Hitachi Unified Storage 130 Microprogram Version:0917/A
CSV information ?
Status | archived |
---|---|
Valid from | 12.12.2013 |
Valid until | 09.01.2019 |
Scheme | 🇯🇵 JP |
Manufacturer | Hitachi, Ltd. |
Category | Access Control Devices and Systems |
Security level | EAL2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL2Claims
A.SCertificates
CRP-C0420-01, Certification No. C0420Evaluation facilities
ECSEC LaboratoryStandards
ISO/IEC15408, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Creation date | D:20140529133728+09'00' |
---|---|
Modification date | D:20140529133755+09'00' |
Pages | 36 |
Creator | Microsoft® Word 2010 |
Producer | Microsoft® Word 2010 |
Security target ?
Extracted keywords
Security level
EAL2Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.1, AGD_OPE.1, ALC_CMC.2, ALC_DEL.1, ATE_COV.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_INT.1, ASE_REQ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_STG.1, FAU_STG.4, FAU_GEN, FAU_SAR, FAU_STG, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.4.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.1, FIA_UID.2, FIA_USB.1, FIA_UAU, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.2.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_REV.1, FMT_SMF.1, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MOF, FMT_MSA, FPT_STM.1, FPT_STM.1.1, FRU_RSA.1, FRU_RSA.1.1, FTA_SSL.3, FTA_SSL.3.1Side-channel analysis
malfunctionStandards
ISO/IEC15408, ISO/IEC 15408File metadata
Title | Microsoft Word - HUS130_ST.doc |
---|---|
Author | ODA-USER |
Creation date | D:2014052817411809'00' |
Modification date | D:2014052817411809'00' |
Pages | 48 |
Creator | PrimoPDF http://www.primopdf.com/ |
Producer | PrimoPDF |
Heuristics ?
Extracted SARs
ADV_TDS.1, AVA_VAN.2, ASE_INT.1, ALC_CMC.2, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ALC_DEL.1, ATE_COV.1, ASE_REQ.2, ATE_IND.2, ASE_TSS.1Scheme data ?
Cert Id | JISEC-CC-CRP-C0420 | |
---|---|---|
Supplier | Hitachi, Ltd. | |
Toe Overseas Name | Hitachi Unified Storage 130 Microprogram0917/A | |
Expiration Date | 01.01.2019 | |
Claim | EAL2 | |
Certification Date | 01.12.2013 | |
Toe Overseas Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0420_it2417.html | |
Toe Japan Name | Hitachi Unified Storage 130 Microprogram0917/A | |
Enhanced | ||
Product | Hitachi Unified Storage 130 Microprogram | |
Toe Version | 0917/A | |
Product Type | Storage System control software | |
Cc Version | 3.1 Release3 | |
Assurance Level | EAL2 | |
Vendor | Hitachi, Ltd. | |
Evaluation Facility | ECSEC Laboratory Inc. Evaluation Center | |
Report Link | https://www.ipa.go.jp/en/security/c0420_erpt.pdf | |
Cert Link | https://www.ipa.go.jp/en/security/c0420_eimg.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0420_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 130” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser's login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations. |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0420', 'expiration_date': '2019-01-01', 'certification_date': '2013-12-01', 'enhanced': {'__update__': {'evaluation_facility': 'ECSEC Laboratory Inc. Evaluation Center', 'description': "PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 130” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser's login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations."}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0420', 'supplier': 'Hitachi, Ltd.', 'toe_overseas_name': 'Hitachi Unified Storage 130 Microprogram0917/A', 'expiration_date': '2019-01', 'claim': 'EAL2', 'certification_date': '2013-12', 'toe_overseas_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0420_it2417.html', 'toe_japan_name': 'Hitachi Unified Storage 130 Microprogram0917/A', 'enhanced': {'product': 'Hitachi Unified Storage 130 Microprogram', 'toe_version': '0917/A', 'product_type': 'Storage System control software', 'certification_date': '2013-12-12', 'cc_version': '3.1 Release3', 'assurance_level': 'EAL2', 'vendor': 'Hitachi, Ltd.', 'evaluation_facility': 'ECSEC Laboratory Inc.\n Evaluation Center', 'report_link': 'https://www.ipa.go.jp/en/security/c0420_erpt.pdf', 'cert_link': 'https://www.ipa.go.jp/en/security/c0420_eimg.