AIX 6 version 6100-00-02 with optional Virtual IO Server (VIOS) version 1.5

CSV information ?

Status archived
Valid from 15.05.2008
Valid until 01.09.2019
Scheme 🇩🇪 DE
Manufacturer IBM Corporation
Category Operating Systems
Security level EAL4+, ALC_FLR.3

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0461-2008

Certificate ?

Certification report ?

Extracted keywords

Schemes
MAC
Protocols
SSL

Security level
EAL 4, EAL4, EAL 1, EAL 7, EAL5+, EAL1, EAL3, EAL5, EAL7, EAL2, EAL6, EAL 4 augmented
Claims
A.KERB_KEY, A.KERB_PROTECT, A.LDAP_PROTECT, OE.ADMIN, OE.CREDEN, OE.HW_SEP, OE.INFO_PROTECT, OE.INSTALL, OE.MAINTENANCE, OE.PHYSICAL, OE.RECOVER, OE.SERIAL_LOGIN, OE.SOFTWARE_IN, OE.KERB_BIND, OE.KERB_KEY, OE.KERB_PROTECT, OE.LDAP_PROTECT, OE.PROTECT, OE.RSA_KEY, OE.LPAR
Security Assurance Requirements (SAR)
ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL, ADO_IGS, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM, AGD_USR, ALC_FLR.3, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VLA.2, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.3, AVA_VLA.4, APE_DES, APE_ENV, APE_INT, APE_OBJ, APE_REQ, APE_SRE, ASE_DES, ASE_ENV, ASE_INT, ASE_OBJ, ASE_PPC, ASE_REQ, ASE_SRE, ASE_TSS
Certificates
BSI-DSZ-CC-0461-2008, BSI-DSZ-CC-0385-2006
Evaluation facilities
atsec

Side-channel analysis
JIL
Certification process
7] Evaluation Technical Report, Release 2, 2008-04-30, atsec information security GmbH (confidential document) [8] Labelled Security Protection Profile (LSPP), Version 1.b, 8 October 1999 [9] Controlled

Standards
AIS 34, AIS 25, AIS 26, AIS 31, AIS 32, AIS 35, AIS 36, AIS 38, ISO/IEC 15408:2005
Technical reports
BSI 7125, BSI 7148, BSI 7149

File metadata

Title BSI-DSZ-CC-0461-2008 AIX 6 version 6100-00-02 with optional Virtual I/O Server (VIOS) version 1.5
Subject Certification report Operating System
Keywords Operating System, AIX 6 version, BSI-DSZ-CC-0461-2008, Common Criteria
Author Bundesamt für Sicherheit in der Informationstechnik
Creation date D:20080519074016+02'00'
Modification date D:20080523074110+02'00'
Pages 36
Creator Writer
Producer StarOffice 8

Frontpage

Certificate ID BSI-DSZ-CC-0461-2008
Certified item AIX 6 version 6100-00-02 with optional Virtual I/O Server (VIOS) version 1.5
Certification lab BSI
Developer International Business Machines

References

Outgoing
  • BSI-DSZ-CC-0385-2006 - archived - IBM AIX 5L for POWER V5.3 Technology Level 5300-05-02 with optional Virtual I/O Server (VIOS), Version 1.3

Security target ?

Extracted keywords

Symmetric Algorithms
AES, RC4, DES, TDEA, TDES
Asymmetric Algorithms
RSA 1024
Hash functions
SHA-1, SHA1, SHA-224, SHA-256, SHA-512, MD5
Schemes
MAC
Protocols
SSL, TLS
Randomness
RNG
Block cipher modes
ECB, CBC
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA

Security level
EAL4, EAL2, EAL3, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
O.AUDITING, O.AUTHORIZATION, O.COMPROT, O.CONFINE, O.DISCRETIONARY_ACCESS, O.DUTY, O.ENFORCEMENT, O.ERASE, O.HIERARCHICAL, O.IP_FILTER, O.MANAGE, O.MANDATORY_ACCESS, O.MANDATORY_INTEGRITY, O.NETWORK_ACCESS, O.RESIDUAL_INFORMATION, O.ROLE, O.STACK, O.TCB_ACCESS, O.VIOS, O.AUDIT, O.ACCOUNT, O.ENTRY, O.KNOWN, O.ADMIN, O.CONNECT, O.INSTALL, O.PHYSICAL, T.ACCESS, T.OPERATE, T.ROLEDEV, T.UAACTION, T.UAUSER, T.VIOS, T.IP_PASSTHRU, T.ENTRY, A.ASSET, A.LOCATE, A.PROTECT, A.ACCESS, A.COOP, A.MANAGE, A.NO_EVIL_ADM, A.OWNER, A.UTRAIN, A.UTRUST, A.CONNECT, A.KERB_KEY, A.KERB_PROTECT, A.LDAP_PROTECT, A.NET_COMP, A.PEER, A.RSA_KEY, A.CLEARANCE, A.SENSITIVITY, OE.ADMIN, OE.CREDEN, OE.HW_SEP, OE.INFO_PROTECT, OE.INSTALL, OE.MAINTENANCE, OE.PHYSICAL, OE.RECOVER, OE.SERIAL_LOGIN, OE.SOFTWARE_IN, OE.KERB_BIND, OE.KERB_KEY, OE.KERB_PROTECT, OE.LDAP_PROTECT, OE.PROTECT, OE.RSA_KEY, OE.LPAR
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_FLR.3, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_SEL.1, FAU_STG.1, FAU_STG.3, FAU_STG.4, FAU_GEN, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FAU_SEL.1.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3.1, FAU_STG.4.1, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CMK.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_COP.1.1, FCS_CKM.4, FDP_ACF.1, FDP_IFF.1, FDP_IFF.1.2, FDP_IFC.1, FDP_MSA.1, FDP_MSA.3, FDP_RIP, FDP_ACC.1, FDP_ETC.1, FDP_ETC.2, FDP_IFF.2, FDP_ITC.1, FDP_ITC.2, FDP_RIP.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_IFF.2.1, FDP_IFF.2.2, FDP_IFF.2.3, FDP_IFF.2.4, FDP_IFF.2.5, FDP_IFF.2.6, FDP_IFF.2.7, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_RIP.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.7, FIA_UID.2, FIA_USB.1, FIA_UID, FIA_ATD.1.1, FIA_UAU.2.1, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_SOS.1.1, FIA_UAU.1, FIA_UID.1, FMT_MTD.1, FMT_SMF.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.3, FMT_REV.1, FMT_SMR.1, FMT_SMR.2, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.3.1, FMT_REV.1.1, FMT_REV.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMR.2.1, FMT_SMR.2.2, FMT_SMR.2.3, FMT_SMF.2, FPT_TST.1.1, FPT_TST.1, FPT_RVM, FPT_AMT.1, FPT_FLS.1, FPT_RCV.1, FPT_RCV.4, FPT_RVM.1, FPT_SEP.1, FPT_STM.1, FPT_TDC.1, FPT_AMT.1.1, FPT_FLS.1.1, FPT_RCV.1.1, FPT_RCV.4.1, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_STM.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_TST.1.2, FPT_TST.1.3, FTA_LSA.1, FTA_TSE.1, FTA_LSA.1.1, FTA_TSE.1.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Evaluation facilities
atsec

