NEC Group Secure Information Exchange Site Version 1.0
CSV information ?
Status | archived |
---|---|
Valid from | 25.04.2008 |
Valid until | 07.10.2013 |
Scheme | 🇯🇵 JP |
Manufacturer | NEC Corporation |
Category | Other Devices and Systems |
Security level | ASE_REQ.2, EAL1+, ASE_OBJ.2, ASE_SPD.1 |
Heuristics summary ?
Certification report ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL1, EAL1 augmentedClaims
T.SPOOFING, T.ILLEGAL_ACCESS, T.MISDELIVERY, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATORSecurity Assurance Requirements (SAR)
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Certificates
CRP-C0156-01, Certification No. C0156Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
Title: | untitled |
---|---|
Creation date: | D:20080807163541+09'00' |
Modification date: | D:20080807163541+09'00' |
Pages: | 21 |
Producer: | Acrobat Distiller 6.0 (Windows) |
References
No references.
Security target ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL1, EAL1+Claims
O.IDENTIFY, O.ADMIN_IDENTIFY, O.ACCESS_CONTROL, O.AUDIT, O.ENCRYPT, T.SPOOFING, T.ILLEGAL_ACCESS, T.LISTEN-IN_NW_DATA, T.MISDELIVERY, A.DATACENTER, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATOR, A.SYSTEM_ADNIN, OE.TRUSTED_ROLE, OE.NETWORK, OE.ADMIN_TRAINING, OE.DATACENTER, OE.AUTHENTICATION, OE.SEND_PIN, OE.SYSTEM_ADMIN, OE.AUDIT_ADMIN, OE.OS_TIMESTAMPSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD.1, FIA_SOS, FIA_UAU.2, FIA_UID, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_ATD.1.1, FIA_SOS.2, FIA_UAU, FIA_UAU.2.1, FIA_UID.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.1, FMT_MSA, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_ITC, FTP_TRPStandards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
Creation date: | D:20080807135828+09'00' |
---|---|
Modification date: | D:20080807135828+09'00' |
Pages: | 72 |
Producer: | SkyPDF Pro Driver Version 3.03.0100.00 |
References
No references.
Heuristics ?
Extracted SARs
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2Scheme data ?
Cert Id | C0156 | |
---|---|---|
Supplier | NEC Corporation | |
Toe Overseas Name | ----- | |
Claim | EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Certification Date | 2008-04 | |
Toe Overseas Link | None | |
Toe Japan Name | NEC Group Secure Information Exchange Site 1.0 | |
Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html | |
Enhanced | ||
Product | NEC Group Secure Information Exchange Site | |
Toe Version | 1.0 | |
Product Type | Secure Information Exchange System | |
Certification Date | 2008-04-25 | |
Cc Version | 3.1 | |
Assurance Level | EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Vendor | NEC Corporation | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
Report Link | https://www.ipa.go.jp/en/security/c0156_erpt.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0156_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user |
References ?
No references are available for this certificate.
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': {'cert_id': 'C0156', 'supplier': 'NEC Corporation', 'toe_overseas_name': '-----', 'claim': 'EAL1+\n ASE_OBJ.2,\n ASE_REQ.2,\n ASE_SPD.1', 'certification_date': '2008-04', 'toe_overseas_link': None, 'toe_japan_name': 'NEC Group Secure Information\n Exchange Site\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html', 'enhanced': {'product': 'NEC Group Secure Information Exchange Site', 'toe_version': '1.0', 'product_type': 'Secure Information Exchange System', 'certification_date': '2008-04-25', 'cc_version': '3.1', 'assurance_level': 'EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'vendor': 'NEC Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0156_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0156_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: \n \n (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. \n The TOE provides the following service functions:\n \n - Upload\n - Download\n - Area Maintenance\n - User Maintenance\n - Set Personal Information \n - Administration\n \n As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. \n TOE security functions\n [Identification and Authentication] \n A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user'}}}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e
. - The st_txt_hash property was set to
13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0156_est.pdf
.
- The st_download_ok property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf, code: 408']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e
. - The st_txt_hash property was set to
13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0156_est.pdf
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was updated, with the
[[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0156_erpt.pdf, code: nok']]
values inserted.
- The errors property was updated, with the
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e
. - The st_txt_hash property was set to
13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
c0156_est.pdf
.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': 'c0156_erpt.pdf', 'st_filename': 'c0156_est.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0156-01': 1}}}}, 'cc_sar': {'__update__': {'ASE': {'__update__': {'ASE_SPD.1': 3}}}}}
data. - The st_keywords property was updated, with the
{'cc_sar': {'__insert__': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, '__update__': {'ASE': {'__insert__': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}, '__update__': {'ASE_REQ.2': 2}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 14, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8}}, 'FDP': {'__update__': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12}}, 'FIA': {'__insert__': {'FIA_AFL': 18, 'FIA_SOS': 21, 'FIA_UID': 29, 'FIA_AFL.1': 4, 'FIA_SOS.2': 4, 'FIA_UAU': 1}, '__update__': {'FIA_ATD.1': 10, 'FIA_UAU.2': 8, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UID.2': 4}}, 'FMT': {'__insert__': {'FMT_MSA': 27}, '__update__': {'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.ADMIN_IDENTIFY': 7, 'O.AUDIT': 12}}, 'T': {'__update__': {'T.ILLEGAL_ACCESS': 2, 'T.MISDELIVERY': 2}}, 'A': {'__update__': {'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2}}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {'__delete__': ['STMicroelectronics']}}
data.
