Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329
CSV information ?
Status | archived |
---|---|
Valid from | 05.09.2016 |
Valid until | 05.09.2021 |
Scheme | 🇳🇴 NO |
Manufacturer | FeliCa Networks, Inc |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DESCPLC
IC TypeVendor
SamsungSecurity level
EAL 4+, EAL 2, EAL 4, EAL1, EAL7, EAL4Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_IND, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FMT_SMR.1, FMT_MSA.1, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1Protection profiles
BSI-PP-0035Certificates
SERTIT-082Evaluation facilities
BrightsightSide-channel analysis
JILStandards
ISO/IEC 15408, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004File metadata
Title | tittel |
---|---|
Keywords | ugradert |
Author | Wei Yuan |
Creation date | D:20160905104804Z00'00' |
Modification date | D:20160905104804Z00'00' |
Pages | 21 |
Creator | Microsoft® Word 2010 |
Producer | Mac OS X 10.11.6 Quartz PDFContext |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DESRandomness
DTRNG, RNDLibraries
NSSVendor
SamsungSecurity level
EAL4Claims
O.AC, O.SC, O.RND, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS.1, ATE_DPT.2, ATE_FUN.1, AVA_VAN.4, AVA_VANSecurity Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_MSA.3, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0882Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Malfunction, malfunctionCertification process
out of scope, main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the followingStandards
AIS 31File metadata
Author | FeliCa Networks, Inc |
---|---|
Creation date | D:20160818133615+09'00' |
Modification date | D:20160818134717+09'00' |
Pages | 35 |
Creator | Word 用 Acrobat PDFMaker 11 |
Producer | Adobe PDF Library 11.0 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4Scheme data ?
Product | Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329 | |
---|---|---|
Url | https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-s3cs9ab-0114-5329 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Developer | FeliCa Networks, Inc. | |
Certification Date | 05.09.2016 | |
Enhanced | ||
Description | The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Samsung Electronics Co., Ltd chip S3CS9AB. | |
Cert Id | SERTIT-082 | |
Mutual Recognition | CCRA, SOG-IS | |
Product | Software: Mobile FeliCa OS Version 3.0 0114_5329; Hardware: S3CS9AB 32-Bit RISC Microcontroller for Smart Card 0 | |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems | |
Sponsor | FeliCa Networks, Inc. | |
Developer | FeliCa Networks, Inc. | |
Evaluation Facility | Brightsight B.V. | |
Certification Date | 05.09.2016 | |
Level | EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4 | |
Documents | frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135073-1607952767/SERTIT/Sertifikater/2016/82/%5BSTP-S%5D%20F03S-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135076-1607952771/SERTIT/Sertifikater/2016/82/SERTIT-082%20CR%201.0.pdf'})]}) |
References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL4+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'certification_date': '2016-09-05', 'enhanced': {'__insert__': {'cert_id': 'SERTIT-082'}, '__update__': {'certification_date': '2016-09-05'}, '__delete__': ['id']}}
data.
