Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)

CSV information ?

Status archived
Valid from 24.12.2008
Valid until 08.04.2014
Scheme 🇯🇵 JP
Manufacturer Hitachi, Ltd.
Category Access Control Devices and Systems
Security level EAL2

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0200

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Cisco

Security level
EAL2
Claims
T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGE
Certificates
CRP-C0200-01, Certification No. C0200

Standards
ISO/IEC 15408:2005, ISO/IEC 18045:2005, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003, CCMB-2005-08-004

File metadata

Title: untitled
Creation date: D:20090401163719+09'00'
Modification date: D:20090401163719+09'00'
Pages: 24
Producer: Acrobat Distiller 6.0 (Windows)

References

No references.

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
RSA 512, DH, DSA
Hash functions
SHA-1
Protocols
SSLv3.0, SSL, TLSv1.0, TLS

Vendor
Microsoft, Microsoft Corporation

Security level
EAL 2, EAL2
Claims
O.ADM_AUTH, O.ADM_ROLE, O.SEC_COMM, O.HOST_AUTH, O.HOST_ACCESS, O.AUD_GEN, T.ILLEGAL_XCNTL, T.TSF_COMP, T.LP_LEAK, T.CHG_CONFIG, A.NOEVIL, A.NOEVIL_MNT, A.PHYSICAL_SEC, A.ILLEGAL_SOFT, A.CONNECT_STORAGE, OE.NOEVIL, OE.NOEVIL-MNT, OE.PHYSICAL_SEC, OE.ILLEGAL_SOFT, OE.CONNECT_STORAGE, OE.NOEVIL_MNT
Security Assurance Requirements (SAR)
ACM_CAP.2, ADO_DEL.1, ADO_IGS.1, ADV_FSP.1, ADV_HLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_SOF.1, AVA_VLA.1
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_STG.1, FAU_STG.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FCS_COP.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FDP_ACC.1, FDP_IFC.1, FDP_ACF.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FIA_ATD, FIA_ATD.1, FIA_USB, FIA_USB.1, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1, FIA_SOS, FIA_SOS.1, FIA_UAU.2, FIA_UID.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UID.2, FIA_MSA.1.1, FIA_MSA.3.1, FIA_MSA.3.2, FIA_UAU.5, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FMT_MSA.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_MOF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.2, FMT_MOF.1.1, FPT_STM.1, FPT_RVM.1, FPT_SEP.1, FPT_STM.1.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2

Standards
FIPS PUB 197, FIPS PUB 46-3, FIPS PUB 180-2, PKCS#1, CCMB-2005-08-001, CCMB-2005-08-002, CCMB-2005-08-003

File metadata

Title: USP_V ST
Subject: CC EAL2 Security Target
Author: 八木
Creation date: D:20090330094022+09'00'
Modification date: D:20090330094033+09'00'
Pages: 93
Creator: Word 用 Acrobat PDFMaker 7.0.7
Producer: Acrobat Distiller 7.0.5 (Windows)

References

No references.

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0200

Extracted SARs

ADV_RCR.1, ATE_FUN.1, ATE_COV.1, AGD_USR.1, AVA_SOF.1, ADV_HLD.1, AGD_ADM.1, ATE_IND.2, ADV_FSP.1, AVA_VLA.1

Scheme data ?

Cert Id C0200
Supplier Hitachi, Ltd.
Toe Overseas Name -----
Claim EAL2
Certification Date 2008-12
Toe Overseas Link None
Toe Japan Name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program 60-02-32-00/00(R6-02A-14)
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html
Enhanced
Product Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program
Toe Version 60-02-32-00/00(R6-02A-14)
Product Type IT Product (Storage Control Software)
Certification Date 2008-12-24
Cc Version 2.3
Assurance Level EAL2
Vendor Hitachi, Ltd.
Evaluation Facility Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
Report Link https://www.ipa.go.jp/en/security/c0200_erpt.pdf
Target Link https://www.ipa.go.jp/en/security/c0200_est.pdf
Description PRODUCT DESCRIPTION Description of TOE TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. TOE security functions TOE has the following security functions. - Storage Navigator function It sets, changes, etc. the configuration of each function to manage the storage subsystem. - Virtual Partition Manager function It partitions the resources of the entire storage subsystem into multiple virtual disks to control access. - LUN Manager function It associates ports and logical devices that can be accessed by the host. - Host identification/authentication function When a host is connected to SAN, this function identifies/authenticates the host so that invalid host would not be connected. - Audit log function It records events related to security, such as success/failure of login, changes in configuration settings.