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0420_est.pdf', 'description': "PRODUCT DESCRIPTION \n Description of TOE \n This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 130” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. \n \n TOE security functionality \n Three kinds of main security functions of this TOE exist as follows. \n \n \n \n - \n Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. \n \n \n - \n Account AuthenticationUser's login facility and control of access to each function of the TOE. \n \n \n - \n AuditAudit log function that records event of administrative operations."}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '91d8b66515e0ea330d46b65bed9eac27448d8f1ee103f66961e81052b8505af5', 'txt_hash': '7dba7bcde19df9a6ca38d17e3691ab18049f842db33dd4ec6fdd96f69eea722d'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ce3c58c157df04563fd2375e39ea51d82c72202772688909e86ae2cf0deb7375', 'txt_hash': '69646e62c43ba174cc80ea13153b820dee682d2e6c296be9f45efd1202a3ef79'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 508873, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 36, '/CreationDate': "D:20140529133728+09'00'", '/Creator': 'Microsoft® Word 2010', '/ModDate': "D:20140529133755+09'00'", '/Producer': 'Microsoft® Word 2010', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 433404, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 48, '/Producer': 'PrimoPDF', '/CreationDate': "D:2014052817411809'00'", '/ModDate': "D:2014052817411809'00'", '/Title': 'Microsoft Word - HUS130_ST.doc', '/Creator': 'PrimoPDF http://www.primopdf.com/', '/Author': 'ODA-USER', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0420-01': 1, 'Certification No. C0420': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 4}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.S': 1}}, 'vendor': {}, 'eval_facility': {'ECSEC': {'ECSEC Laboratory': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 10}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_TDS.1': 1}, 'AGD': {'AGD_OPE.1': 1}, 'ALC': {'ALC_CMC.2': 1, 'ALC_DEL.1': 1}, 'ATE': {'ATE_COV.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.2': 1}, 'ASE': {'ASE_CCL.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 6, 'FAU_SAR.1': 8, 'FAU_SAR.2': 4, 'FAU_STG.1': 8, 'FAU_STG.4': 4, 'FAU_GEN': 2, 'FAU_SAR': 2, 'FAU_STG': 2, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 1, 'FAU_STG.4.1': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACF.1': 6, 'FDP_ACC': 2, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 11, 'FIA_SOS.1': 7, 'FIA_UAU.1': 8, 'FIA_UAU.2': 5, 'FIA_UAU.5': 8, 'FIA_UID.1': 16, 'FIA_UID.2': 7, 'FIA_USB.1': 7, 'FIA_UAU': 6, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF.1': 10, 'FMT_MSA.1': 11, 'FMT_MSA.3': 13, 'FMT_MTD.1': 8, 'FMT_REV.1': 8, 'FMT_SMF.1': 14, 'FMT_SMR.1': 19, 'FMT_MOF.1.1': 1, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_REV.1.1': 1, 'FMT_REV.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD': 2, 'FMT_MOF': 1, 'FMT_MSA': 1}, 'FPT': {'FPT_STM.1': 10, 'FPT_STM.1.1': 1}, 'FRU': {'FRU_RSA.1': 8, 'FRU_RSA.1.1': 1}, 'FTA': {'FTA_SSL.3': 8, 'FTA_SSL.3.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC15408': 12, 'ISO/IEC 15408': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0420_erpt.pdf
. - The st_filename property was set to
c0420_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0420
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0420_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0420_est.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Hitachi Unified Storage 130 Microprogram Version:0917/A was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Access Control Devices and Systems",
"cert_link": null,
"dgst": "5766793979465637",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0420",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"130",
"0917"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0420",
"certification_date": "2013-12-01",
"claim": "EAL2",
"enhanced": {
"assurance_level": "EAL2",
"cc_version": "3.1 Release3",
"cert_link": "https://www.ipa.go.jp/en/security/c0420_eimg.pdf",
"description": "PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array \u201cHitachi Unified Storage 130\u201d that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser\u0027s login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations.",
"evaluation_facility": "ECSEC Laboratory Inc. Evaluation Center",
"product": "Hitachi Unified Storage 130 Microprogram",
"product_type": "Storage System control software",
"report_link": "https://www.ipa.go.jp/en/security/c0420_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0420_est.pdf",
"toe_version": "0917/A",
"vendor": "Hitachi, Ltd."
