NEC Group Secure Information Exchange Site Version 1.0
CSV information ?
Status | archived |
---|---|
Valid from | 25.04.2008 |
Valid until | 07.10.2013 |
Scheme | 🇯🇵 JP |
Manufacturer | NEC Corporation |
Category | Other Devices and Systems |
Security level | ASE_OBJ.2, EAL1+, ASE_SPD.1, ASE_REQ.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL1, EAL1 augmentedClaims
T.SPOOFING, T.ILLEGAL_ACCESS, T.MISDELIVERY, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATORSecurity Assurance Requirements (SAR)
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Certificates
CRP-C0156-01, Certification No. C0156Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
Title | untitled |
---|---|
Creation date | D:20080807163541+09'00' |
Modification date | D:20080807163541+09'00' |
Pages | 21 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Extracted keywords
Protocols
SSLVendor
MicrosoftSecurity level
EAL1, EAL1+Claims
O.IDENTIFY, O.ADMIN_IDENTIFY, O.ACCESS_CONTROL, O.AUDIT, O.ENCRYPT, T.SPOOFING, T.ILLEGAL_ACCESS, T.LISTEN-IN_NW_DATA, T.MISDELIVERY, A.DATACENTER, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATOR, A.SYSTEM_ADNIN, OE.TRUSTED_ROLE, OE.NETWORK, OE.ADMIN_TRAINING, OE.DATACENTER, OE.AUTHENTICATION, OE.SEND_PIN, OE.SYSTEM_ADMIN, OE.AUDIT_ADMIN, OE.OS_TIMESTAMPSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD.1, FIA_SOS, FIA_UAU.2, FIA_UID, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_ATD.1.1, FIA_SOS.2, FIA_UAU, FIA_UAU.2.1, FIA_UID.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.1, FMT_MSA, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_ITC, FTP_TRPStandards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
Creation date | D:20080807135828+09'00' |
---|---|
Modification date | D:20080807135828+09'00' |
Pages | 72 |
Producer | SkyPDF Pro Driver Version 3.03.0100.00 |
Heuristics ?
Extracted SARs
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Scheme data ?
Cert Id | JISEC-CC-CRP-C0156 | |
---|---|---|
Supplier | NEC Corporation | |
Toe Overseas Name | ----- | |
Expiration Date | 01.10.2013 | |
Claim | EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Certification Date | 01.04.2008 | |
Toe Overseas Link | None | |
Toe Japan Name | NEC Group Secure Information Exchange Site 1.0 | |
Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html | |
Enhanced | ||
Product | NEC Group Secure Information Exchange Site | |
Toe Version | 1.0 | |
Product Type | Secure Information Exchange System | |
Cc Version | 3.1 | |
Assurance Level | EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Vendor | NEC Corporation | |
Evaluation Facility | Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security | |
Report Link | https://www.ipa.go.jp/en/security/c0156_erpt.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0156_est.pdf | |
Description | PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0156', 'expiration_date': '2013-10-01', 'claim': 'EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'certification_date': '2008-04-01', 'toe_japan_name': 'NEC Group Secure Information Exchange Site 1.0', 'enhanced': {'__update__': {'description': 'PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user'}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0156', 'supplier': 'NEC Corporation', 'toe_overseas_name': '-----', 'expiration_date': '2013-10', 'claim': 'EAL1+\n ASE_OBJ.2,\n ASE_REQ.2,\n ASE_SPD.1', 'certification_date': '2008-04', 'toe_overseas_link': None, 'toe_japan_name': 'NEC Group Secure Information\n Exchange Site\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html', 'enhanced': {'product': 'NEC Group Secure Information Exchange Site', 'toe_version': '1.0', 'product_type': 'Secure Information Exchange System', 'certification_date': '2008-04-25', 'cc_version': '3.1', 'assurance_level': 'EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'vendor': 'NEC Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0156_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0156_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: \n \n (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. \n The TOE provides the following service functions:\n \n - Upload\n - Download\n - Area Maintenance\n - User Maintenance\n - Set Personal Information \n - Administration\n \n As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. \n TOE security functions\n [Identification and Authentication] \n A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user'}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83', 'txt_hash': '2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e', 'txt_hash': '13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 320841, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/ModDate': "D:20080807163541+09'00'", '/CreationDate': "D:20080807163541+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0156-01': 1, 'Certification No. C0156': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 3, 'EAL1 augmented': 2}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.SPOOFING': 1, 'T.ILLEGAL_ACCESS': 1, 'T.MISDELIVERY': 1}, 'A': {'A.NETWORK': 1, 'A.SYSTEM_ADMIN': 1, 'A.AUDIT_ADMIN': 1, 'A.ADMINISTRATOR': 1}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