References ?

No references are available for this certificate.

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c', 'txt_hash': 'affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800', 'txt_hash': '06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {}.
    • The st_frontpage property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0200.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to C0200.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0200.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'C0200', 'certification_date': '2008-12', 'toe_japan_name': 'Hitachi Universal\n Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi\n Universal Storage Platform VM, Hitachi Universal Storage Platform H20000\n Control Program 60-02-32-00/00(R6-02A-14)', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html', 'enhanced': {'__update__': {'product': 'Hitachi Universal Storage \n Platform V, Hitachi Universal \n Storage Platform H24000, \n Hitachi Universal Storage \n Platform VM, Hitachi Universal \n Storage Platform H20000 \n Control Program', 'toe_version': '60-02-32-00/00(R6-02A-14)', 'product_type': 'IT Product (Storage Control Software)', 'certification_date': '2008-12-24', 'cc_version': '2.3', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc.\n Evaluation Center', 'report_link': 'https://www.ipa.go.jp/en/security/c0200_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0200_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: “Hitachi Universal Storage Platform V”, “Hitachi Universal Storage Platform H24000”, “Hitachi Universal Storage Platform VM”, and “Hitachi Universal Storage Platform H20000”. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users. \n \n TOE security functions \n TOE has the following security functions. \n \n - Storage Navigator function\n It sets, changes, etc. the configuration of each function to manage the storage \n subsystem.\n - Virtual Partition Manager function\n It partitions the resources of the entire storage subsystem into multiple virtual disks to \n control access. \n - LUN Manager function\n It associates ports and logical devices that can be accessed by the host. \n - Host identification/authentication function\n When a host is connected to SAN, this function identifies/authenticates the host so that \n invalid host would not be connected. \n - Audit log function\n It records events related to security, such as success/failure of login, changes in\n configuration settings.'}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0315', 'supplier': 'Hitachi, Ltd.', 'toe_overseas_name': '-----', 'claim': 'EAL2', 'certification_date': '2011-09', 'toe_overseas_link': None, 'toe_japan_name': 'Hitachi Virtual Storage Platform, \n Hitachi Virtual Storage Platform VP9500 Control Program \n 70-02-05-00/00(R7-02-06A)', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0315_it0313.html', 'enhanced': {'product': 'Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500 Control Program', 'toe_version': '70-02-05-00/00(R7-02-06A)', 'product_type': 'Control Program for storage system', 'certification_date': '2011-09-30', 'cc_version': '3.1', 'assurance_level': 'EAL2', 'vendor': 'Hitachi, Ltd.', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0315_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0315_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n The TOE is a software program operating on the storage system : "Hitachi Virtual Storage Platform" (also known as "Hitachi Virtual Storage Platform VP9500"). The TOE has the capabilities to control read/write accesses of a host computer to the area of the storage system which is allowed to the computer through identification and authentication. The TOE also has the functions of managing encryption keys which are used to encrypt data written in the storage system by the host computer, and securely erasing data stored in the storage system. \n \n TOE security functionality \n The TOE has the following security functions to protect user data stored in the storage system. \n \n \n \n - \n Controlling accesses from Storage Navigator users and support personnel to granted partitions specified by the groups of storage resources \n \n \n - \n Controlling accesses from host computers to the granted logical devices in the storage system. \n \n \n - \n Authentication of host computers \n \n \n - \n Identification and authentication of Storage Navigator users and support personnel \n \n \n - \n Encrypted communication between Storage Navigator and SVP PC, and SVP PC and external authentication servers. \n \n \n - \n Encryption of stored data(Encryption key management) \n \n \n - \n Shredding \n \n \n - \n Audit logging'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0200_erpt.pdf, code: nok'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0200_erpt.pdf, code: nok'].
