Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010

CSV information ?

Status archived
Valid from 24.04.2018
Valid until 23.04.2023
Scheme 🇮🇳 IN
Manufacturer Ericsson India Global Services Pvt Ltd.
Category Network and Network-Related Devices and Systems
Security level EAL3

Heuristics summary ?

Certificate ?

Extracted keywords

Security level
EAL 3
Evaluation facilities
Common Criteria Test Laboratory, ERTL

File metadata

Creation date D:20181120161757+05'30'
Modification date D:20181122170210+05'30'
Pages 2
Creator Hewlett-Packard MFP

Certification report ?

Extracted keywords

Protocols
SSH

Security level
EAL3
Claims
A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME
Evaluation facilities
Common Criteria Test Laboratory, ERTL

File metadata

Title LOGO
Author Mitali Chatterjee
Creation date D:20181106103659+05'30'
Modification date D:20181106103659+05'30'
Pages 12
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Security target ?

Extracted keywords

Symmetric Algorithms
AES, 3DES
Asymmetric Algorithms
DH, Diffie-Hellman, DSA
Hash functions
SHA-1
Protocols
SSH
Block cipher modes
ECB, CBC

Security level
EAL 3, EAL3
Claims
O.FLOW, O.ACCESS, O.ROLBAK, O.AUDIT, O.ENCRYPT, O.ROLBACK, T.ROUTE, T.PRIVIL, T.INTERCEPT, T.CONFLOSS, T.NOAUDIT, T.PROTECT, A.LOCATE, A.NOEVIL, A.EAUTH, A.TIME, OE.PHYSICAL, OE.ADMIN, OE.TIME, OE.EAUTH
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.3, ADV_TDS.2, ADV_ARC, ADV_FSP, ADV_TDS, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_CMC.3, ALC_CMS.3, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_LCD, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.2, AVA_VAN, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_SAR.1, FAU_GEN.1, FAU_GEN.2, FAU_SAA.1, FAU_STG.1, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_STG.1.1, FAU_STG.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_CKM, FDP_IFC.1, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FIA_ATD.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.5, FIA_UID.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.1, FIA_UID.1, FMT_MSA.3, FMT_MTD, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1.1, FMT_MSA.1, FPT_TST_EXT, FPT_TST, FPT_TST_EXT.1, FPT_TST_EXT.1.1, FPT_STM.1, FPT_RCV.2, FPT_FLS.1, FPT_STM.1.1, FPT_RCV.2.1, FPT_RCV.2.2, FPT_FLS.1.1, FTA_TSE.1, FTA_MCS.1, FTA_SSL.3, FTA_MCS.1.1, FTA_MCS.1.2, FTA_SSL.3.1

Side-channel analysis
malfunction

Standards
FIPS PUB 197, FIPS 46-3, FIPS PUB 186-3, RFC 4253

File metadata

Title Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software
Subject Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software
Keywords Security Target
Author ERAVDIV Ravi Ashvin Divecha
Creation date D:20181030135718+05'30'
Modification date D:20181030135718+05'30'
Pages 57
Creator Microsoft® Word 2016
Producer Microsoft® Word 2016

Heuristics ?

No heuristics are available for this certificate.

Extracted SARs

ASE_CCL.1, ALC_DEL.1, ATE_DPT.1, ALC_CMS.3, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ALC_CMC.3, ASE_SPD.1, ASE_REQ.2, ATE_COV.2, AGD_OPE.1, ALC_DVS.1, ADV_TDS.2, ASE_ECD.1, AVA_VAN.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_OBJ.2, ADV_FSP.3

Scheme data ?

Serial Number 4
Product Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010
Sponsor Ericsson India Private Limited.
Developer Ericsson India Private Limited
Level EAL 3
Target Link https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-IPOS_EAL3%20version%201.0.pdf
Target Name CR-IPOS_EAL3 version 1.0.pdf
Cert Link https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/Ericsson%20Certificate.pdf
Cert Name Ericsson Certificate.pdf
Certification Date 03.08.2018
Report Link https://www.commoncriteria-india.gov.in/sites/default/files/2023-04/CR-IPOS_EAL3_version_1.0.pdf
Report Name CR-IPOS_EAL3_version_1.0.pdf

References ?