- The scheme_data property was updated, with the
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a56686290e2b970d6469abc56bdb984563d33ffd857d764f943a0581ca57451b', 'txt_hash': 'bf55c83e69e33e4072dddf203870303c67892d209a24a380e4e495c5e6bfe966'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f5ec262aa900b621c062e50fa5859c3a2943f70143073206ed21fcefa31b93d8', 'txt_hash': '1c464478c3786c9ddf996e20142d728d5df3ae3cbe204906852a05b9cc6a20c0'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1408292, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'tittel', '/Author': 'Wei Yuan', '/Producer': 'Mac OS X 10.11.6 Quartz PDFContext', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20160905104804Z00'00'", '/ModDate': "D:20160905104804Z00'00'", '/Keywords': 'ugradert', '/AAPL:Keywords': "['ugradert']", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 366825, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 35, '/Author': 'FeliCa Networks, Inc', '/ChipVendor': 'Samsung', '/Company': 'FeliCa Networks, Inc', '/CreationDate': "D:20160818133615+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 11', '/DocName': 'Security Target for Mobile FeliCa OS 3.0 on S3CS9AB', '/DocNumber': 'F03S-ASEP01-E01-70', '/DocVersion': '1.70', '/IssueDate': 'August 2016', '/ModDate': "D:20160818134717+09'00'", '/ModelName': 'S3CS9AB', '/Producer': 'Adobe PDF Library 11.0', '/ProductName': 'Mobile FeliCa OS 3.0 on S3CS9AB', '/ProductType': 'Mobile FeliCa IC Chip', '/SourceModified': 'D:20160818042422', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'NO': {'SERTIT-082': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL 4+': 19, 'EAL 2': 1, 'EAL 4': 2, 'EAL1': 1, 'EAL7': 1, 'EAL4': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RNG.1': 3}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.4': 1}, 'FMT': {'FMT_SMR.1': 1, 'FMT_MSA.1': 1, 'FMT_SMF.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 4}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 4}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0882': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 23}}, 'cc_security_level': {'EAL': {'EAL4': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_TDS.3': 3, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS.1': 1}, 'ATE': {'ATE_DPT.2': 6, 'ATE_FUN.1': 2}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 1, 'FAU_SAS.1': 3, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG': 1, 'FCS_RNG.1': 4, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.2': 4, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 6, 'FDP_ITT.1.1': 1, 'FDP_IFC.1': 8, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 1}, 'FIA': {'FIA_UID.1': 6, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 4, 'FIA_UAU.4.1': 1}, 'FMT': {'FMT_SMR.1': 7, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 5, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_LIM.1': 5, 'FMT_LIM.1.1': 1, 'FMT_LIM.2': 5, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 3}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 7, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 6, 'FPT_ITT.1.1': 1}, 'FRU': {'FRU_FLT.2': 7, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AC': 18, 'O.SC': 13, 'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Samsung': {'Samsung': 9}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'DTRNG': 2}, 'RNG': {'RND': 7}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'NSS': {'NSS': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 10, 'Physical Probing': 2, 'physical probing': 4}, 'FI': {'Malfunction': 10, 'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following': 1}}}
. - The report_filename property was set to
SERTIT-082 CR 1.0.pdf
. - The st_filename property was set to
[STP-S] F03S-ASEP01-E01-70.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
SERTIT-082
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-082%20CR%201.0.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-S]%20F03S-ASEP01-E01-70.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "459fd0c8cc4aea97",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "SERTIT-082",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"3.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"certification_date": "2016-09-05",
"developer": "FeliCa Networks, Inc.",
"enhanced": {
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_id": "SERTIT-082",
"certification_date": "2016-09-05",
"description": "The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Samsung Electronics Co., Ltd chip S3CS9AB.",
"developer": "FeliCa Networks, Inc.",
"documents": {
"report": [
{
"href": "https://sertit.no/getfile.php/135076-1607952771/SERTIT/Sertifikater/2016/82/SERTIT-082%20CR%201.0.pdf"
}
],
"target": [
{
"href": "https://sertit.no/getfile.php/135073-1607952767/SERTIT/Sertifikater/2016/82/%5BSTP-S%5D%20F03S-ASEP01-E01-70.pdf"
}
]
},
"evaluation_facility": "Brightsight B.V.",
"level": "EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4",
"mutual_recognition": "CCRA, SOG-IS",
"product": "Software: Mobile FeliCa OS Version 3.0 0114_5329; Hardware: S3CS9AB 32-Bit RISC Microcontroller for Smart Card 0",
"sponsor": "FeliCa Networks, Inc."