    • The st_pdf_hash property was set to 22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800.
    • The st_txt_hash property was set to 06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 516948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/CreationDate': "D:20090330094022+09'00'", '/Subject': 'CC EAL2 Security Target', '/Author': '八木', '/Creator': 'Word 用 Acrobat PDFMaker 7.0.7', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20090330094033+09'00'", '/Company': 'Hitachi', '/Title': 'USP_V ST', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 21, 'FAU_GEN.2': 11, 'FAU_SAR.1': 12, 'FAU_STG.1': 13, 'FAU_STG.3': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_COP.1': 17, 'FCS_CKM.1': 20, 'FCS_CKM.2': 16, 'FCS_CKM.4': 18, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 19, 'FDP_IFC.1': 2, 'FDP_ACF.1': 16, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_ATD': 27, 'FIA_ATD.1': 6, 'FIA_USB': 27, 'FIA_USB.1': 6, 'FIA_AFL.1': 13, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 21, 'FIA_SOS': 29, 'FIA_SOS.1': 2, 'FIA_UAU.2': 17, 'FIA_UID.1': 8, 'FIA_UAU.7': 13, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 22, 'FIA_MSA.1.1': 1, 'FIA_MSA.3.1': 1, 'FIA_MSA.3.2': 1, 'FIA_UAU.5': 19, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_SMF.1': 18, 'FMT_SMR.1': 20, 'FMT_MSA.3': 16, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2': 9, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_STM.1': 17, 'FPT_RVM.1': 32, 'FPT_SEP.1': 32, 'FPT_STM.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.ADM_AUTH': 9, 'O.ADM_ROLE': 5, 'O.SEC_COMM': 8, 'O.HOST_AUTH': 5, 'O.HOST_ACCESS': 8, 'O.AUD_GEN': 6}, 'T': {'T.ILLEGAL_XCNTL': 3, 'T.TSF_COMP': 3, 'T.LP_LEAK': 3, 'T.CHG_CONFIG': 3}, 'A': {'A.NOEVIL': 3, 'A.NOEVIL_MNT': 3, 'A.PHYSICAL_SEC': 3, 'A.ILLEGAL_SOFT': 3, 'A.CONNECT_STORAGE': 3}, 'OE': {'OE.NOEVIL': 2, 'OE.NOEVIL-MNT': 1, 'OE.PHYSICAL_SEC': 3, 'OE.ILLEGAL_SOFT': 2, 'OE.CONNECT_STORAGE': 3, 'OE.NOEVIL_MNT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 512': 1}, 'FF': {'DH': {'DH': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSLv3.0': 3, 'SSL': 16}, 'TLS': {'TLSv1.0': 3, 'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS#1': 1}, 'CC': {'CCMB-2005-08-001': 4, 'CCMB-2005-08-002': 3, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0200_est.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0200_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to 22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800.
    • The st_txt_hash property was set to 06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 516948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/CreationDate': "D:20090330094022+09'00'", '/Subject': 'CC EAL2 Security Target', '/Author': '八木', '/Creator': 'Word 用 Acrobat PDFMaker 7.0.7', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20090330094033+09'00'", '/Company': 'Hitachi', '/Title': 'USP_V ST', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1, 'EAL2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 21, 'FAU_GEN.2': 11, 'FAU_SAR.1': 12, 'FAU_STG.1': 13, 'FAU_STG.3': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_COP.1': 17, 'FCS_CKM.1': 20, 'FCS_CKM.2': 16, 'FCS_CKM.4': 18, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1}, 'FDP': {'FDP_ACC.1': 19, 'FDP_IFC.1': 2, 'FDP_ACF.1': 16, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_ATD': 27, 'FIA_ATD.1': 6, 'FIA_USB': 27, 'FIA_USB.1': 6, 'FIA_AFL.1': 13, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 21, 'FIA_SOS': 29, 'FIA_SOS.1': 2, 'FIA_UAU.2': 17, 'FIA_UID.1': 8, 'FIA_UAU.7': 13, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 22, 'FIA_MSA.1.1': 1, 'FIA_MSA.3.1': 1, 'FIA_MSA.3.2': 1, 'FIA_UAU.5': 19, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_SMF.1': 18, 'FMT_SMR.1': 20, 'FMT_MSA.3': 16, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2': 9, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_STM.1': 17, 'FPT_RVM.1': 32, 'FPT_SEP.1': 32, 'FPT_STM.