Side-channel analysis
malfunction

Standards
FIPS180-2, FIPS186-2, FIPS PUB 186-2, FIPS197, FIPS46-3, FIPS PUB 189, FIPS 186-2, FIPS 197, FIPS 46-3, FIPS 180-2, FIPS PUB 188, PKCS#1, PKCS #12, AIS 32, RFC3268, RFC4120, RFC 4120, RFC 792, RFC 1108, ISO/IEC 9945-2, CCIMB-2005-08-001, CCIMB-2005-08-002, CCIMB-2005-08-003, CCIMB-2005-08-004

File metadata

Title IBM AIX V6.1 and optional VIOS Security Target
Subject Security Target for CAPP, LSPP, and RBACPP
Keywords IBM, AIX 6 for POWER V6.1, Security Target, CAPP, LSPP, RBACPP
Author atsec
Creation date D:20080507154356Z
Modification date D:20080523074342+02'00'
Pages 156
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: BSI-DSZ-CC-0461-2008

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_FLR.3, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2

Similar certificates

Name Certificate ID
IBM AIX 5L for POWER V5.3, Technology level 5300-05-02 with Argus Systems Group PitBull Foundation Suite 5.0 and optional IBM Virtual IO Server (VIOS) Version 1.3 BSI-DSZ-CC-0396-2007 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551, Rex-Rotary MP C2051/C2551, Gestetner MP C2051/C2551, infotec MP C2051/C2551 all of above with Fax Option Type C2551 Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01e, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, PCL 1.01, OptionPCLFont 1.02, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0325 Compare
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lanier MP C3001/C3501, nashuatec MP C3001/C3501, Rex-Rotary MP C3001/C3501, Gestetner MP C3001/C3501, infotec MP C3001/C3501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.02, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0300 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0326 Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lanier MP C4501/C5501, nashuatec MP C4501/C5501, Rex-Rotary MP C4501/C5501, Gestetner MP C4501/C5501, infotec MP C4501/C5501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0302 Compare
Ricoh Aficio MP C6501 SP/C7501 SP, Savin C9065/C9075, Lanier LD365C/LD375C, Lanier MP C6501 SP/C7501 SP, nashuatec MP C6501 SP/C7501 SP, Rex-Rotary MP C6501 SP/C7501 SP, Gestetner MP C6501 SP/C7501 SP, infotec MP C6501 SP/C7501 SP all of above with Fax Option Type C7501, DataOverwriteSecurity Unit Type H, and HDD Encryption Unit Type A Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.08, OptionPCLFont 1.02, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0321 Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01d, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, RPCS 3.10.17, RPCS Font 1.00, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0323 Compare
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit, MFP: Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, nashuatec MP 9001, Rex-Rotary MP 6001, Rex-Rotary MP 7001, Rex-Rotary MP 8001, Rex-Rotary MP 9001, Savin 9060, Savin 9070, Savin 9080, Savin 9090 Or Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp FCU: Fax Option Type 9001 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type H HDD Encryption Unit: HDD Encryption Unit Type A Printer/Scanner Unit : Printer/Scanner Unit Type 9001 Version: - Software version: System/Copy 1.18 Network Support 8.69.1 Scanner 01.20 Printer 1.16e Fax 03.00.00 RemoteFax 03.00.00 Web Support 1.13.1 Web Uapl 1.05 Network DocBox 1.04 animation 1.2.1 Option PCL 1.02 OptionPCLFont 1.02 Engine 1.61:04 OpePanel 1.04 LANG0 1.03 LANG1 1.03 - Hardware version: Ic Key 1100 Ic Ctlr 03 - Options version: GWFCU3-16(WW) 04.00.00 Data Erase Opt 1.01x JISEC-CC-CRP-C0289 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP 3351, Savin 9228, Savin 9233, Lanier LD528, Lanier LD533, Lanier MP 2851, Lanier MP 3351, Gestetner MP 2851, Gestetner MP 3351, nashuatec MP 2851, nashuatec MP 3351, Rex-Rotary MP 2851, Rex-Rotary MP 3351, infotec MP 2851, infotec MP 3351 FCU: Fax Option Type 3351 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I, HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.12 