c0156_erpt.pdf
. - The st_filename property was set to
c0156_est.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0156
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_est.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NEC Group Secure Information Exchange Site Version 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "73d5a894fa2ec94b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0156",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0156",
"certification_date": "2008-04-01",
"claim": "EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"enhanced": {
"assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"cc_version": "3.1",
"description": "PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user",
"evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
"product": "NEC Group Secure Information Exchange Site",
"product_type": "Secure Information Exchange System",
"report_link": "https://www.ipa.go.jp/en/security/c0156_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0156_est.pdf",
"toe_version": "1.0",
"vendor": "NEC Corporation"
},
"expiration_date": "2013-10-01",
"supplier": "NEC Corporation",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html",
"toe_japan_name": "NEC Group Secure Information Exchange Site 1.0",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NEC Corporation",
"manufacturer_web": "https://www.nec.com/",
"name": "NEC Group Secure Information Exchange Site Version 1.0",
"not_valid_after": "2013-10-07",
"not_valid_before": "2008-04-25",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "c0156_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0156-01": 1,
"Certification No. C0156": 1
}
},
"cc_claims": {
"A": {
"A.ADMINISTRATOR": 1,
"A.AUDIT_ADMIN": 1,
"A.NETWORK": 1,
"A.SYSTEM_ADMIN": 1
},
"T": {
"T.ILLEGAL_ACCESS": 1,
"T.MISDELIVERY": 1,
"T.SPOOFING": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL1": 3,
"EAL1 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 16
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20080807163541+09\u002700\u0027",
"/ModDate": "D:20080807163541+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 320841,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 21
},
"st_filename": "c0156_est.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ADMINISTRATOR": 5,
"A.AUDIT_ADMIN": 4,
"A.DATACENTER": 4,
"A.NETWORK": 3,
"A.SYSTEM_ADMIN": 2,
"A.SYSTEM_ADNIN": 1
},
"O": {
"O.ACCESS_CONTROL": 8,
"O.ADMIN_IDENTIFY": 7,
"O.AUDIT": 12,
"O.ENCRYPT": 8,
"O.IDENTIFY": 8
},
"OE": {
"OE.ADMIN_TRAINING": 9,
"OE.AUDIT_ADMIN": 4,
"OE.AUTHENTICATION": 5,
"OE.DATACENTER": 4,
"OE.NETWORK": 4,
"OE.OS_TIMESTAMP": 9,
"OE.SEND_PIN": 5,
"OE.SYSTEM_ADMIN": 4,
"OE.TRUSTED_ROLE": 4
},
"T": {
"T.ILLEGAL_ACCESS": 2,
"T.LISTEN-IN_NW_DATA": 3,
"T.MISDELIVERY": 2,
"T.SPOOFING": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 2,
"ASE_REQ": 1,
"ASE_REQ.2": 2,
"ASE_SPD": 1,
"ASE_SPD.1": 2,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL1+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1,
"FAU_GEN.1": 14,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 12,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 8,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1
},
"FDP": {
"FDP_ACC.1": 17,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 12,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_IFC.1": 2
},
"FIA": {
"FIA_AFL": 18,
"FIA_AFL.1": 4,
"FIA_ATD.1": 10,
"FIA_ATD.1.1": 1,
"FIA_SOS": 21,
"FIA_SOS.2": 4,
"FIA_UAU": 1,
"FIA_UAU.1": 8,
"FIA_UAU.2": 8,
"FIA_UAU.2.1": 1,
"FIA_UID": 29,
"FIA_UID.1": 7,
"FIA_UID.2": 4,
"FIA_USB.1": 7,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 27,
"FMT_MSA.1": 16,
"FMT_MSA.1.1": 1,
"FMT_MSA.3": 7,
"FMT_SAE.1": 14,
"FMT_SAE.1.1": 1,
"FMT_SAE.1.2": 1,
"FMT_SMF.1": 9,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 26,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 10
},
"FTP": {
"FTP_ITC": 1,
"FTP_TRP": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 11
}
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 16
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20080807135828+09\u002700\u0027",
"/ModDate": "D:20080807135828+09\u002700\u0027",
"/Producer": "SkyPDF Pro Driver Version 3.03.0100.00",
"pdf_file_size_bytes": 491338,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 72
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"ASE_SPD.1",
"ASE_OBJ.2",
"EAL1+",
"ASE_REQ.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_est.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83",
"txt_hash": "2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e",
"txt_hash": "13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136"
}
},
"status": "archived"
}