NEC Group Secure Information Exchange Site Version 1.0

CSV information ?

Status archived
Valid from 25.04.2008
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer NEC Corporation
Category Other Devices and Systems
Security level ASE_REQ.2, EAL1+, ASE_OBJ.2, ASE_SPD.1

Heuristics summary ?

Certificate ID: C0156

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL1, EAL1 augmented
Claims
T.SPOOFING, T.ILLEGAL_ACCESS, T.MISDELIVERY, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATOR
Security Assurance Requirements (SAR)
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Certificates
CRP-C0156-01, Certification No. C0156

Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004

File metadata

Title: untitled
Creation date: D:20080807163541+09'00'
Modification date: D:20080807163541+09'00'
Pages: 21
Producer: Acrobat Distiller 6.0 (Windows)

References

No references.

Security target ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL1, EAL1+
Claims
O.IDENTIFY, O.ADMIN_IDENTIFY, O.ACCESS_CONTROL, O.AUDIT, O.ENCRYPT, T.SPOOFING, T.ILLEGAL_ACCESS, T.LISTEN-IN_NW_DATA, T.MISDELIVERY, A.DATACENTER, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATOR, A.SYSTEM_ADNIN, OE.TRUSTED_ROLE, OE.NETWORK, OE.ADMIN_TRAINING, OE.DATACENTER, OE.AUTHENTICATION, OE.SEND_PIN, OE.SYSTEM_ADMIN, OE.AUDIT_ADMIN, OE.OS_TIMESTAMP
Security Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD.1, FIA_SOS, FIA_UAU.2, FIA_UID, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_ATD.1.1, FIA_SOS.2, FIA_UAU, FIA_UAU.2.1, FIA_UID.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.1, FMT_MSA, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_ITC, FTP_TRP

Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004

File metadata

Creation date: D:20080807135828+09'00'
Modification date: D:20080807135828+09'00'
Pages: 72
Producer: SkyPDF Pro Driver Version 3.03.0100.00

References

No references.

Heuristics ?

Certificate ID: C0156

Extracted SARs

ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2

Scheme data ?

Cert Id C0156
Supplier NEC Corporation
Toe Overseas Name -----
Claim EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Certification Date 2008-04
Toe Overseas Link None
Toe Japan Name NEC Group Secure Information Exchange Site 1.0
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html
Enhanced
Product NEC Group Secure Information Exchange Site
Toe Version 1.0
Product Type Secure Information Exchange System
Certification Date 2008-04-25
Cc Version 3.1
Assurance Level EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Vendor NEC Corporation
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0156_erpt.pdf
Target Link https://www.ipa.go.jp/en/security/c0156_est.pdf
Description PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user

References ?

No references are available for this certificate.

Updates ?