Printer 1.02 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.05 Web Uapl 1.03 Network DocBox 1.00 animation 1.1 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.10 LANG0 1.09 LANG1 1.09 Hardware Ic Key 1100 Ic Hdd 01 Options Data Erase Opt 1.01m GWFCU3-20(WW) 02.00.00 JISEC-CC-CRP-C0286 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 ataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type I HDD Encryption Unit: HDD Encryption Unit Type A Version: Software System/Copy 1.02 Network Support 7.34 Scanner 01.24 Printer 1.01 Fax 02.00.00 RemoteFax 02.00.00 Web Support 1.04 Web Uapl 1.02 Network DocBox 1.00 animation 1.3 Option PCL 1.03 OptionPCLFont 1.01 Engine 1.00:01 OpePanel 1.08 LANG0 1.07 LANG1 1.07, Hardware Ic Key 1100 Ic Hdd 01, Options Data Erase Opt 1.01m GWFCU3-19(WW) 02.00.00 JISEC-CC-CRP-C0285 Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0324 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imagio MP C4001 SPF Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0301 Compare
Following MFP with Fax Option JAPAN: MFP: imagio MP 6001 SP,imagio MP 7501 SP Fax Option: imagio FAX Unit Type 18 Overseas: MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, Lanier MP 6001 SP, Lanier MP 7001 SP, Lanier MP 8001 SP, Lanier MP 9001 SP, Gestetner MP 6001 SP,Gestetner MP 7001 SP, Gestetner MP 8001 SP,Gestetner MP 9001 SP, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP,nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP,Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP,Rex-Rotary MP 9001 SP, infotec MP 6001 SP,infotec MP 7001 SP, infotec MP 8001 SP,infotec MP 9001 SP Fax Option: Option Type 9001 MFP Version: Software System/Copy 1.15 Network Support 8.65 Scanner 01.19 Printer 1.15 Fax 02.00.00 Web Support 1.09 Web Uapl 1.05 Network Doc Box 1.04 Hardware Ic Key 1100 Ic Ctlr 03 FCU Version : GWFCU3-16(WW) 02.00.00 JISEC-CC-CRP-C0274 Compare
Following MFP with FCU (Fax Option Type 5001). MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP 4001G, Ricoh Aficio MP 5001, Ricoh Aficio MP 5001G, Savin 9240, Savin 9240G, Savin 9250, Savin 9250G, Lanier LD140, Lanier LD140G, Lanier LD150, Lanier LD150G, Lanier MP 4001, Lanier MP 5001, Gestetner MP 4001, Gestetner MP 4001G, Gestetner MP 5001, Gestetner MP 5001G, nashuatec MP 4001, nashuatec MP 5001, Rex-Rotary MP 4001, Rex-Rotary MP 5001, infotec MP 4001, infotec MP 5001 FCU: Fax Option Type 5001 Version: MFP Software/Hardware Version: Software System/Copy 1.00, Network Support 7.29.3, Scanner 01.24, Printer 1.00, Fax 01.00.00, Web Support 1.00.1, Web Uapl 1.02, Network Doc Box 1.00, Hardware Ic Key 1100, Ic Hdd 01, FCU Version: GWFCU3-19(WW) 01.00.00 JISEC-CC-CRP-C0262 Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0346 Compare
IBM AIX 5L for POWER V5.3 Technology Level 5300-05-02 with optional Virtual I/O Server (VIOS), Version 1.3 BSI-DSZ-CC-0385-2006 Compare
Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infotec MP C305 all of the above with Facsimile Function / Hard Disk Drive Version:- Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 1.00, Scanner 01.05, Printer 1.05, PCL 1.07, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-5(WW) 03.00.00, Engine 1.08:02, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0381 Compare
Ricoh imagio MP C3301 SP / imagio MP C2801 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C3301 SPF / imagio MP C2801 SPF Version: -Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.01, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0299 Compare
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, PCL 1.04, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0347 Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0354 Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotary MP C4502A/C5502A, Gestetner MP C4502A/C5502A, infotec MP C4502A/C5502A all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0355 Compare
Showing 5 out of 22.