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.ADM_AUTH': 9, 'O.ADM_ROLE': 5, 'O.SEC_COMM': 8, 'O.HOST_AUTH': 5, 'O.HOST_ACCESS': 8, 'O.AUD_GEN': 6}, 'T': {'T.ILLEGAL_XCNTL': 3, 'T.TSF_COMP': 3, 'T.LP_LEAK': 3, 'T.CHG_CONFIG': 3}, 'A': {'A.NOEVIL': 3, 'A.NOEVIL_MNT': 3, 'A.PHYSICAL_SEC': 3, 'A.ILLEGAL_SOFT': 3, 'A.CONNECT_STORAGE': 3}, 'OE': {'OE.NOEVIL': 2, 'OE.NOEVIL-MNT': 1, 'OE.PHYSICAL_SEC': 3, 'OE.ILLEGAL_SOFT': 2, 'OE.CONNECT_STORAGE': 3, 'OE.NOEVIL_MNT': 1}}, 'vendor': {'Microsoft': {'Microsoft': 1, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 512': 1}, 'FF': {'DH': {'DH': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSLv3.0': 3, 'SSL': 16}, 'TLS': {'TLSv1.0': 3, 'TLS': 3}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS#1': 1}, 'CC': {'CCMB-2005-08-001': 4, 'CCMB-2005-08-002': 3, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0200_est.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}]}.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0200_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 26.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'vendor': {'Cisco': {'Cisco': 1}}} data.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0200_erpt.pdf', 'st_filename': 'c0200_est.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0200-01': 1}}}}, 'crypto_scheme': {}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL2': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 21, 'FAU_GEN.2': 11, 'FAU_STG.1': 13}}, 'FCS': {'__update__': {'FCS_COP.1': 17, 'FCS_CKM.1': 20, 'FCS_CKM.2': 16, 'FCS_CKM.4': 18}, '__delete__': ['FCS_CMK.4']}, 'FDP': {'__update__': {'FDP_ACC.1': 19, 'FDP_ACF.1': 16}}, 'FIA': {'__insert__': {'FIA_ATD': 27, 'FIA_USB.1': 6, 'FIA_SOS': 29, 'FIA_SOS.1': 2}, '__update__': {'FIA_ATD.1': 6, 'FIA_AFL.1': 13, 'FIA_UAU.1': 21, 'FIA_UAU.2': 17, 'FIA_UID.1': 8, 'FIA_UAU.7': 13, 'FIA_UID.2': 22, 'FIA_UAU.5': 19, 'FIA_USB': 27}, '__delete__': ['FIA_UAU.2.1', 'FIA_UID.2.1']}, 'FMT': {'__update__': {'FMT_MSA.1': 16, 'FMT_SMF.1': 18, 'FMT_SMR.1': 20, 'FMT_MSA.3': 16}}, 'FPT': {'__update__': {'FPT_STM.1': 17, 'FPT_RVM.1': 32, 'FPT_SEP.1': 32}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.ADM_AUTH': 9, 'O.ADM_ROLE': 5, 'O.SEC_COMM': 8, 'O.HOST_AUTH': 5, 'O.HOST_ACCESS': 8, 'O.AUD_GEN': 6}}, 'T': {'__update__': {'T.ILLEGAL_XCNTL': 3, 'T.TSF_COMP': 3, 'T.LP_LEAK': 3, 'T.CHG_CONFIG': 3}, '__delete__': ['T']}, 'A': {'__update__': {'A.NOEVIL': 3, 'A.NOEVIL_MNT': 3, 'A.PHYSICAL_SEC': 3, 'A.ILLEGAL_SOFT': 3, 'A.CONNECT_STORAGE': 3}}, 'OE': {'__update__': {'OE.NOEVIL-MNT': 1, 'OE.ILLEGAL_SOFT': 2}, '__delete__': ['OE']}}}, 'vendor': {'__delete__': ['STMicroelectronics']}, 'symmetric_crypto': {'__update__': {'DES': {'__delete__': ['DES']}}}, 'crypto_scheme': {}, 'crypto_protocol': {'__update__': {'TLS': {'__update__': {'SSL': {'__update__': {'SSL': 16}}}}}}, 'randomness': {}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0200.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 516948, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 93, '/CreationDate': "D:20090330094022+09'00'", '/Subject': 'CC EAL2 Security Target', '/Author': '八木', '/Creator': 'Word 用 Acrobat PDFMaker 7.0.7', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20090330094033+09'00'", '/Company': 'Hitachi', '/Title': 'USP_V ST', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 1}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/6de10fae5abcf229.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/6de10fae5abcf229.