  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'C0156', 'supplier': 'NEC Corporation', 'toe_overseas_name': '-----', 'claim': 'EAL1+\n ASE_OBJ.2,\n ASE_REQ.2,\n ASE_SPD.1', 'certification_date': '2008-04', 'toe_overseas_link': None, 'toe_japan_name': 'NEC Group Secure Information\n Exchange Site\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html', 'enhanced': {'product': 'NEC Group Secure Information Exchange Site', 'toe_version': '1.0', 'product_type': 'Secure Information Exchange System', 'certification_date': '2008-04-25', 'cc_version': '3.1', 'assurance_level': 'EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'vendor': 'NEC Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0156_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0156_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: \n \n (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. \n The TOE provides the following service functions:\n \n - Upload\n - Download\n - Area Maintenance\n - User Maintenance\n - Set Personal Information \n - Administration\n \n As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. \n TOE security functions\n [Identification and Authentication] \n A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user'}}}.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e.
    • The st_txt_hash property was set to 13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0156_est.pdf.
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf, code: 408'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e.
    • The st_txt_hash property was set to 13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0156_est.pdf.
  • 25.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was updated, with the [[0, 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/c0156_erpt.pdf, code: nok']] values inserted.
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to True.
    • The st_convert_ok property was set to True.
    • The st_extract_ok property was set to True.
    • The errors property was set to [].
    • The st_pdf_hash property was set to fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e.
    • The st_txt_hash property was set to 13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to c0156_est.pdf.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_download_ok property was set to False.
    • The st_convert_ok property was set to False.
    • The st_extract_ok property was set to False.
    • The errors property was set to ['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf, code: nok'].
    • The st_pdf_hash property was set to None.
    • The st_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_frontpage property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': 'c0156_erpt.pdf', 'st_filename': 'c0156_est.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'JP': {'__update__': {'CRP-C0156-01': 1}}}}, 'cc_sar': {'__update__': {'ASE': {'__update__': {'ASE_SPD.1': 3}}}}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__insert__': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}}, '__update__': {'ASE': {'__insert__': {'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}, '__update__': {'ASE_REQ.2': 2}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_GEN.1': 14, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8}}, 'FDP': {'__update__': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12}}, 'FIA': {'__insert__': {'FIA_AFL': 18, 'FIA_SOS': 21, 'FIA_UID': 29, 'FIA_AFL.1': 4, 'FIA_SOS.2': 4, 'FIA_UAU': 1}, '__update__': {'FIA_ATD.1': 10, 'FIA_UAU.2': 8, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UID.2': 4}}, 'FMT': {'__insert__': {'FMT_MSA': 27}, '__update__': {'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.ADMIN_IDENTIFY': 7, 'O.AUDIT': 12}}, 'T': {'__update__': {'T.ILLEGAL_ACCESS': 2, 'T.MISDELIVERY': 2}}, 'A': {'__update__': {'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2}}, 'OE': {'__delete__': ['OE']}}}, 'vendor': {'__delete__': ['STMicroelectronics']}} data.

    The computed heuristics were updated.

