_ERASURE": 6,
"O.LEGIT_USE": 4
},
"OE": {
"OE.PLATFORM": 5,
"OE.PROPER_USE": 3
},
"OP": {
"OP.CLEAN": 5,
"OP.ERASE": 6,
"OP.PDF": 5,
"OP.RAID": 5
},
"T": {
"T.INCOMPLETE_ERASURE": 5,
"T.UNAUTH_USER": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 5,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 2
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 2,
"FCS_COP": 2,
"FCS_COP.1": 5,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_RIP.1": 5,
"FDP_RIP.1.1": 1
},
"FIA": {
"FIA_UID.2": 5,
"FIA_UID.2.1": 1
},
"FPT": {
"FPT_STM.1": 3,
"FPT_TEE": 1,
"FPT_TEE.1": 4,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"MD": {
"MD5": {
"MD5": 5
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"FIPS": {
"FIPS PUB 197": 1
},
"RFC": {
"RFC 1321": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Amit Shukla",
"/CreationDate": "D:20230519112100+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2013",
"/ModDate": "D:20230519112100+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2013",
"pdf_file_size_bytes": 990141,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 35
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-BitRaser_Drive_Eraser_3_0_0_6_EAL2-version-1.0.pdf",
"scheme": "IN",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Security-Target-v11.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "dfaded18f61797316df0d09004ce2d478d264444f9dfeeca40bcd04a9067f466",
"txt_hash": "13a9ebb0e15c3a63819a6632d82d1ded7423673600adc15be8e8cb9659be2a97"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "ca93901c4164092eae019c0cac9c94c35b743a055d318fc9cac92ff2886e5f98",
"txt_hash": "6f8efbea658fbabc20b7c8d932a113c65af418d4ba75969eb18ed9add1bb6269"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "8e86bb3d43a65b8e1909a8a3ab0d726cf535f632f15e0754931ac49376bce65f",
"txt_hash": "c55ca3cd16c19eaeff549b5489f7855ed62c84380cde050c08135abc7fe9d7a8"
}
},
"status": "active"
}