Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329

CSV information ?

Status archived
Valid from 05.09.2016
Valid until 05.09.2021
Scheme 🇳🇴 NO
Manufacturer FeliCa Networks, Inc
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4

Heuristics summary ?

Certificate ID: SERTIT-082

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES

CPLC
IC Type
Vendor
Samsung

Security level
EAL 4+, EAL 2, EAL 4, EAL1, EAL7, EAL4
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_IND, AVA_VAN.4, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_REQ.2, ASE_SPD.1, ASE_OBJ.2, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FCS_RNG.1, FDP_ACC.1, FDP_ACF.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FMT_SMR.1, FMT_MSA.1, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1
Protection profiles
BSI-PP-0035
Certificates
SERTIT-082
Evaluation facilities
Brightsight

Side-channel analysis
JIL

Standards
ISO/IEC 15408, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003, CCMB-2012-09-004

File metadata

Title tittel
Keywords ugradert
Author Wei Yuan
Creation date D:20160905104804Z00'00'
Modification date D:20160905104804Z00'00'
Pages 21
Creator Microsoft® Word 2010
Producer Mac OS X 10.11.6 Quartz PDFContext

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES
Randomness
DTRNG, RND
Libraries
NSS

Vendor
Samsung

Security level
EAL4
Claims
O.AC, O.SC, O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_DVS.1, ATE_DPT.2, ATE_FUN.1, AVA_VAN.4, AVA_VAN
Security Functional Requirements (SFR)
FAU_SAS, FAU_SAS.1, FAU_SAS.1.1, FCS_RNG, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_ITT.1.1, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MSA.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1, FMT_LIM.1.1, FMT_LIM.2, FMT_LIM.2.1, FMT_MSA.3, FPT_FLS.1, FPT_FLS.1.1, FPT_PHP.3, FPT_PHP.3.1, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FRU_FLT.2.1, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0035
Certificates
BSI-DSZ-CC-0882

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Malfunction, malfunction
Certification process
out of scope, main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following

Standards
AIS 31

File metadata

Author FeliCa Networks, Inc
Creation date D:20160818133615+09'00'
Modification date D:20160818134717+09'00'
Pages 35
Creator Word 用 Acrobat PDFMaker 11
Producer Adobe PDF Library 11.0

Heuristics ?

Certificate ID: SERTIT-082

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4

Scheme data ?

Product Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329
Url https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-s3cs9ab-0114-5329
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Developer FeliCa Networks, Inc.
Certification Date 05.09.2016
Enhanced
Description The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Samsung Electronics Co., Ltd chip S3CS9AB.
Cert Id SERTIT-082
Mutual Recognition CCRA, SOG-IS
Product Software: Mobile FeliCa OS Version 3.0 0114_5329; Hardware: S3CS9AB 32-Bit RISC Microcontroller for Smart Card 0
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Sponsor FeliCa Networks, Inc.
Developer FeliCa Networks, Inc.
Evaluation Facility Brightsight B.V.
Certification Date 05.09.2016
Level EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
Documents frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135073-1607952767/SERTIT/Sertifikater/2016/82/%5BSTP-S%5D%20F03S-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135076-1607952771/SERTIT/Sertifikater/2016/82/SERTIT-082%20CR%201.0.pdf'})]})

References ?

No references are available for this certificate.

Updates ?

  • 05.02.2025 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The st property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.
    • The cert property was updated, with the {'_type': 'sec_certs.sample.document_state.DocumentState'} data.

    The computed heuristics were updated.