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0200-01': 48, 'Certification No. C0200': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL2': 3}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.ILLEGAL_XCNTL': 1, 'T.TSF_COMP': 1, 'T.LP_LEAK': 1, 'T.CHG_CONFIG': 1}, 'A': {'A.NOEVIL': 1, 'A.NOEVIL_MNT': 1, 'A.PHYSICAL_SEC': 1, 'A.ILLEGAL_SOFT': 1, 'A.CONNECT_STORAGE': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'KA': {'KA': 7}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408:2005': 1, 'ISO/IEC 18045:2005': 2}, 'CC': {'CCMB-2005-08-001': 2, 'CCMB-2005-08-002': 2, 'CCMB-2005-08-003': 2, 'CCMB-2005-08-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ACM': {'ACM_CAP.2': 2}, 'ADO': {'ADO_DEL.1': 2, 'ADO_IGS.1': 3}, 'ADV': {'ADV_FSP.1': 2, 'ADV_HLD.1': 2, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 3}, 'ATE': {'ATE_COV.1': 2, 'ATE_FUN.1': 2, 'ATE_IND.2': 2}, 'AVA': {'AVA_SOF.1': 2, 'AVA_VLA.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 24, 'FAU_GEN.2': 13, 'FAU_SAR.1': 12, 'FAU_STG.1': 14, 'FAU_STG.3': 12, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1}, 'FCS': {'FCS_COP.1': 19, 'FCS_CKM.1': 25, 'FCS_CKM.2': 17, 'FCS_CKM.4': 21, 'FCS_COP.1.1': 1, 'FCS_CKM.1.1': 1, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_CMK.4': 1}, 'FDP': {'FDP_ACC.1': 22, 'FDP_IFC.1': 2, 'FDP_ACF.1': 17, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1}, 'FIA': {'FIA_ATD.1': 4, 'FIA_AFL.1': 14, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.1': 23, 'FIA_UAU.2': 19, 'FIA_UAU.2.1': 1, 'FIA_UID.1': 9, 'FIA_UAU.7': 14, 'FIA_UAU.7.1': 1, 'FIA_UID.2': 25, 'FIA_UID.2.1': 1, 'FIA_MSA.1.1': 1, 'FIA_MSA.3.1': 1, 'FIA_MSA.3.2': 1, 'FIA_UAU.5': 17, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_USB': 1}, 'FMT': {'FMT_MSA.1': 18, 'FMT_SMF.1': 22, 'FMT_SMR.1': 25, 'FMT_MSA.3': 17, 'FMT_MTD.1': 12, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_MOF.1': 13, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.2': 9, 'FMT_MOF.1.1': 1}, 'FPT': {'FPT_STM.1': 18, 'FPT_RVM.1': 34, 'FPT_SEP.1': 26, 'FPT_STM.1.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1}}, 'cc_claims': {'O': {'O.ADM_AUTH': 10, 'O.ADM_ROLE': 9, 'O.SEC_COMM': 9, 'O.HOST_AUTH': 9, 'O.HOST_ACCESS': 9, 'O.AUD_GEN': 10}, 'T': {'T': 1, 'T.ILLEGAL_XCNTL': 4, 'T.TSF_COMP': 4, 'T.LP_LEAK': 4, 'T.CHG_CONFIG': 4}, 'A': {'A.NOEVIL': 4, 'A.NOEVIL_MNT': 4, 'A.PHYSICAL_SEC': 4, 'A.ILLEGAL_SOFT': 4, 'A.CONNECT_STORAGE': 4}, 'OE': {'OE': 1, 'OE.NOEVIL': 2, 'OE.NOEVIL-MNT': 2, 'OE.PHYSICAL_SEC': 3, 'OE.ILLEGAL_SOFT': 3, 'OE.CONNECT_STORAGE': 3, 'OE.NOEVIL_MNT': 1}}, 'vendor': {'STMicroelectronics': {'STM': 20}, 'Microsoft': {'Microsoft': 1, 'Microsoft Corporation': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}, 'DES': {'DES': {'DES': 1}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 512': 1}, 'FF': {'DH': {'DH': 2}, 'DSA': {'DSA': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'KA': {'KA': 11}}, 'crypto_protocol': {'TLS': {'SSL': {'SSLv3.0': 3, 'SSL': 17}, 'TLS': {'TLSv1.0': 3, 'TLS': 3}}}, 'randomness': {'PRNG': {'PRNG': 1}, 'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS PUB 46-3': 1, 'FIPS PUB 180-2': 1}, 'PKCS': {'PKCS#1': 1}, 'CC': {'CCMB-2005-08-001': 4, 'CCMB-2005-08-002': 3, 'CCMB-2005-08-003': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}]} values discarded.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c', 'st_pdf_hash': '22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800', 'report_txt_hash': 'affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658', 'st_txt_hash': '06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 1, '3DES': 1}, 'rules_asymmetric_crypto': {'RSA 512': 1, 'DH': 2, 'DSA': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {'SHA-1': 1}, 'rules_crypto_schemes': {'SSL': 17, 'TLS': 3}, 'rules_randomness': {'PRNG': 1, 'RNG': 1}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['00', '32', '14', '02', '60']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14) was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "6de10fae5abcf229",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0200",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "32",
        "14",
        "02",
        "00",
        "60"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0200",
      "certification_date": "2008-12",
      "claim": "EAL2",
      "enhanced": {
        "assurance_level": "EAL2",
        "cc_version": "2.3",
        "certification_date": "2008-12-24",