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b1d8f68dd3f9e677fa238045ac5269842a4a388e313d9d3916d7d1e89f58998d', 'txt_hash': '2d08bd48da2d4147e7e7364a58e99439546e0f92b4d1992f2d8f753877a37789'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd949143a7d2865e2911c1a2f8a95fbb27602f523719f23884fc77d9a2b5ffc8e', 'txt_hash': '45d60e053b54f1d8621ce7d82fbc912e6f893111110b79ae4189f8c08eb8a8b6'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 416612, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 36, '/CreationDate': "D:20080519074016+02'00'", '/Subject': 'Certification report Operating System', '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Writer', '/Keywords': 'Operating System, AIX 6 version, BSI-DSZ-CC-0461-2008, Common Criteria', '/Producer': 'StarOffice 8', '/ModDate': "D:20080523074110+02'00'", '/Title': 'BSI-DSZ-CC-0461-2008 AIX 6 version 6100-00-02 with optional Virtual I/O Server (VIOS) version 1.5', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.bsi.bund.de/']}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 2046775, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 156, '/CreationDate': 'D:20080507154356Z', '/Subject': 'Security Target for CAPP, LSPP, and RBACPP', '/Author': 'atsec', '/Creator': 'Microsoft® Office Word 2007', '/Keywords': 'IBM, AIX 6 for POWER V6.1, Security Target, CAPP, LSPP, RBACPP', '/Producer': 'Microsoft® Office Word 2007', '/ModDate': "D:20080523074342+02'00'", '/Title': 'IBM AIX V6.1 and optional VIOS Security Target', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://wp.netscape.com/eng/ssl3/draft302.txt']}}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0461-2008', 'cert_item': 'AIX 6 version 6100-00-02 with optional Virtual I/O Server (VIOS) version 1.5', 'developer': 'International Business Machines', 'cert_lab': 'BSI'}}.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0461-2008': 18, 'BSI-DSZ-CC-0385-2006': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 5, 'EAL4': 6, 'EAL 1': 1, 'EAL 7': 1, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL5': 6, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 4 augmented': 3}}, 'cc_sar': {'ACM': {'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_FLR.3': 4, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_VLA.2': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 3, 'AVA_VLA': 4, 'AVA_VLA.3': 1, 'AVA_VLA.4': 1}, 'APE': {'APE_DES': 1, 'APE_ENV': 1, 'APE_INT': 1, 'APE_OBJ': 1, 'APE_REQ': 1, 'APE_SRE': 1}, 'ASE': {'ASE_DES': 1, 'ASE_ENV': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_PPC': 1, 'ASE_REQ': 1, 'ASE_SRE': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.KERB_KEY': 1, 'A.KERB_PROTECT': 1, 'A.LDAP_PROTECT': 1}, 'OE': {'OE.ADMIN': 1, 'OE.CREDEN': 1, 'OE.HW_SEP': 1, 'OE.INFO_PROTECT': 1, 'OE.INSTALL': 1, 'OE.MAINTENANCE': 1, 'OE.PHYSICAL': 1, 'OE.RECOVER': 1, 'OE.SERIAL_LOGIN': 1, 'OE.SOFTWARE_IN': 1, 'OE.KERB_BIND': 1, 'OE.KERB_KEY': 1, 'OE.KERB_PROTECT': 1, 'OE.LDAP_PROTECT': 1, 'OE.PROTECT': 1, 'OE.RSA_KEY': 1, 'OE.LPAR': 1}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 3}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 3, 'AIS 25': 1, 'AIS 26': 1, 'AIS 31': 1, 'AIS 32': 1, 'AIS 35': 1, 'AIS 36': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408:2005': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'7] Evaluation Technical Report, Release 2, 2008-04-30, atsec information security GmbH (confidential document) [8] Labelled Security Protection Profile (LSPP), Version 1.b, 8 October 1999 [9] Controlled': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 9, 'EAL2': 3, 'EAL3': 3, 'EAL 4': 2, 'EAL4 augmented': 2, 'EAL 4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 1, 'ACM_SCP.2': 2}, 'ADO': {'ADO_DEL.2': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_FSP.2': 1, 'ADV_HLD.2': 1, 'ADV_IMP.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1, 'ADV_SPM.1': 11}, 'AGD': {'AGD_ADM.1': 3, 'AGD_USR.1': 1}, 'ALC': {'ALC_FLR.3': 8, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_MSU.2': 1, 'AVA_SOF.1': 1, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 12, 'FAU_GEN.2': 12, 'FAU_SAR.1': 10, 'FAU_SAR.2': 12, 'FAU_SAR.3': 10, 'FAU_SEL.1': 10, 'FAU_STG.1': 8, 'FAU_STG.3': 8, 'FAU_STG.4': 8, 'FAU_GEN': 3, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1, 'FAU_SEL.1.1': 2, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_CKM.1': 67, 'FCS_CKM.2': 31, 'FCS_COP.1': 99, 'FCS_CMK.1': 2, 'FCS_CKM.1.1': 5, 'FCS_CKM.2.1': 2, 'FCS_COP.1.1': 8, 'FCS_CKM.4': 17}, 'FDP': {'FDP_ACF.1': 97, 'FDP_IFF.1': 32, 'FDP_IFF.1.2': 4, 'FDP_IFC.1': 92, 'FDP_MSA.1': 1, 'FDP_MSA.3': 2, 'FDP_RIP': 23, 'FDP_ACC.1': 103, 'FDP_ETC.1': 9, 'FDP_ETC.2': 11, 'FDP_IFF.2': 47, 'FDP_ITC.1': 19, 'FDP_ITC.2': 19, 'FDP_RIP.2': 13, 'FDP_ACC.1.1': 7, 'FDP_ACF.1.1': 7, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 8, 'FDP_ACF.1.4': 7, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_IFC.1.1': 5, 'FDP_IFF.1.1': 2, 'FDP_IFF.1.3': 2, 'FDP_IFF.1.4': 2, 'FDP_IFF.1.5': 2, 'FDP_IFF.1.6': 2, 'FDP_IFF.2.1': 3, 'FDP_IFF.2.2': 6, 'FDP_IFF.2.3': 3, 'FDP_IFF.2.4': 3, 'FDP_IFF.2.5': 3, 'FDP_IFF.2.6': 3, 'FDP_IFF.2.7': 3, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1, 'FDP_RIP.1': 1}, 'FIA': {'FIA_ATD.1': 29, 'FIA_SOS.1': 20, 'FIA_UAU.2': 13, 'FIA_UAU.7': 11, 'FIA_UID.2': 21, 'FIA_USB.1': 26, 'FIA_UID': 1, 'FIA_ATD.1.1': 2, 'FIA_UAU.2.1': 1, 'FIA_UID.2.1': 2, 'FIA_USB.1.1': 2, 'FIA_USB.1.2': 2, 'FIA_USB.1.3': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1': 3, 'FIA_UID.1': 6}, 'FMT': {'FMT_MTD.1': 102, 'FMT_SMF.1': 63, 'FMT_MOF.1': 20, 'FMT_MSA.1': 124, 'FMT_MSA.2': 43, 'FMT_MSA.3': 99, 'FMT_MTD.3': 10, 'FMT_REV.1': 30, 'FMT_SMR.1': 22, 'FMT_SMR.2': 21, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 13, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 11, 'FMT_MSA.3.2': 10, 'FMT_MTD.1.1': 12, 'FMT_MTD.3.1': 1, 'FMT_REV.1.1': 3, 'FMT_REV.1.2': 3, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_SMR.2.1': 1, 'FMT_SMR.2.2': 1, 'FMT_SMR.2.3': 1, 'FMT_SMF.2': 2}, 'FPT': {'FPT_TST.1.1': 2, 'FPT_TST.1': 13, 'FPT_RVM': 20, 'FPT_AMT.1': 9, 'FPT_FLS.1': 10, 'FPT_RCV.1': 10, 'FPT_RCV.4': 10, 'FPT_RVM.1': 10, 'FPT_SEP.1': 11, 'FPT_STM.1': 8, 'FPT_TDC.1': 10, 'FPT_AMT.1.1': 1, 'FPT_FLS.1.1': 1, 'FPT_RCV.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_STM.1.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_LSA.1': 9, 'FTA_TSE.1': 9, 'FTA_LSA.1.1': 1, 'FTA_TSE.1.1': 1}, 'FTP': {'FTP_ITC.1': 13, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AUDITING': 23, 'O.AUTHORIZATION': 24, 'O.COMPROT': 13, 'O.CONFINE': 11, 'O.DISCRETIONARY_ACCESS': 19, 'O.DUTY': 6, 'O.ENFORCEMENT': 20, 'O.ERASE': 7, 'O.HIERARCHICAL': 6, 'O.IP_FILTER': 11, 'O.MANAGE': 27, 'O.MANDATORY_ACCESS': 12, 'O.MANDATORY_INTEGRITY': 10, 'O.NETWORK_ACCESS': 12, 'O.RESIDUAL_INFORMATION': 11, 'O.ROLE': 17, 'O.STACK': 11, 'O.TCB_ACCESS': 12, 'O.VIOS': 10, 'O.AUDIT': 1, 'O.ACCOUNT': 1, 'O.ENTRY': 1, 'O.KNOWN': 1, 'O.ADMIN': 1, 'O.CONNECT': 1, 'O.INSTALL': 1, 'O.PHYSICAL': 1}, 'T': {'T.ACCESS': 8, 'T.OPERATE': 4, 'T.ROLEDEV': 4, 'T.UAACTION': 5, 'T.UAUSER': 6, 'T.VIOS': 3, 'T.IP_PASSTHRU': 3, 'T.ENTRY': 2}, 'A': {'A.ASSET': 4, 'A.LOCATE': 4, 'A.PROTECT': 6, 'A.ACCESS': 4, 'A.COOP': 4, 'A.MANAGE': 6, 'A.NO_EVIL_ADM': 4, 'A.OWNER': 4, 'A.UTRAIN': 4, 'A.UTRUST': 4, 'A.CONNECT': 8, 'A.KERB_KEY': 4, 'A.KERB_PROTECT': 4, 'A.LDAP_PROTECT': 4, 'A.NET_COMP': 5, 'A.PEER': 4, 'A.RSA_KEY': 4, 'A.CLEARANCE': 3, 'A.SENSITIVITY': 3}, 'OE': {'OE.ADMIN': 6, 'OE.CREDEN': 4, 'OE.HW_SEP': 8, 'OE.INFO_PROTECT': 20, 'OE.INSTALL': 18, 'OE.MAINTENANCE': 4, 'OE.PHYSICAL': 8, 'OE.RECOVER': 8, 'OE.SERIAL_LOGIN': 4, 'OE.SOFTWARE_IN': 4, 'OE.KERB_BIND': 5, 'OE.KERB_KEY': 5, 'OE.KERB_PROTECT': 4, 'OE.LDAP_PROTECT': 4, 'OE.PROTECT': 9, 'OE.RSA_KEY': 5, 'OE.LPAR': 8}}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 16}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 34}, 'RC': {'RC4': 4}}, 'DES': {'DES': {'DES': 2}, '3DES': {'TDEA': 14, 'TDES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 8, 'SHA1': 1}, 'SHA2': {'SHA-224': 1, 'SHA-256': 3, 'SHA-512': 1}}, 'MD': {'MD5': {'MD5': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 87}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 53}, 'TLS': {'TLS': 2}}}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {'ECB': {'ECB': 5}, 'CBC': {'CBC': 8}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 1, 'TLS_RSA_WITH_AES_256_CBC_SHA': 1}}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 8}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS180-2': 3, 'FIPS186-2': 3, 'FIPS PUB 186-2': 1, 'FIPS197': 3, 'FIPS46-3': 2, 'FIPS PUB 189': 1, 'FIPS 186-2': 2, 'FIPS 197': 2, 'FIPS 46-3': 1, 'FIPS 180-2': 2, 'FIPS PUB 188': 2}, 'PKCS': {'PKCS#1': 1, 'PKCS #12': 1}, 'BSI': {'AIS 32': 3}, 'RFC': {'RFC3268': 3, 'RFC4120': 5, 'RFC 4120': 2, 'RFC 792': 1, 'RFC 1108': 2}, 'ISO': {'ISO/IEC 9945-2': 1}, 'CC': {'CCIMB-2005-08-001': 1, 'CCIMB-2005-08-002': 1, 'CCIMB-2005-08-003': 1, 'CCIMB-2005-08-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to 0461a.pdf.
    • The st_filename property was set to 0461b.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to ['BSI'].
    • The cert_id property was set to BSI-DSZ-CC-0461-2008.
    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0385-2006']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0385-2006', 'BSI-DSZ-CC-0302-2005', 'BSI-DSZ-CC-0217-2003', 'BSI-DSZ-CC-0194-2002']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0461a.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0461b.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name AIX 6 version 6100-00-02 with optional Virtual IO Server (VIOS) version 1.5 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Operating Systems",