    • The following values were inserted: {'protection_profiles': None, 'eal': 'EAL4+'}.
    • The prev_certificates property was set to None.
    • The next_certificates property was set to None.
  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'certification_date': '2016-09-05', 'enhanced': {'__insert__': {'cert_id': 'SERTIT-082'}, '__update__': {'certification_date': '2016-09-05'}, '__delete__': ['id']}} data.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a56686290e2b970d6469abc56bdb984563d33ffd857d764f943a0581ca57451b', 'txt_hash': 'bf55c83e69e33e4072dddf203870303c67892d209a24a380e4e495c5e6bfe966'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'f5ec262aa900b621c062e50fa5859c3a2943f70143073206ed21fcefa31b93d8', 'txt_hash': '1c464478c3786c9ddf996e20142d728d5df3ae3cbe204906852a05b9cc6a20c0'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 1408292, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/Title': 'tittel', '/Author': 'Wei Yuan', '/Producer': 'Mac OS X 10.11.6 Quartz PDFContext', '/Creator': 'Microsoft® Word 2010', '/CreationDate': "D:20160905104804Z00'00'", '/ModDate': "D:20160905104804Z00'00'", '/Keywords': 'ugradert', '/AAPL:Keywords': "['ugradert']", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 366825, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 35, '/Author': 'FeliCa Networks, Inc', '/ChipVendor': 'Samsung', '/Company': 'FeliCa Networks, Inc', '/CreationDate': "D:20160818133615+09'00'", '/Creator': 'Word 用 Acrobat PDFMaker 11', '/DocName': 'Security Target for Mobile FeliCa OS 3.0 on S3CS9AB', '/DocNumber': 'F03S-ASEP01-E01-70', '/DocVersion': '1.70', '/IssueDate': 'August 2016', '/ModDate': "D:20160818134717+09'00'", '/ModelName': 'S3CS9AB', '/Producer': 'Adobe PDF Library 11.0', '/ProductName': 'Mobile FeliCa OS 3.0 on S3CS9AB', '/ProductType': 'Mobile FeliCa IC Chip', '/SourceModified': 'D:20160818042422', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'NO': {'SERTIT-082': 19}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL 4+': 19, 'EAL 2': 1, 'EAL 4': 2, 'EAL1': 1, 'EAL7': 1, 'EAL4': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR': 1, 'ALC_DVS.2': 4, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 4, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.4': 4}, 'ASE': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RNG.1': 3}, 'FDP': {'FDP_ACC.1': 1, 'FDP_ACF.1': 1, 'FDP_SDI.2': 1, 'FDP_ITT.1': 1, 'FDP_IFC.1': 1}, 'FIA': {'FIA_UID.1': 1, 'FIA_UAU.1': 1, 'FIA_UAU.4': 1}, 'FMT': {'FMT_SMR.1': 1, 'FMT_MSA.1': 1, 'FMT_SMF.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_PHP.3': 1, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 1}, 'FTP': {'FTP_ITC.1': 1}}, 'cc_claims': {}, 'vendor': {'Samsung': {'Samsung': 4}}, 'eval_facility': {'BrightSight': {'Brightsight': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 5}}, 'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {'ICType': {'IC Type': 1}}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 4}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1, 'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0882': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 23}}, 'cc_security_level': {'EAL': {'EAL4': 7}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 4, 'ADV_TDS.3': 3, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 1}, 'ALC': {'ALC_DVS.2': 6, 'ALC_DVS.1': 1}, 'ATE': {'ATE_DPT.2': 6, 'ATE_FUN.1': 2}, 'AVA': {'AVA_VAN.4': 6, 'AVA_VAN': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS': 1, 'FAU_SAS.1': 3, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG': 1, 'FCS_RNG.1': 4, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1}, 'FDP': {'FDP_ACC.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.2': 4, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 6, 'FDP_ITT.1.1': 1, 'FDP_IFC.1': 8, 'FDP_IFC.1.1': 1, 'FDP_IFF.1': 1}, 'FIA': {'FIA_UID.1': 6, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 4, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 4, 'FIA_UAU.4.1': 1}, 'FMT': {'FMT_SMR.1': 7, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MSA.1': 5, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 4, 'FMT_SMF.1.1': 1, 'FMT_LIM.1': 5, 'FMT_LIM.1.1': 1, 'FMT_LIM.2': 5, 'FMT_LIM.2.1': 1, 'FMT_MSA.3': 3}, 'FPT': {'FPT_FLS.1': 8, 'FPT_FLS.1.1': 1, 'FPT_PHP.3': 7, 'FPT_PHP.3.1': 1, 'FPT_ITT.1': 6, 'FPT_ITT.1.1': 1}, 'FRU': {'FRU_FLT.2': 7, 'FRU_FLT.2.1': 1}, 'FTP': {'FTP_ITC.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AC': 18, 'O.SC': 13, 'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {'Samsung': {'Samsung': 9}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 9}}, 'DES': {'DES': {'DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'DTRNG': 2}, 'RNG': {'RND': 7}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'NSS': {'NSS': 2}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 10, 'Physical Probing': 2, 'physical probing': 4}, 'FI': {'Malfunction': 10, 'malfunction': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 31': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following': 1}}}.
    • The report_filename property was set to SERTIT-082 CR 1.0.pdf.
    • The st_filename property was set to [STP-S] F03S-ASEP01-E01-70.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to SERTIT-082.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-082%20CR%201.0.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-S]%20F03S-ASEP01-E01-70.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "459fd0c8cc4aea97",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "SERTIT-082",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
      "certification_date": "2016-09-05",
      "developer": "FeliCa Networks, Inc.",
      "enhanced": {
        "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
        "cert_id": "SERTIT-082",
        "certification_date": "2016-09-05",
        "description": "The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Samsung Electronics Co., Ltd chip S3CS9AB.",
        "developer": "FeliCa Networks, Inc.",
        "documents": {
          "report": [
            {
              "href": "https://sertit.no/getfile.php/135076-1607952771/SERTIT/Sertifikater/2016/82/SERTIT-082%20CR%201.0.pdf"
            }
          ],
          "target": [
            {
              "href": "https://sertit.no/getfile.php/135073-1607952767/SERTIT/Sertifikater/2016/82/%5BSTP-S%5D%20F03S-ASEP01-E01-70.pdf"
