NEC Group Secure Information Exchange Site Version 1.0

CSV information ?

Status archived
Valid from 25.04.2008
Valid until 07.10.2013
Scheme 🇯🇵 JP
Manufacturer NEC Corporation
Category Other Devices and Systems
Security level ASE_OBJ.2, EAL1+, ASE_SPD.1, ASE_REQ.2

Heuristics summary ?

Certificate ID: JISEC-CC-CRP-C0156

Certificate ?

Certification report ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL1, EAL1 augmented
Claims
T.SPOOFING, T.ILLEGAL_ACCESS, T.MISDELIVERY, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATOR
Security Assurance Requirements (SAR)
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Certificates
CRP-C0156-01, Certification No. C0156

Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004

File metadata

Title untitled
Creation date D:20080807163541+09'00'
Modification date D:20080807163541+09'00'
Pages 21
Producer Acrobat Distiller 6.0 (Windows)

Security target ?

Extracted keywords

Protocols
SSL

Vendor
Microsoft

Security level
EAL1, EAL1+
Claims
O.IDENTIFY, O.ADMIN_IDENTIFY, O.ACCESS_CONTROL, O.AUDIT, O.ENCRYPT, T.SPOOFING, T.ILLEGAL_ACCESS, T.LISTEN-IN_NW_DATA, T.MISDELIVERY, A.DATACENTER, A.NETWORK, A.SYSTEM_ADMIN, A.AUDIT_ADMIN, A.ADMINISTRATOR, A.SYSTEM_ADNIN, OE.TRUSTED_ROLE, OE.NETWORK, OE.ADMIN_TRAINING, OE.DATACENTER, OE.AUTHENTICATION, OE.SEND_PIN, OE.SYSTEM_ADMIN, OE.AUDIT_ADMIN, OE.OS_TIMESTAMP
Security Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSS
Security Functional Requirements (SFR)
FAU_GEN, FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.2, FAU_SAR.1, FAU_SAR.2, FAU_SAR.3, FAU_GEN.1.2, FAU_GEN.2.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_SAR.3.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FIA_AFL, FIA_ATD.1, FIA_SOS, FIA_UAU.2, FIA_UID, FIA_USB.1, FIA_UID.1, FIA_UAU.1, FIA_AFL.1, FIA_ATD.1.1, FIA_SOS.2, FIA_UAU, FIA_UAU.2.1, FIA_UID.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MSA.1, FMT_MSA, FMT_SAE.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1.1, FMT_SAE.1.1, FMT_SAE.1.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FTP_ITC, FTP_TRP

Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004

File metadata

Creation date D:20080807135828+09'00'
Modification date D:20080807135828+09'00'
Pages 72
Producer SkyPDF Pro Driver Version 3.03.0100.00

Heuristics ?

Certificate ID: JISEC-CC-CRP-C0156

Extracted SARs

ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1

Scheme data ?

Cert Id JISEC-CC-CRP-C0156
Supplier NEC Corporation
Toe Overseas Name -----
Expiration Date 01.10.2013
Claim EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Certification Date 01.04.2008
Toe Overseas Link None
Toe Japan Name NEC Group Secure Information Exchange Site 1.0
Toe Japan Link https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html
Enhanced
Product NEC Group Secure Information Exchange Site
Toe Version 1.0
Product Type Secure Information Exchange System
Cc Version 3.1
Assurance Level EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Vendor NEC Corporation
Evaluation Facility Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
Report Link https://www.ipa.go.jp/en/security/c0156_erpt.pdf
Target Link https://www.ipa.go.jp/en/security/c0156_est.pdf
Description PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user

References ?

No references are available for this certificate.