},
"expiration_date": "2019-01-01",
"supplier": "Hitachi, Ltd.",
"toe_japan_name": "Hitachi Unified Storage 130 Microprogram0917/A",
"toe_overseas_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0420_it2417.html",
"toe_overseas_name": "Hitachi Unified Storage 130 Microprogram0917/A"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Hitachi, Ltd.",
"manufacturer_web": "https://www.hitachi.com/",
"name": "Hitachi Unified Storage 130 Microprogram Version:0917/A",
"not_valid_after": "2019-01-09",
"not_valid_before": "2013-12-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0420_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0420-01": 1,
"Certification No. C0420": 1
}
},
"cc_claims": {
"A": {
"A.S": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 4
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ECSEC": {
"ECSEC Laboratory": 3
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"ISO": {
"ISO/IEC15408": 10
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20140529133728+09\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/ModDate": "D:20140529133755+09\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2010",
"pdf_file_size_bytes": 508873,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 36
},
"st_filename": "c0420_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_INT.1": 1,
"ASE_REQ.2": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 12,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 6,
"FAU_GEN.2.1": 1,
"FAU_SAR": 2,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 4,
"FAU_SAR.2.1": 1,
"FAU_STG": 2,
"FAU_STG.1": 8,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 1,
"FAU_STG.4": 4,
"FAU_STG.4.1": 1
},
"FDP": {
"FDP_ACC": 2,
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_ATD.1": 11,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 6,
"FIA_UAU.1": 8,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.2": 5,
"FIA_UAU.2.1": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 16,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF": 1,
"FMT_MOF.1": 10,
"FMT_MOF.1.1": 1,
"FMT_MSA": 1,
"FMT_MSA.1": 11,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD": 2,
"FMT_MTD.1": 8,
"FMT_MTD.1.1": 1,
"FMT_REV.1": 8,
"FMT_REV.1.1": 1,
"FMT_REV.1.2": 1,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 10,
"FPT_STM.1.1": 1
},
"FRU": {
"FRU_RSA.1": 8,
"FRU_RSA.1.1": 1
},
"FTA": {
"FTA_SSL.3": 8,
"FTA_SSL.3.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 1
}
},
"standard_id": {
"ISO": {
"ISO/IEC 15408": 2,
"ISO/IEC15408": 12
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ODA-USER",
"/CreationDate": "D:2014052817411809\u002700\u0027",
"/Creator": "PrimoPDF http://www.primopdf.com/",
"/ModDate": "D:2014052817411809\u002700\u0027",
"/Producer": "PrimoPDF",
"/Title": "Microsoft Word - HUS130_ST.doc",
"pdf_file_size_bytes": 433404,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 48
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0420_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0420_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "91d8b66515e0ea330d46b65bed9eac27448d8f1ee103f66961e81052b8505af5",
"txt_hash": "7dba7bcde19df9a6ca38d17e3691ab18049f842db33dd4ec6fdd96f69eea722d"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ce3c58c157df04563fd2375e39ea51d82c72202772688909e86ae2cf0deb7375",
"txt_hash": "69646e62c43ba174cc80ea13153b820dee682d2e6c296be9f45efd1202a3ef79"
}
},
"status": "archived"
}