  "cert_link": null,
  "dgst": "38819f801b55351e",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-0461-2008",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.5"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0385-2006"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0302-2005",
          "BSI-DSZ-CC-0217-2003",
          "BSI-DSZ-CC-0385-2006",
          "BSI-DSZ-CC-0194-2002"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "IBM Corporation",
  "manufacturer_web": "https://www.ibm.com",
  "name": "AIX 6 version 6100-00-02 with optional Virtual IO Server (VIOS) version 1.5",
  "not_valid_after": "2019-09-01",
  "not_valid_before": "2008-05-15",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "0461a.pdf",
    "report_frontpage": {
      "DE": {
        "cert_id": "BSI-DSZ-CC-0461-2008",
        "cert_item": "AIX 6 version 6100-00-02 with optional Virtual I/O Server (VIOS) version 1.5",
        "cert_lab": "BSI",
        "developer": "International Business Machines",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ]
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0385-2006": 2,
          "BSI-DSZ-CC-0461-2008": 18
        }
      },
      "cc_claims": {
        "A": {
          "A.KERB_KEY": 1,
          "A.KERB_PROTECT": 1,
          "A.LDAP_PROTECT": 1
        },
        "OE": {
          "OE.ADMIN": 1,
          "OE.CREDEN": 1,
          "OE.HW_SEP": 1,
          "OE.INFO_PROTECT": 1,
          "OE.INSTALL": 1,
          "OE.KERB_BIND": 1,
          "OE.KERB_KEY": 1,
          "OE.KERB_PROTECT": 1,
          "OE.LDAP_PROTECT": 1,
          "OE.LPAR": 1,
          "OE.MAINTENANCE": 1,
          "OE.PHYSICAL": 1,
          "OE.PROTECT": 1,
          "OE.RECOVER": 1,
          "OE.RSA_KEY": 1,
          "OE.SERIAL_LOGIN": 1,
          "OE.SOFTWARE_IN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT": 2,
          "ACM_CAP": 2,
          "ACM_SCP": 2
        },
        "ADO": {
          "ADO_DEL": 2,
          "ADO_IGS": 2
        },
        "ADV": {
          "ADV_FSP": 2,
          "ADV_HLD": 2,
          "ADV_IMP": 2,
          "ADV_INT": 2,
          "ADV_LLD": 2,
          "ADV_RCR": 2,
          "ADV_SPM": 2
        },
        "AGD": {
          "AGD_ADM": 2,
          "AGD_USR": 2
        },
        "ALC": {
          "ALC_DVS": 2,
          "ALC_FLR": 2,
          "ALC_FLR.3": 4,
          "ALC_LCD": 1,
          "ALC_TAT": 2
        },
        "APE": {
          "APE_DES": 1,
          "APE_ENV": 1,
          "APE_INT": 1,
          "APE_OBJ": 1,
          "APE_REQ": 1,
          "APE_SRE": 1
        },
        "ASE": {
          "ASE_DES": 1,
          "ASE_ENV": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_PPC": 1,
          "ASE_REQ": 1,
          "ASE_SRE": 1,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_COV": 2,
          "ATE_DPT": 2,
          "ATE_FUN": 2,
          "ATE_IND": 2
        },
        "AVA": {
          "AVA_CCA": 2,
          "AVA_MSU": 2,
          "AVA_SOF": 3,
          "AVA_VLA": 4,
          "AVA_VLA.2": 1,
          "AVA_VLA.3": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 4": 5,
          "EAL 4 augmented": 3,
          "EAL 7": 1,
          "EAL1": 5,
          "EAL2": 3,
          "EAL3": 4,
          "EAL4": 6,
          "EAL5": 6,
          "EAL5+": 1,
          "EAL6": 3,
          "EAL7": 4
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "7] Evaluation Technical Report, Release 2, 2008-04-30, atsec information security GmbH (confidential document) [8] Labelled Security Protection Profile (LSPP), Version 1.b, 8 October 1999 [9] Controlled": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 1,
          "AIS 26": 1,
          "AIS 31": 1,
          "AIS 32": 1,
          "AIS 34": 3,
          "AIS 35": 1,
          "AIS 36": 1,
          "AIS 38": 1
        },
        "ISO": {
          "ISO/IEC 15408:2005": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {
        "BSI": {
          "BSI 7125": 2,
          "BSI 7148": 1,
          "BSI 7149": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20080519074016+02\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "Operating System, AIX 6 version, BSI-DSZ-CC-0461-2008, Common Criteria",
      "/ModDate": "D:20080523074110+02\u002700\u0027",
      "/Producer": "StarOffice 8",
      "/Subject": "Certification report Operating System",
      "/Title": "BSI-DSZ-CC-0461-2008 AIX 6 version 6100-00-02 with optional Virtual I/O Server (VIOS) version 1.5",
      "pdf_file_size_bytes": 416612,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 36
    },