        "description": "PRODUCT DESCRIPTION \n   Description of TOE \n   TOE is software that runs on storage subsystems manufactured by Hitachi, Ltd.: \u201cHitachi Universal Storage Platform V\u201d, \u201cHitachi Universal Storage Platform H24000\u201d, \u201cHitachi Universal Storage Platform VM\u201d, and \u201cHitachi Universal Storage Platform H20000\u201d. TOE provides functions that prevent storage resources assigned to a specific storage user from being illegally accessed by other storage users.  \n    \n   TOE security functions \n   TOE has the following security functions.  \n   \n    - Storage Navigator function\n     It sets, changes, etc. the configuration of each function to manage the storage \n     subsystem.\n     - Virtual Partition Manager function\n     It partitions the resources of the entire storage subsystem into multiple virtual disks to \n     control access. \n     - LUN Manager function\n     It associates ports and logical devices that can be accessed by the host. \n     - Host identification/authentication function\n     When a host is connected to SAN, this function identifies/authenticates the host so that \n     invalid host would not be connected. \n     - Audit log function\n     It records events related to security, such as success/failure of login, changes in\n     configuration settings.",
        "evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc.\n       Evaluation Center",
        "product": "Hitachi Universal Storage \n       Platform V, Hitachi Universal \n       Storage Platform H24000, \n       Hitachi Universal Storage \n       Platform VM, Hitachi Universal \n       Storage Platform H20000 \n       Control Program",
        "product_type": "IT Product (Storage Control Software)",
        "report_link": "https://www.ipa.go.jp/en/security/c0200_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0200_est.pdf",
        "toe_version": "60-02-32-00/00(R6-02A-14)",
        "vendor": "Hitachi, Ltd."
      },
      "supplier": "Hitachi, Ltd.",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0200_it7165.html",
      "toe_japan_name": "Hitachi Universal\n                    Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi\n                    Universal Storage Platform VM, Hitachi Universal Storage Platform H20000\n                    Control Program 60-02-32-00/00(R6-02A-14)",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Hitachi, Ltd.",
  "manufacturer_web": "https://www.hitachi.com/",
  "name": "Hitachi Universal Storage Platform V, Hitachi Universal Storage Platform H24000, Hitachi Universal Storage Platform VM, Hitachi Universal Storage Platform H20000 Control Program Version: 60-02-32-00/00(R6-02A-14)",
  "not_valid_after": "2014-04-08",
  "not_valid_before": "2008-12-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0200_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0200-01": 1,
          "Certification No. C0200": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.CONNECT_STORAGE": 1,
          "A.ILLEGAL_SOFT": 1,
          "A.NOEVIL": 1,
          "A.NOEVIL_MNT": 1,
          "A.PHYSICAL_SEC": 1
        },
        "T": {
          "T.CHG_CONFIG": 1,
          "T.ILLEGAL_XCNTL": 1,
          "T.LP_LEAK": 1,
          "T.TSF_COMP": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL2": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 2,
          "CCMB-2005-08-002": 2,
          "CCMB-2005-08-003": 2,
          "CCMB-2005-08-004": 2
        },
        "ISO": {
          "ISO/IEC 15408:2005": 1,
          "ISO/IEC 18045:2005": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Cisco": {
          "Cisco": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20090401163719+09\u002700\u0027",
      "/ModDate": "D:20090401163719+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 147813,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "c0200_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 2
          },
          "DSA": {
            "DSA": 1
          }
        },
        "RSA": {
          "RSA 512": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONNECT_STORAGE": 3,
          "A.ILLEGAL_SOFT": 3,
          "A.NOEVIL": 3,
          "A.NOEVIL_MNT": 3,
          "A.PHYSICAL_SEC": 3
        },
        "O": {
          "O.ADM_AUTH": 9,
          "O.ADM_ROLE": 5,
          "O.AUD_GEN": 6,