            }
          ]
        },
        "evaluation_facility": "Brightsight B.V.",
        "level": "EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4",
        "mutual_recognition": "CCRA, SOG-IS",
        "product": "Software: Mobile FeliCa OS Version 3.0 0114_5329; Hardware: S3CS9AB 32-Bit RISC Microcontroller for Smart Card 0",
        "sponsor": "FeliCa Networks, Inc."
      },
      "product": "Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329",
      "url": "https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-s3cs9ab-0114-5329"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "FeliCa Networks, Inc",
  "manufacturer_web": "https://https://www.felicanetworks.co.jp/en/",
  "name": "Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329",
  "not_valid_after": "2021-09-05",
  "not_valid_before": "2016-09-05",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "SERTIT-082 CR 1.0.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NO": {
          "SERTIT-082": 19
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 4,
          "ALC_FLR": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV.2": 1,
          "ATE_DPT.2": 4,
          "ATE_FUN.1": 1,
          "ATE_IND": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 4": 2,
          "EAL 4+": 19,
          "EAL1": 1,
          "EAL4": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 4
        },
        "FCS": {
          "FCS_RNG.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 1,
          "FDP_ACF.1": 1,
          "FDP_IFC.1": 1,
          "FDP_ITT.1": 1,
          "FDP_SDI.2": 1
        },
        "FIA": {
          "FIA_UAU.1": 1,
          "FIA_UAU.4": 1,
          "FIA_UID.1": 1
        },
        "FMT": {
          "FMT_LIM.1": 1,
          "FMT_LIM.2": 1,
          "FMT_MSA.1": 1,
          "FMT_SMF.1": 1,
          "FMT_SMR.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 1,
          "FPT_ITT.1": 1,
          "FPT_PHP.3": 1
        },
        "FRU": {
          "FRU_FLT.2": 1
        },
        "FTP": {
          "FTP_ITC.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {
        "ICType": {
          "IC Type": 1
        }
      },
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1,
          "CCMB-2012-09-004": 1
        },
        "ISO": {
          "ISO/IEC 15408": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 5
          }
        },
        "DES": {
          "DES": {
            "DES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/AAPL:Keywords": "[\u0027ugradert\u0027]",
      "/Author": "Wei Yuan",
      "/CreationDate": "D:20160905104804Z00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/Keywords": "ugradert",
      "/ModDate": "D:20160905104804Z00\u002700\u0027",
      "/Producer": "Mac OS X 10.11.6 Quartz PDFContext",
      "/Title": "tittel",
      "pdf_file_size_bytes": 1408292,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "[STP-S] F03S-ASEP01-E01-70.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0882": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AC": 18,
          "O.RND": 4,
          "O.SC": 13
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 23
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 4,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 6
        },
        "ATE": {
          "ATE_DPT.2": 6,
          "ATE_FUN.1": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.4": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 7
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 3,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_RNG": 1,
          "FCS_RNG.1": 4,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 8,
          "FDP_IFC.1.1": 1,
          "FDP_IFF.1": 1,
          "FDP_ITT.1": 6,
          "FDP_ITT.1.1": 1,
          "FDP_SDI.2": 4,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 4,
          "FIA_UAU.4.1": 1,
          "FIA_UID.1": 6,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 5,
          "FMT_LIM.1.1": 1,
          "FMT_LIM.2": 5,
          "FMT_LIM.2.1": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 3,
          "FMT_SMF.1": 4,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_ITT.1": 6,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 7,
          "FRU_FLT.2.1": 1
        },
        "FTP": {
          "FTP_ITC.1": 4,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "NSS": {
          "NSS": 2
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7
        },
        "TRNG": {
          "DTRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "malfunction": 3
        },
        "SCA": {
          "Leak-Inherent": 10,
          "Physical Probing": 2,
          "physical probing": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 31": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 9
          }
        },
        "DES": {
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 9
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "FeliCa Networks, Inc",
      "/ChipVendor": "Samsung",
      "/Company": "FeliCa Networks, Inc",
      "/CreationDate": "D:20160818133615+09\u002700\u0027",
      "/Creator": "Word \u7528 Acrobat PDFMaker 11",
      "/DocName": "Security Target for Mobile FeliCa OS 3.0 on S3CS9AB",
      "/DocNumber": "F03S-ASEP01-E01-70",
      "/DocVersion": "1.70",
      "/IssueDate": "August 2016",
      "/ModDate": "D:20160818134717+09\u002700\u0027",
      "/ModelName": "S3CS9AB",
      "/Producer": "Adobe PDF Library 11.0",
      "/ProductName": "Mobile FeliCa OS 3.0 on S3CS9AB",
      "/ProductType": "Mobile FeliCa IC Chip",
      "/SourceModified": "D:20160818042422",
      "pdf_file_size_bytes": 366825,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 35
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-082%20CR%201.0.pdf",
  "scheme": "NO",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "ATE_DPT.2",
      "AVA_VAN.4",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-S]%20F03S-ASEP01-E01-70.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a56686290e2b970d6469abc56bdb984563d33ffd857d764f943a0581ca57451b",
      "txt_hash": "bf55c83e69e33e4072dddf203870303c67892d209a24a380e4e495c5e6bfe966"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f5ec262aa900b621c062e50fa5859c3a2943f70143073206ed21fcefa31b93d8",
      "txt_hash": "1c464478c3786c9ddf996e20142d728d5df3ae3cbe204906852a05b9cc6a20c0"
    }
  },
  "status": "archived"
}