No references are available for this certificate as its ID was not successfully extracted.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'serial_number': '4', 'product': 'Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010', 'sponsor': 'Ericsson India Private Limited.', 'developer': 'Ericsson India Private Limited', 'level': 'EAL 3', 'target_link': 'https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-IPOS_EAL3%20version%201.0.pdf', 'target_name': 'CR-IPOS_EAL3 version 1.0.pdf', 'cert_link': 'https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/Ericsson%20Certificate.pdf', 'cert_name': 'Ericsson Certificate.pdf', 'certification_date': '2018-08-03', 'report_link': 'https://www.commoncriteria-india.gov.in/sites/default/files/2023-04/CR-IPOS_EAL3_version_1.0.pdf', 'report_name': 'CR-IPOS_EAL3_version_1.0.pdf'}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '53ce17b56263d2d00a258e0141e6d80ca5305fc93405da2caaaa07a4078454c8', 'txt_hash': '332cdcb752151c35729563df93b962fcf3c92f1d067722c09540759196d154ca'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4958f0fd948b4048da1c2245e492cc1fd1d96a5c9ed71627bc5f04d58281adda', 'txt_hash': '952590337dde1c2d4c865d6faa6e898b98ebfa62f44973c776929aaef19b8e8b'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'eed222f5574f9d30dc7c7d945ff2fcd10311c9c4402395e82eddd43204ba33b6', 'txt_hash': '08a413ad90ddb8c730bfe177ce8e36839583a5986924bbd52008fa22c4c9e4f5'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 698299, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 12, '/Title': 'LOGO', '/Author': 'Mitali Chatterjee', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20181106103659+05'30'", '/ModDate': "D:20181106103659+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteria-india.gov.in/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1304330, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 57, '/Title': 'Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software', '/Author': 'ERAVDIV Ravi Ashvin Divecha', '/Subject': 'Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software', '/Keywords': 'Security Target', '/Creator': 'Microsoft® Word 2016', '/CreationDate': "D:20181030135718+05'30'", '/ModDate': "D:20181030135718+05'30'", '/Producer': 'Microsoft® Word 2016', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 447043, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 2, '/CreationDate': "D:20181120161757+05'30'", '/Creator': 'Hewlett-Packard MFP', '/ModDate': "D:20181122170210+05'30'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL3': 7}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.LOCATE': 1, 'A.NOEVIL': 1, 'A.EAUTH': 1, 'A.TIME': 1}}, 'vendor': {}, 'eval_facility': {'ERTL': {'Common Criteria Test Laboratory, ERTL': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 3}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1, 'EAL3': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.3': 1, 'ADV_TDS.2': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE': 2, 'AGD_PRE': 2, 'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.3': 1, 'ALC_CMS.3': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.2': 1, 'AVA_VAN': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_ARP.1': 6, 'FAU_SAR.1': 5, 'FAU_GEN.1': 6, 'FAU_GEN.2': 6, 'FAU_SAA.1': 6, 'FAU_STG.1': 6, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1}, 'FCS': {'FCS_CKM.1': 5, 'FCS_CKM.4': 4, 'FCS_COP.1': 4, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 2, 'FCS_COP.1.1': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 6, 'FDP_IFF.1': 6, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1}, 'FIA': {'FIA_ATD.1': 6, 'FIA_AFL.1': 6, 'FIA_SOS.1': 6, 'FIA_UAU.2': 7, 'FIA_UAU.5': 6, 'FIA_UID.2': 8, 'FIA_ATD.1.1': 1, 'FIA_SOS.1.1': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UAU.1': 1, 'FIA_UID.1': 2}, 'FMT': {'FMT_MSA.3': 10, 'FMT_MTD': 32, 'FMT_SMF.1': 6, 'FMT_SMR.1': 6, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1': 5, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_MSA.1': 3}, 'FPT': {'FPT_TST_EXT': 2, 'FPT_TST': 1, 'FPT_TST_EXT.1': 8, 'FPT_TST_EXT.1.1': 2, 'FPT_STM.1': 6, 'FPT_RCV.2': 6, 'FPT_FLS.1': 6, 'FPT_STM.1.1': 1, 'FPT_RCV.2.1': 1, 'FPT_RCV.2.2': 1, 'FPT_FLS.1.1': 1}, 'FTA': {'FTA_TSE.1': 6, 'FTA_MCS.1': 6, 'FTA_SSL.3': 6, 'FTA_MCS.1.1': 1, 'FTA_MCS.1.2': 1, 'FTA_SSL.3.1': 1}}, 'cc_claims': {'O': {'O.FLOW': 6, 'O.ACCESS': 16, 'O.ROLBAK': 6, 'O.AUDIT': 14, 'O.ENCRYPT': 5, 'O.ROLBACK': 1}, 'T': {'T.ROUTE': 3, 'T.PRIVIL': 