The computed heuristics were updated.
- The cert_id property was set to
C0156
.
- The following values were inserted:
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0156-01': 42, 'Certification No. C0156': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 3, 'EAL1 augmented': 2}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 2}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.SPOOFING': 1, 'T.ILLEGAL_ACCESS': 1, 'T.MISDELIVERY': 1}, 'A': {'A.NETWORK': 1, 'A.SYSTEM_ADMIN': 1, 'A.AUDIT_ADMIN': 1, 'A.ADMINISTRATOR': 1}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 1, 'ASE_SPD.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 7, 'FAU_SAR.1': 14, 'FAU_SAR.2': 7, 'FAU_SAR.3': 6, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 18, 'FDP_ACF.1': 16, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 11, 'FIA_UAU.2': 9, 'FIA_USB.1': 6, 'FIA_UID.1': 8, 'FIA_UAU.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_SAE.1': 14, 'FMT_SMF.1': 10, 'FMT_SMR.1': 24, 'FMT_MSA.3': 3, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 8, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 13, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 3, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 3}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 4, 'A.SYSTEM_ADMIN': 3, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE': 3, 'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'STMicroelectronics': {'STM': 10}, 'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The report_metadata property was updated, with the
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83', 'st_pdf_hash': 'fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e', 'report_txt_hash': '2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0', 'st_txt_hash': '13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 11}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['1.0']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NEC Group Secure Information Exchange Site Version 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "288b191fb9ec8f44",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "C0156",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "C0156",
"certification_date": "2008-04",
"claim": "EAL1+\n ASE_OBJ.2,\n ASE_REQ.2,\n ASE_SPD.1",
"enhanced": {
"assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"cc_version": "3.1",
"certification_date": "2008-04-25",
"description": "PRODUCT DESCRIPTION \n Description of TOE \n This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: \n \n (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. \n The TOE provides the following service functions:\n \n - Upload\n - Download\n - Area Maintenance\n - User Maintenance\n - Set Personal Information \n - Administration\n \n As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. \n TOE security functions\n [Identification and Authentication] \n A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "NEC Group Secure Information Exchange Site",
"product_type": "Secure Information Exchange System",
"report_link": "https://www.ipa.go.jp/en/security/c0156_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0156_est.pdf",
"toe_version": "1.0",
"vendor": "NEC Corporation"
},
"supplier": "NEC Corporation",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html",
"toe_japan_name": "NEC Group Secure Information\n Exchange Site\n 1.0",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NEC Corporation",
"manufacturer_web": "https://www.nec.com/",
"name": "NEC Group Secure Information Exchange Site Version 1.0",
"not_valid_after": "2013-10-07",
"not_valid_before": "2008-04-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "c0156_erpt.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0156-01": 1,
"Certification No. C0156": 1
}
},
"cc_claims": {
"A": {
"A.ADMINISTRATOR": 1,
"A.AUDIT_ADMIN": 1,
"A.NETWORK": 1,
"A.SYSTEM_ADMIN": 1
},
"T": {
"T.ILLEGAL_ACCESS": 1,
"T.MISDELIVERY": 1,
"T.SPOOFING": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL1": 3,
"EAL1 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 16
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20080807163541+09\u002700\u0027",
"/ModDate": "D:20080807163541+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 320841,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "c0156_est.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMINISTRATOR": 5,
"A.AUDIT_ADMIN": 4,
"A.DATACENTER": 4,
"A.NETWORK": 3,
"A.SYSTEM_ADMIN": 2,
"A.SYSTEM_ADNIN": 1
},
"O": {
"O.ACCESS_CONTROL": 8,
"O.ADMIN_IDENTIFY": 7,
"O.AUDIT": 12,
"O.ENCRYPT": 8,
"O.IDENTIFY": 8
},
"OE": {
"OE.ADMIN_TRAINING": 9,
"OE.AUDIT_ADMIN": 4,
"OE.AUTHENTICATION": 5,
"OE.DATACENTER": 4,
"OE.NETWORK": 4,
"OE.OS_TIMESTAMP": 9,
"OE.SEND_PIN": 5,
"OE.SYSTEM_ADMIN": 4,
"OE.TRUSTED_ROLE": 4
},
"T": {
"T.ILLEGAL_ACCESS": 2,
"T.LISTEN-IN_NW_DATA": 3,
"T.MISDELIVERY": 2,
"T.SPOOFING": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 2,
"ASE_REQ": 1,
"ASE_REQ.2": 2,
"ASE_SPD": 1,
"ASE_SPD.1": 2,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL1+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 8,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1
},
"FDP": {
"FDP_ACC.1": 17,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_AFL": 18,
"FIA_AFL.1": 4,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS": 21,
"FIA_SOS.2": 4,
"FIA_UAU": 1,
"FIA_UAU.1": 8,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UID": 29,
"FIA_UID.1": 7,
"FIA_UID.2": 4,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 27,
"FMT_MSA.1": 16,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_SAE.1": 14,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 26,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 10
},
"FTP": {
"FTP_ITC": 1,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 11
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 16
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20080807135828+09\u002700\u0027",
"/ModDate": "D:20080807135828+09\u002700\u0027",
"/Producer": "SkyPDF Pro Driver Version 3.03.0100.00",
"pdf_file_size_bytes": 491338,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0156_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"ASE_OBJ.2",
"ASE_SPD.1",
"ASE_REQ.2",
"EAL1+"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83",
"report_txt_hash": "2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e",
"st_txt_hash": "13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136"
},
"status": "archived"
}