    "st_filename": "0461b.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ACCESS": 4,
          "A.ASSET": 4,
          "A.CLEARANCE": 3,
          "A.CONNECT": 8,
          "A.COOP": 4,
          "A.KERB_KEY": 4,
          "A.KERB_PROTECT": 4,
          "A.LDAP_PROTECT": 4,
          "A.LOCATE": 4,
          "A.MANAGE": 6,
          "A.NET_COMP": 5,
          "A.NO_EVIL_ADM": 4,
          "A.OWNER": 4,
          "A.PEER": 4,
          "A.PROTECT": 6,
          "A.RSA_KEY": 4,
          "A.SENSITIVITY": 3,
          "A.UTRAIN": 4,
          "A.UTRUST": 4
        },
        "O": {
          "O.ACCOUNT": 1,
          "O.ADMIN": 1,
          "O.AUDIT": 1,
          "O.AUDITING": 23,
          "O.AUTHORIZATION": 24,
          "O.COMPROT": 13,
          "O.CONFINE": 11,
          "O.CONNECT": 1,
          "O.DISCRETIONARY_ACCESS": 19,
          "O.DUTY": 6,
          "O.ENFORCEMENT": 20,
          "O.ENTRY": 1,
          "O.ERASE": 7,
          "O.HIERARCHICAL": 6,
          "O.INSTALL": 1,
          "O.IP_FILTER": 11,
          "O.KNOWN": 1,
          "O.MANAGE": 27,
          "O.MANDATORY_ACCESS": 12,
          "O.MANDATORY_INTEGRITY": 10,
          "O.NETWORK_ACCESS": 12,
          "O.PHYSICAL": 1,
          "O.RESIDUAL_INFORMATION": 11,
          "O.ROLE": 17,
          "O.STACK": 11,
          "O.TCB_ACCESS": 12,
          "O.VIOS": 10
        },
        "OE": {
          "OE.ADMIN": 6,
          "OE.CREDEN": 4,
          "OE.HW_SEP": 8,
          "OE.INFO_PROTECT": 20,
          "OE.INSTALL": 18,
          "OE.KERB_BIND": 5,
          "OE.KERB_KEY": 5,
          "OE.KERB_PROTECT": 4,
          "OE.LDAP_PROTECT": 4,
          "OE.LPAR": 8,
          "OE.MAINTENANCE": 4,
          "OE.PHYSICAL": 8,
          "OE.PROTECT": 9,
          "OE.RECOVER": 8,
          "OE.RSA_KEY": 5,
          "OE.SERIAL_LOGIN": 4,
          "OE.SOFTWARE_IN": 4
        },
        "T": {
          "T.ACCESS": 8,
          "T.ENTRY": 2,
          "T.IP_PASSTHRU": 3,
          "T.OPERATE": 4,
          "T.ROLEDEV": 4,
          "T.UAACTION": 5,
          "T.UAUSER": 6,
          "T.VIOS": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 2
        },
        "ADO": {
          "ADO_DEL.2": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.1": 1,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 11
        },
        "AGD": {
          "AGD_ADM.1": 3,
          "AGD_USR.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_FLR.3": 8,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_SOF.1": 1,
          "AVA_VLA.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 1,
          "EAL2": 3,
          "EAL3": 3,
          "EAL4": 9,
          "EAL4 augmented": 2
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 3,
          "FAU_GEN.1": 12,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 12,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 10,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 12,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 10,
          "FAU_SAR.3.1": 1,
          "FAU_SEL.1": 10,
          "FAU_SEL.1.1": 2,
          "FAU_STG.1": 8,
          "FAU_STG.1.1": 1,
          "FAU_STG.1.2": 1,
          "FAU_STG.3": 8,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 8,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 67,
          "FCS_CKM.1.1": 5,
          "FCS_CKM.2": 31,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.4": 17,
          "FCS_CMK.1": 2,
          "FCS_COP.1": 99,
          "FCS_COP.1.1": 8
        },
        "FDP": {
          "FDP_ACC.1": 103,
          "FDP_ACC.1.1": 7,
          "FDP_ACF.1": 97,
          "FDP_ACF.1.1": 7,
          "FDP_ACF.1.2": 7,
          "FDP_ACF.1.3": 8,
          "FDP_ACF.1.4": 7,
          "FDP_ETC.1": 9,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_ETC.2": 11,
          "FDP_ETC.2.1": 1,
          "FDP_ETC.2.2": 1,
          "FDP_ETC.2.3": 1,
          "FDP_ETC.2.4": 1,
          "FDP_IFC.1": 92,
          "FDP_IFC.1.1": 5,
          "FDP_IFF.1": 32,
          "FDP_IFF.1.1": 2,
          "FDP_IFF.1.2": 4,
          "FDP_IFF.1.3": 2,
          "FDP_IFF.1.4": 2,
          "FDP_IFF.1.5": 2,
          "FDP_IFF.1.6": 2,
          "FDP_IFF.2": 47,
          "FDP_IFF.2.1": 3,
          "FDP_IFF.2.2": 6,
          "FDP_IFF.2.3": 3,
          "FDP_IFF.2.4": 3,
          "FDP_IFF.2.5": 3,
          "FDP_IFF.2.6": 3,
          "FDP_IFF.2.7": 3,
          "FDP_ITC.1": 19,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITC.2": 19,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_MSA.1": 1,
          "FDP_MSA.3": 2,
          "FDP_RIP": 23,
          "FDP_RIP.1": 1,
          "FDP_RIP.2": 13
        },
        "FIA": {
          "FIA_ATD.1": 29,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 20,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 3,