2, 'T.INTERCEPT': 3, 'T.CONFLOSS': 2, 'T.NOAUDIT': 3, 'T.PROTECT': 1}, 'A': {'A.LOCATE': 3, 'A.NOEVIL': 2, 'A.EAUTH': 2, 'A.TIME': 3}, 'OE': {'OE.PHYSICAL': 1, 'OE.ADMIN': 1, 'OE.TIME': 1, 'OE.EAUTH': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'3DES': {'3DES': 1}}}, 'asymmetric_crypto': {'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 5}, 'DSA': {'DSA': 10}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 2}}}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 17}}, 'randomness': {}, 'cipher_mode': {'ECB': {'ECB': 1}, 'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 1, 'FIPS 46-3': 1, 'FIPS PUB 186-3': 1}, 'RFC': {'RFC 4253': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 3': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'ERTL': {'Common Criteria Test Laboratory, ERTL': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to CR-IPOS_EAL3 version 1.0.pdf.
    • The st_filename property was set to Ericsson-SSR-Security-Target-07112016.pdf.
    • The cert_filename property was set to Ericsson Certificate.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-IPOS_EAL3%20version%201.0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ericsson-SSR-Security-Target-07112016.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Network and Network-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ericsson%20Certificate.pdf",
  "dgst": "19f7f5081c5fa564",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": null,
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "15.2"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/Ericsson%20Certificate.pdf",
      "cert_name": "Ericsson Certificate.pdf",
      "certification_date": "2018-08-03",
      "developer": "Ericsson India Private Limited",
      "level": "EAL 3",
      "product": "Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010",
      "report_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2023-04/CR-IPOS_EAL3_version_1.0.pdf",
      "report_name": "CR-IPOS_EAL3_version_1.0.pdf",
      "serial_number": "4",
      "sponsor": "Ericsson India Private Limited.",
      "target_link": "https://www.commoncriteria-india.gov.in/sites/default/files/2022-02/CR-IPOS_EAL3%20version%201.0.pdf",
      "target_name": "CR-IPOS_EAL3 version 1.0.pdf"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Ericsson India Global Services Pvt Ltd.",
  "manufacturer_web": "https://www.ericsson.com/in",
  "name": "Ericsson IPOS Release 15.2 software running on Smart Service Routers SSR 8020 and SSR 8010",
  "not_valid_after": "2023-04-23",
  "not_valid_before": "2018-04-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "Ericsson Certificate.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 3": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ERTL": {
          "Common Criteria Test Laboratory, ERTL": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20181120161757+05\u002730\u0027",
      "/Creator": "Hewlett-Packard MFP",
      "/ModDate": "D:20181122170210+05\u002730\u0027",
      "pdf_file_size_bytes": 447043,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 2
    },
    "report_filename": "CR-IPOS_EAL3 version 1.0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.EAUTH": 1,
          "A.LOCATE": 1,
          "A.NOEVIL": 1,
          "A.TIME": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL3": 7
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 3
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "ERTL": {
          "Common Criteria Test Laboratory, ERTL": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Mitali Chatterjee",
      "/CreationDate": "D:20181106103659+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/ModDate": "D:20181106103659+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Title": "LOGO",
      "pdf_file_size_bytes": 698299,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteria-india.gov.in/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 12
    },
    "st_filename": "Ericsson-SSR-Security-Target-07112016.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 5
          },
          "DSA": {
            "DSA": 10
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.EAUTH": 2,
          "A.LOCATE": 3,
          "A.NOEVIL": 2,
          "A.TIME": 3
        },
        "O": {
          "O.ACCESS": 16,
          "O.AUDIT": 14,
          "O.ENCRYPT": 5,
          "O.FLOW": 6,
          "O.ROLBACK": 1,
          "O.ROLBAK": 6
        },
        "OE": {
          "OE.ADMIN": 1,