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was updated, with the {'cert_id': 'JISEC-CC-CRP-C0156', 'expiration_date': '2013-10-01', 'claim': 'EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'certification_date': '2008-04-01', 'toe_japan_name': 'NEC Group Secure Information Exchange Site 1.0', 'enhanced': {'__update__': {'description': 'PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user'}, '__delete__': ['certification_date']}} data.
  • 14.10.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'cert_id': 'C0156', 'supplier': 'NEC Corporation', 'toe_overseas_name': '-----', 'expiration_date': '2013-10', 'claim': 'EAL1+\n ASE_OBJ.2,\n ASE_REQ.2,\n ASE_SPD.1', 'certification_date': '2008-04', 'toe_overseas_link': None, 'toe_japan_name': 'NEC Group Secure Information\n Exchange Site\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html', 'enhanced': {'product': 'NEC Group Secure Information Exchange Site', 'toe_version': '1.0', 'product_type': 'Secure Information Exchange System', 'certification_date': '2008-04-25', 'cc_version': '3.1', 'assurance_level': 'EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'vendor': 'NEC Corporation', 'evaluation_facility': 'Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security', 'report_link': 'https://www.ipa.go.jp/en/security/c0156_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0156_est.pdf', 'description': 'PRODUCT DESCRIPTION \n Description of TOE \n This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: \n \n (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. \n The TOE provides the following service functions:\n \n - Upload\n - Download\n - Area Maintenance\n - User Maintenance\n - Set Personal Information \n - Administration\n \n As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. \n TOE security functions\n [Identification and Authentication] \n A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user'}}.
  • 30.09.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to None.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83', 'txt_hash': '2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e', 'txt_hash': '13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 320841, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 21, '/ModDate': "D:20080807163541+09'00'", '/CreationDate': "D:20080807163541+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 491338, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 72, '/CreationDate': "D:20080807135828+09'00'", '/ModDate': "D:20080807135828+09'00'", '/Producer': 'SkyPDF Pro Driver Version 3.03.0100.00', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'JP': {'CRP-C0156-01': 1, 'Certification No. C0156': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 3, 'EAL1 augmented': 2}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.SPOOFING': 1, 'T.ILLEGAL_ACCESS': 1, 'T.MISDELIVERY': 1}, 'A': {'A.NETWORK': 1, 'A.SYSTEM_ADMIN': 1, 'A.AUDIT_ADMIN': 1, 'A.ADMINISTRATOR': 1}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1, 'EAL1+': 1}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1, 'FAU_GEN.1': 14, 'FAU_GEN.1.1': 1, 'FAU_GEN.2': 8, 'FAU_SAR.1': 12, 'FAU_SAR.2': 8, 'FAU_SAR.3': 8, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2.1': 1, 'FAU_SAR.3.1': 1}, 'FDP': {'FDP_ACC.1': 17, 'FDP_ACF.1': 12, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC.1': 2}, 'FIA': {'FIA_AFL': 18, 'FIA_ATD.1': 10, 'FIA_SOS': 21, 'FIA_UAU.2': 8, 'FIA_UID': 29, 'FIA_USB.1': 7, 'FIA_UID.1': 7, 'FIA_UAU.1': 8, 'FIA_AFL.1': 4, 'FIA_ATD.1.1': 1, 'FIA_SOS.2': 4, 'FIA_UAU': 1, 'FIA_UAU.2.1': 1, 'FIA_UID.2': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MSA.1': 16, 'FMT_MSA': 27, 'FMT_SAE.1': 14, 'FMT_SMF.1': 9, 'FMT_SMR.1': 26, 'FMT_MSA.3': 7, 'FMT_MSA.1.1': 1, 'FMT_SAE.1.1': 1, 'FMT_SAE.1.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 10}, 'FTP': {'FTP_ITC': 1, 'FTP_TRP': 1}}, 'cc_claims': {'O': {'O.IDENTIFY': 8, 'O.ADMIN_IDENTIFY': 7, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 12, 'O.ENCRYPT': 8}, 'T': {'T.SPOOFING': 3, 'T.ILLEGAL_ACCESS': 2, 'T.LISTEN-IN_NW_DATA': 3, 'T.MISDELIVERY': 2}, 'A': {'A.DATACENTER': 4, 'A.NETWORK': 3, 'A.SYSTEM_ADMIN': 2, 'A.AUDIT_ADMIN': 4, 'A.ADMINISTRATOR': 5, 'A.SYSTEM_ADNIN': 1}, 'OE': {'OE.TRUSTED_ROLE': 4, 'OE.NETWORK': 4, 'OE.ADMIN_TRAINING': 9, 'OE.DATACENTER': 4, 'OE.AUTHENTICATION': 5, 'OE.SEND_PIN': 5, 'OE.SYSTEM_ADMIN': 4, 'OE.AUDIT_ADMIN': 4, 'OE.OS_TIMESTAMP': 9}}, 'vendor': {'Microsoft': {'Microsoft': 16}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 11}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to c0156_erpt.pdf.