          "FIA_UAU.2": 13,
          "FIA_UAU.2.1": 1,
          "FIA_UAU.7": 11,
          "FIA_UID": 1,
          "FIA_UID.1": 6,
          "FIA_UID.2": 21,
          "FIA_UID.2.1": 2,
          "FIA_USB.1": 26,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MOF.1": 20,
          "FMT_MOF.1.1": 2,
          "FMT_MSA.1": 124,
          "FMT_MSA.1.1": 13,
          "FMT_MSA.2": 43,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 99,
          "FMT_MSA.3.1": 11,
          "FMT_MSA.3.2": 10,
          "FMT_MTD.1": 102,
          "FMT_MTD.1.1": 12,
          "FMT_MTD.3": 10,
          "FMT_MTD.3.1": 1,
          "FMT_REV.1": 30,
          "FMT_REV.1.1": 3,
          "FMT_REV.1.2": 3,
          "FMT_SMF.1": 63,
          "FMT_SMF.1.1": 1,
          "FMT_SMF.2": 2,
          "FMT_SMR.1": 22,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1,
          "FMT_SMR.2": 21,
          "FMT_SMR.2.1": 1,
          "FMT_SMR.2.2": 1,
          "FMT_SMR.2.3": 1
        },
        "FPT": {
          "FPT_AMT.1": 9,
          "FPT_AMT.1.1": 1,
          "FPT_FLS.1": 10,
          "FPT_FLS.1.1": 1,
          "FPT_RCV.1": 10,
          "FPT_RCV.1.1": 1,
          "FPT_RCV.4": 10,
          "FPT_RCV.4.1": 1,
          "FPT_RVM": 20,
          "FPT_RVM.1": 10,
          "FPT_RVM.1.1": 1,
          "FPT_SEP.1": 11,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_STM.1": 8,
          "FPT_STM.1.1": 1,
          "FPT_TDC.1": 10,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1,
          "FPT_TST.1": 13,
          "FPT_TST.1.1": 2,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_LSA.1": 9,
          "FTA_LSA.1.1": 1,
          "FTA_TSE.1": 9,
          "FTA_TSE.1.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 13,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 8
        },
        "ECB": {
          "ECB": 5
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 53
          },
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 87
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 16
        }
      },
      "hash_function": {
        "MD": {
          "MD5": {
            "MD5": 1
          }
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 8,
            "SHA1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 3,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "malfunction": 8
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 32": 3
        },
        "CC": {
          "CCIMB-2005-08-001": 1,
          "CCIMB-2005-08-002": 1,
          "CCIMB-2005-08-003": 1,
          "CCIMB-2005-08-004": 1
        },
        "FIPS": {
          "FIPS 180-2": 2,
          "FIPS 186-2": 2,
          "FIPS 197": 2,
          "FIPS 46-3": 1,
          "FIPS PUB 186-2": 1,
          "FIPS PUB 188": 2,
          "FIPS PUB 189": 1,
          "FIPS180-2": 3,
          "FIPS186-2": 3,
          "FIPS197": 3,
          "FIPS46-3": 2
        },
        "ISO": {
          "ISO/IEC 9945-2": 1
        },
        "PKCS": {
          "PKCS #12": 1,
          "PKCS#1": 1
        },
        "RFC": {
          "RFC 1108": 2,
          "RFC 4120": 2,
          "RFC 792": 1,
          "RFC3268": 3,
          "RFC4120": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 34
          },
          "RC": {
            "RC4": 4
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 14,
            "TDES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {
        "TLS": {
          "TLS_RSA_WITH_AES_128_CBC_SHA": 1,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 1
        }
      },
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "atsec",
      "/CreationDate": "D:20080507154356Z",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/Keywords": "IBM, AIX 6 for POWER V6.1, Security Target, CAPP, LSPP, RBACPP",
      "/ModDate": "D:20080523074342+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "Security Target for CAPP, LSPP, and RBACPP",
      "/Title": "IBM AIX V6.1 and optional VIOS Security Target",
      "pdf_file_size_bytes": 2046775,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://wp.netscape.com/eng/ssl3/draft302.txt"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 156
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0461a.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.3",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0461b.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "b1d8f68dd3f9e677fa238045ac5269842a4a388e313d9d3916d7d1e89f58998d",
      "txt_hash": "2d08bd48da2d4147e7e7364a58e99439546e0f92b4d1992f2d8f753877a37789"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d949143a7d2865e2911c1a2f8a95fbb27602f523719f23884fc77d9a2b5ffc8e",
      "txt_hash": "45d60e053b54f1d8621ce7d82fbc912e6f893111110b79ae4189f8c08eb8a8b6"
    }
  },
  "status": "archived"
}