          "OE.EAUTH": 1,
          "OE.PHYSICAL": 1,
          "OE.TIME": 1
        },
        "T": {
          "T.CONFLOSS": 2,
          "T.INTERCEPT": 3,
          "T.NOAUDIT": 3,
          "T.PRIVIL": 2,
          "T.PROTECT": 1,
          "T.ROUTE": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.3": 1,
          "ADV_TDS": 1,
          "ADV_TDS.2": 1
        },
        "AGD": {
          "AGD_OPE": 2,
          "AGD_OPE.1": 1,
          "AGD_PRE": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.3": 1,
          "ALC_CMS": 1,
          "ALC_CMS.3": 1,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD": 1,
          "ALC_LCD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN": 1,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 3": 1,
          "EAL3": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 6,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_GEN.1": 6,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 6,
          "FAU_GEN.2.1": 1,
          "FAU_SAA.1": 6,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 5,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_STG.1": 6,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1
        },
        "FCS": {
          "FCS_CKM": 1,
          "FCS_CKM.1": 5,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.4": 4,
          "FCS_CKM.4.1": 2,
          "FCS_COP.1": 4,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_IFC.1": 6,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 6,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1
        },
        "FIA": {
          "FIA_AFL.1": 6,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 1,
          "FIA_UAU.2": 7,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.5": 6,
          "FIA_UAU.5.1": 1,
          "FIA_UAU.5.2": 1,
          "FIA_UID.1": 2,
          "FIA_UID.2": 8,
          "FIA_UID.2.1": 1
        },
        "FMT": {
          "FMT_MSA.1": 3,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD": 32,
          "FMT_MTD.1": 5,
          "FMT_SMF.1": 6,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 6,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_RCV.2": 6,
          "FPT_RCV.2.1": 1,
          "FPT_RCV.2.2": 1,
          "FPT_STM.1": 6,
          "FPT_STM.1.1": 1,
          "FPT_TST": 1,
          "FPT_TST_EXT": 2,
          "FPT_TST_EXT.1": 8,
          "FPT_TST_EXT.1.1": 2
        },
        "FTA": {
          "FTA_MCS.1": 6,
          "FTA_MCS.1.1": 1,
          "FTA_MCS.1.2": 1,
          "FTA_SSL.3": 6,
          "FTA_SSL.3.1": 1,
          "FTA_TSE.1": 6
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        },
        "ECB": {
          "ECB": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 17
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "malfunction": 2
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS 46-3": 1,
          "FIPS PUB 186-3": 1,
          "FIPS PUB 197": 1
        },
        "RFC": {
          "RFC 4253": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "ERAVDIV Ravi Ashvin Divecha",
      "/CreationDate": "D:20181030135718+05\u002730\u0027",
      "/Creator": "Microsoft\u00ae Word 2016",
      "/Keywords": "Security Target",
      "/ModDate": "D:20181030135718+05\u002730\u0027",
      "/Producer": "Microsoft\u00ae Word 2016",
      "/Subject": "Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software",
      "/Title": "Security Target for Ericsson Smart Service Router SSR 8020, SSR 8010 running IPOS Software",
      "pdf_file_size_bytes": 1304330,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 57
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-IPOS_EAL3%20version%201.0.pdf",
  "scheme": "IN",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL3"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Ericsson-SSR-Security-Target-07112016.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "eed222f5574f9d30dc7c7d945ff2fcd10311c9c4402395e82eddd43204ba33b6",
      "txt_hash": "08a413ad90ddb8c730bfe177ce8e36839583a5986924bbd52008fa22c4c9e4f5"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "53ce17b56263d2d00a258e0141e6d80ca5305fc93405da2caaaa07a4078454c8",
      "txt_hash": "332cdcb752151c35729563df93b962fcf3c92f1d067722c09540759196d154ca"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4958f0fd948b4048da1c2245e492cc1fd1d96a5c9ed71627bc5f04d58281adda",
      "txt_hash": "952590337dde1c2d4c865d6faa6e898b98ebfa62f44973c776929aaef19b8e8b"
    }
  },
  "status": "archived"
}