    • The st_filename property was set to c0156_est.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to JISEC-CC-CRP-C0156.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_erpt.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_est.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NEC Group Secure Information Exchange Site Version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": null,
  "dgst": "73d5a894fa2ec94b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "JISEC-CC-CRP-C0156",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "cert_id": "JISEC-CC-CRP-C0156",
      "certification_date": "2008-04-01",
      "claim": "EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
      "enhanced": {
        "assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
        "cc_version": "3.1",
        "description": "PRODUCT DESCRIPTION Description of TOE This TOE is the business data exchange system that provides services for preventing the miss-delivery of business data and the information leakage in communications between internal users and customers. The basic operation of the TOE is as follows: (1) An employee of NEC Group first creates an Area that is an administered data storage area, and then creates a folder in that Area. (2) An internal user or a customer uploads business data to that folder. (3) The uploaded data is then downloaded by internal users or customers for their business use. The TOE provides the following service functions: - Upload - Download - Area Maintenance - User Maintenance - Set Personal Information - Administration As security functions, the TOE protects the business data to be exchanged by the TOE from unauthorized access, miss-delivery and information leakage. It also collects audit logs. TOE security functions [Identification and Authentication] A function to identify and authenticate the users of the TOE [Access Control] A function to control access to the business data based on the user roles of the TOE [Auditing] A function to generate and view the audit trail of the TOE [Cryptography] A function to encrypt and decrypt the communication data between the TOE and a user",
        "evaluation_facility": "Mizuho Information \u0026 Research Institute, Inc. Center for Evaluation of Information Security",
        "product": "NEC Group Secure Information Exchange Site",
        "product_type": "Secure Information Exchange System",
        "report_link": "https://www.ipa.go.jp/en/security/c0156_erpt.pdf",
        "target_link": "https://www.ipa.go.jp/en/security/c0156_est.pdf",
        "toe_version": "1.0",
        "vendor": "NEC Corporation"
      },
      "expiration_date": "2013-10-01",
      "supplier": "NEC Corporation",
      "toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0156_it7168.html",
      "toe_japan_name": "NEC Group Secure Information Exchange Site 1.0",
      "toe_overseas_link": null,
      "toe_overseas_name": "-----"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NEC Corporation",
  "manufacturer_web": "https://www.nec.com/",
  "name": "NEC Group Secure Information Exchange Site Version 1.0",
  "not_valid_after": "2013-10-07",
  "not_valid_before": "2008-04-25",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "c0156_erpt.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "JP": {
          "CRP-C0156-01": 1,
          "Certification No. C0156": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.ADMINISTRATOR": 1,
          "A.AUDIT_ADMIN": 1,
          "A.NETWORK": 1,
          "A.SYSTEM_ADMIN": 1
        },
        "T": {
          "T.ILLEGAL_ACCESS": 1,
          "T.MISDELIVERY": 1,
          "T.SPOOFING": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ASE": {
          "ASE_OBJ.2": 3,
          "ASE_REQ.2": 3,
          "ASE_SPD.1": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 3,
          "EAL1 augmented": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 1
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2006-09-002": 2,
          "CCMB-2006-09-003": 2,
          "CCMB-2006-09-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 16