},
"product": "Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329",
"url": "https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-s3cs9ab-0114-5329"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "FeliCa Networks, Inc",
"manufacturer_web": "https://https://www.felicanetworks.co.jp/en/",
"name": "Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329",
"not_valid_after": "2021-09-05",
"not_valid_before": "2016-09-05",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "SERTIT-082 CR 1.0.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NO": {
"SERTIT-082": 19
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 2
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.2": 4,
"ALC_FLR": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.2": 4,
"ATE_FUN.1": 1,
"ATE_IND": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 4
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1,
"EAL 4": 2,
"EAL 4+": 19,
"EAL1": 1,
"EAL4": 1,
"EAL7": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_RNG.1": 3
},
"FDP": {
"FDP_ACC.1": 1,
"FDP_ACF.1": 1,
"FDP_IFC.1": 1,
"FDP_ITT.1": 1,
"FDP_SDI.2": 1
},
"FIA": {
"FIA_UAU.1": 1,
"FIA_UAU.4": 1,
"FIA_UID.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 1,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1
},
"FRU": {
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {
"ICType": {
"IC Type": 1
}
},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 2
}
},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1,
"CCMB-2012-09-004": 1
},
"ISO": {
"ISO/IEC 15408": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 5
}
},
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 4
}
},
"vulnerability": {}
},
"report_metadata": {
"/AAPL:Keywords": "[\u0027ugradert\u0027]",
"/Author": "Wei Yuan",
"/CreationDate": "D:20160905104804Z00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2010",
"/Keywords": "ugradert",
"/ModDate": "D:20160905104804Z00\u002700\u0027",
"/Producer": "Mac OS X 10.11.6 Quartz PDFContext",
"/Title": "tittel",
"pdf_file_size_bytes": 1408292,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "[STP-S] F03S-ASEP01-E01-70.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0882": 1
}
},
"cc_claims": {
"O": {
"O.AC": 18,
"O.RND": 4,
"O.SC": 13
},
"T": {
"T.RND": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 23
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 4,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 3
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_DVS.2": 6
},
"ATE": {
"ATE_DPT.2": 6,
"ATE_FUN.1": 2
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL4": 7
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS": 1,
"FAU_SAS.1": 3,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_RNG": 1,
"FCS_RNG.1": 4,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC.1": 12,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 6,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 8,
"FDP_IFC.1.1": 1,
"FDP_IFF.1": 1,
"FDP_ITT.1": 6,
"FDP_ITT.1.1": 1,
"FDP_SDI.2": 4,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FIA": {
"FIA_UAU.1": 4,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 4,
"FIA_UAU.4.1": 1,
"FIA_UID.1": 6,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_LIM.1": 5,
"FMT_LIM.1.1": 1,
"FMT_LIM.2": 5,
"FMT_LIM.2.1": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 3,
"FMT_SMF.1": 4,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 6,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 7,
"FPT_PHP.3.1": 1
},
"FRU": {
"FRU_FLT.2": 7,
"FRU_FLT.2.1": 1
},
"FTP": {
"FTP_ITC.1": 4,
"FTP_ITC.1.1": 1,
"FTP_ITC.1.2": 1,
"FTP_ITC.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"NSS": {
"NSS": 2
}
},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 7
},
"TRNG": {
"DTRNG": 2
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 10,
"malfunction": 3
},
"SCA": {
"Leak-Inherent": 10,
"Physical Probing": 2,
"physical probing": 4
}
},
"standard_id": {
"BSI": {
"AIS 31": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9
}
},
"DES": {
"DES": {
"DES": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "FeliCa Networks, Inc",
"/ChipVendor": "Samsung",
"/Company": "FeliCa Networks, Inc",
"/CreationDate": "D:20160818133615+09\u002700\u0027",
"/Creator": "Word \u7528 Acrobat PDFMaker 11",
"/DocName": "Security Target for Mobile FeliCa OS 3.0 on S3CS9AB",
"/DocNumber": "F03S-ASEP01-E01-70",
"/DocVersion": "1.70",
"/IssueDate": "August 2016",
"/ModDate": "D:20160818134717+09\u002700\u0027",
"/ModelName": "S3CS9AB",
"/Producer": "Adobe PDF Library 11.0",
"/ProductName": "Mobile FeliCa OS 3.0 on S3CS9AB",
"/ProductType": "Mobile FeliCa IC Chip",
"/SourceModified": "D:20160818042422",
"pdf_file_size_bytes": 366825,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 35
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-082%20CR%201.0.pdf",
"scheme": "NO",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"ATE_DPT.2",
"AVA_VAN.4",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-S]%20F03S-ASEP01-E01-70.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a56686290e2b970d6469abc56bdb984563d33ffd857d764f943a0581ca57451b",
"txt_hash": "bf55c83e69e33e4072dddf203870303c67892d209a24a380e4e495c5e6bfe966"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "f5ec262aa900b621c062e50fa5859c3a2943f70143073206ed21fcefa31b93d8",
"txt_hash": "1c464478c3786c9ddf996e20142d728d5df3ae3cbe204906852a05b9cc6a20c0"
}
},
"status": "archived"
}