          "O.HOST_ACCESS": 8,
          "O.HOST_AUTH": 5,
          "O.SEC_COMM": 8
        },
        "OE": {
          "OE.CONNECT_STORAGE": 3,
          "OE.ILLEGAL_SOFT": 2,
          "OE.NOEVIL": 2,
          "OE.NOEVIL-MNT": 1,
          "OE.NOEVIL_MNT": 1,
          "OE.PHYSICAL_SEC": 3
        },
        "T": {
          "T.CHG_CONFIG": 3,
          "T.ILLEGAL_XCNTL": 3,
          "T.LP_LEAK": 3,
          "T.TSF_COMP": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_CAP.2": 2
        },
        "ADO": {
          "ADO_DEL.1": 2,
          "ADO_IGS.1": 3
        },
        "ADV": {
          "ADV_FSP.1": 2,
          "ADV_HLD.1": 2,
          "ADV_RCR.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 3
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_FUN.1": 2,
          "ATE_IND.2": 2
        },
        "AVA": {
          "AVA_SOF.1": 2,
          "AVA_VLA.1": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL2": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 21,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 11,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 13,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 12,
          "FAU_STG.3.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 20,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 16,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 18,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 17,
          "FCS_COP.1.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 19,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 16,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6
        },
        "FIA": {
          "FIA_AFL.1": 13,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD": 27,
          "FIA_ATD.1": 6,
          "FIA_MSA.1.1": 1,
          "FIA_MSA.3.1": 1,
          "FIA_MSA.3.2": 1,
          "FIA_SOS": 29,
          "FIA_SOS.1": 2,
          "FIA_UAU.1": 21,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.2": 17,
          "FIA_UAU.5": 19,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.7": 13,
          "FIA_UAU.7.1": 1,
          "FIA_UID.1": 8,
          "FIA_UID.2": 22,
          "FIA_USB": 27,
          "FIA_USB.1": 6
        },
        "FMT": {
          "FMT_MOF.1": 13,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 16,
          "FMT_MSA.2": 9,
          "FMT_MSA.3": 16,
          "FMT_MTD.1": 12,
          "FMT_MTD.1.1": 1,
          "FMT_SMF.1": 18,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 20,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_RVM.1": 32,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 32,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 17,
          "FPT_STM.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 16,
            "SSLv3.0": 3
          },
          "TLS": {
            "TLS": 3,
            "TLSv1.0": 3
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2005-08-001": 4,
          "CCMB-2005-08-002": 3,
          "CCMB-2005-08-003": 2
        },
        "FIPS": {
          "FIPS PUB 180-2": 1,
          "FIPS PUB 197": 1,
          "FIPS PUB 46-3": 1
        },
        "PKCS": {
          "PKCS#1": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 1,
          "Microsoft Corporation": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "\u516b\u6728",
      "/Company": "Hitachi",
      "/CreationDate": "D:20090330094022+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 7.0.7",
      "/ModDate": "D:20090330094033+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Subject": "CC EAL2 Security Target",
      "/Title": "USP_V ST",
      "pdf_file_size_bytes": 516948,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 93
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0200_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0200_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "50f3c5ae6405640ecb003327d7bbe87d89ccd4342a982eca37a5e55e26b6421c",
      "txt_hash": "affe851015a138d8304e8ba49dcf58a67d746e143c67b6fc177876484ddc4658"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "22e3355c714e3108fd7568df59c5eba0a9a42bd926ea5eb5c630d748d974f800",
      "txt_hash": "06c638dcd1ce8e93dd71c7d2e5941c12f16c168ce06fe9c301976f17583ce6e5"
    }
  },
  "status": "archived"
}