    • The cert_id property was set to C0156.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0156-01': 42, 'Certification No. C0156': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 3, 'EAL1 augmented': 2}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 2}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.SPOOFING': 1, 'T.ILLEGAL_ACCESS': 1, 'T.MISDELIVERY': 1}, 'A': {'A.NETWORK': 1, 'A.SYSTEM_ADMIN': 1, 'A.AUDIT_ADMIN': 1, 'A.ADMINISTRATOR': 1}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 1, 'ASE_SPD.1': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 15, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 7, 'FAU_SAR.1': 14, 'FAU_SAR.2': 7, 'FAU_SAR.3': 6, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 18, 'FDP_ACF.1': 16, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_ATD.1': 11, 'FIA_UAU.2': 9, 'FIA_USB.1': 6, 'FIA_UID.1': 8, 'FIA_UAU.1': 8, 'FIA_ATD.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.2': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_SAE.1': 14, 'FMT_SMF.1': 10, 'FMT_SMR.1': 24, 'FMT_MSA.3': 3, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 8, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 13, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 3, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 3}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 4, 'A.SYSTEM_ADMIN': 3, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE': 3, 'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'STMicroelectronics': {'STM': 10}, 'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83', 'st_pdf_hash': 'fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e', 'report_txt_hash': '2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0', 'st_txt_hash': '13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 1}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {'SSL': 11}, 'rules_randomness': {}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NEC Group Secure Information Exchange Site Version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "288b191fb9ec8f44",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "cert_id": "C0156",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "C0156",
      "certification_date": "2008-04",
      "claim": "EAL1+\n                    ASE_OBJ.2,\n                    ASE_REQ.2,\n                    ASE_SPD.1",
      "enhanced": {
        "assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
        "cc_version": "3.1",
        "certification_date": "2008-04-25",
        "description": "PRODUCT DESCRIPTION \n   Description of TOE \n   This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows:  \n    \n   (1) An employee of NEC Group first creates an Area that is an administered data storage    area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. \n   The TOE provides the following service functions:\n   \n     - Upload\n     - Download\n     - Area Maintenance\n     - User Maintenance\n     - Set Personal Information \n     - Administration\n    \n   As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. \n   TOE security functions\n     [Identification and Authentication] \n      A function to identify and authenticate the users of the TOE [Access Control]   A function to control access to the business data based on the user roles of the  TOE [Auditing]   A function to generate and view the audit trail of the TOE [Cryptography]   A function to encrypt and decrypt the communication data between the TOE and a user",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "NEC Group Secure Information Exchange Site",
        "product_type": "Secure Information Exchange System",
        "report_link": "https://www.ipa.go.jp/en/security/c0156_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0156_est.pdf",
        "toe_version": "1.0",
        "vendor": "NEC Corporation"
      },
      "supplier": "NEC Corporation",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html",
      "toe_japan_name": "NEC Group Secure Information\n                    Exchange Site\n                    1.0",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NEC Corporation",
  "manufacturer_web": "https://www.nec.com/",
  "name": "NEC Group Secure Information Exchange Site Version 1.0",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2008-04-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "report_filename": "c0156_erpt.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0156-01": 1,
          "Certification No. C0156": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMINISTRATOR": 1,
          "A.AUDIT_ADMIN": 1,
          "A.NETWORK": 1,
          "A.SYSTEM_ADMIN": 1
        },
        "T": {
          "T.ILLEGAL_ACCESS": 1,
          "T.MISDELIVERY": 1,
          "T.SPOOFING": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ASE": {
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 3,
          "EAL1 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2006-09-002": 2,
          "CCMB-2006-09-003": 2,
          "CCMB-2006-09-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 16
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20080807163541+09\u002700\u0027",
      "/ModDate": "D:20080807163541+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 320841,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "c0156_est.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMINISTRATOR": 5,
          "A.AUDIT_ADMIN": 4,
          "A.DATACENTER": 4,
          "A.NETWORK": 3,
          "A.SYSTEM_ADMIN": 2,
          "A.SYSTEM_ADNIN": 1
        },
        "O": {
          "O.ACCESS_CONTROL": 8,
          "O.ADMIN_IDENTIFY": 7,
          "O.AUDIT": 12,
          "O.ENCRYPT": 8,
          "O.IDENTIFY": 8
        },
        "OE": {
          "OE.ADMIN_TRAINING": 9,
          "OE.AUDIT_ADMIN": 4,
          "OE.AUTHENTICATION": 5,
          "OE.DATACENTER": 4,
          "OE.NETWORK": 4,
          "OE.OS_TIMESTAMP": 9,
          "OE.SEND_PIN": 5,
          "OE.SYSTEM_ADMIN": 4,
          "OE.TRUSTED_ROLE": 4
        },
        "T": {
          "T.ILLEGAL_ACCESS": 2,
          "T.LISTEN-IN_NW_DATA": 3,
          "T.MISDELIVERY": 2,
          "T.SPOOFING": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 2,
          "ASE_REQ": 1,
          "ASE_REQ.2": 2,
          "ASE_SPD": 1,
          "ASE_SPD.1": 2,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL1+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 14,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 8,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 8,
          "FAU_SAR.3.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2
        },
        "FIA": {
          "FIA_AFL": 18,
          "FIA_AFL.1": 4,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 21,
          "FIA_SOS.2": 4,
          "FIA_UAU": 1,
          "FIA_UAU.1": 8,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 29,
          "FIA_UID.1": 7,
          "FIA_UID.2": 4,
          "FIA_USB.1": 7,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 27,
          "FMT_MSA.1": 16,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 7,
          "FMT_SAE.1": 14,
          "FMT_SAE.1.1": 1,
          "FMT_SAE.1.2": 1,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 26,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 10
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_TRP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 11
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2006-09-002": 2,
          "CCMB-2006-09-003": 2,
          "CCMB-2006-09-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 16
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20080807135828+09\u002700\u0027",
      "/ModDate": "D:20080807135828+09\u002700\u0027",
      "/Producer": "SkyPDF Pro Driver Version 3.03.0100.00",
      "pdf_file_size_bytes": 491338,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 72
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/c0156_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_OBJ.2",
      "ASE_SPD.1",
      "ASE_REQ.2",
      "EAL1+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/c0156_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83",
    "report_txt_hash": "2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e",
    "st_txt_hash": "13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136"
  },
  "status": "archived"
}