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20080807163541+09\u002700\u0027",
      "/ModDate": "D:20080807163541+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 6.0 (Windows)",
      "/Title": "untitled",
      "pdf_file_size_bytes": 320841,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 21
    },
    "st_filename": "c0156_est.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.ADMINISTRATOR": 5,
          "A.AUDIT_ADMIN": 4,
          "A.DATACENTER": 4,
          "A.NETWORK": 3,
          "A.SYSTEM_ADMIN": 2,
          "A.SYSTEM_ADNIN": 1
        },
        "O": {
          "O.ACCESS_CONTROL": 8,
          "O.ADMIN_IDENTIFY": 7,
          "O.AUDIT": 12,
          "O.ENCRYPT": 8,
          "O.IDENTIFY": 8
        },
        "OE": {
          "OE.ADMIN_TRAINING": 9,
          "OE.AUDIT_ADMIN": 4,
          "OE.AUTHENTICATION": 5,
          "OE.DATACENTER": 4,
          "OE.NETWORK": 4,
          "OE.OS_TIMESTAMP": 9,
          "OE.SEND_PIN": 5,
          "OE.SYSTEM_ADMIN": 4,
          "OE.TRUSTED_ROLE": 4
        },
        "T": {
          "T.ILLEGAL_ACCESS": 2,
          "T.LISTEN-IN_NW_DATA": 3,
          "T.MISDELIVERY": 2,
          "T.SPOOFING": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_PRE": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMS": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_ECD": 1,
          "ASE_INT": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.2": 2,
          "ASE_REQ": 1,
          "ASE_REQ.2": 2,
          "ASE_SPD": 1,
          "ASE_SPD.1": 2,
          "ASE_TSS": 1
        },
        "ATE": {
          "ATE_IND": 1
        },
        "AVA": {
          "AVA_VAN": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL1+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_GEN": 1,
          "FAU_GEN.1": 14,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_GEN.2": 8,
          "FAU_GEN.2.1": 1,
          "FAU_SAR.1": 12,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.2": 8,
          "FAU_SAR.2.1": 1,
          "FAU_SAR.3": 8,
          "FAU_SAR.3.1": 1
        },
        "FDP": {
          "FDP_ACC.1": 17,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 12,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 2
        },
        "FIA": {
          "FIA_AFL": 18,
          "FIA_AFL.1": 4,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS": 21,
          "FIA_SOS.2": 4,
          "FIA_UAU": 1,
          "FIA_UAU.1": 8,
          "FIA_UAU.2": 8,
          "FIA_UAU.2.1": 1,
          "FIA_UID": 29,
          "FIA_UID.1": 7,
          "FIA_UID.2": 4,
          "FIA_USB.1": 7,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 27,
          "FMT_MSA.1": 16,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 7,
          "FMT_SAE.1": 14,
          "FMT_SAE.1.1": 1,
          "FMT_SAE.1.2": 1,
          "FMT_SMF.1": 9,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 26,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_STM.1": 10
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_TRP": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "SSL": {
            "SSL": 11
          }
        }
      },
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2006-09-001": 2,
          "CCMB-2006-09-002": 2,
          "CCMB-2006-09-003": 2,
          "CCMB-2006-09-004": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Microsoft": {
          "Microsoft": 16
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20080807135828+09\u002700\u0027",
      "/ModDate": "D:20080807135828+09\u002700\u0027",
      "/Producer": "SkyPDF Pro Driver Version 3.03.0100.00",
      "pdf_file_size_bytes": 491338,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 72
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_erpt.pdf",
  "scheme": "JP",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_SPD.1",
      "ASE_OBJ.2",
      "EAL1+",
      "ASE_REQ.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0156_est.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3f10500f7bbc66d04151e7001dfc12c8afeee16f159143fd788607ea342bde83",
      "txt_hash": "2f6cb11e6a14e419429100c84ad2630d62a3bf8baf23b0810c2a95c237a555e0"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "fea13df0aa053ae9c127965da33c2832c11ccafeebaf97355adc993033240e5e",
      "txt_hash": "13189855b1a22c5e671cfb6ade82a593d6b1a3c9be97770a0922a26029078136"
    }
  },
  "status": "archived"
}