KOMSCO JK11

CSV information ?

Status archived
Valid from 12.10.2010
Valid until 01.06.2019
Scheme 🇰🇷 KR
Manufacturer KOMSCO
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, AVA_VAN.4, ATE_DPT.2

Heuristics summary ?

Certificate ID: KECS-ISIS-0272-2010

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
TDES, ARIA, SEED
Asymmetric Algorithms
ECDH, ECC
Hash functions
SHA-1, SHA-256

Vendor
Samsung

Security level
EAL4+
Claims
A.TOE, A.TSF
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1
Certificates
KECS-ISIS-0272-2010
Evaluation facilities
KISA

Standards
SCP02

File metadata

Title KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp
Author ITSCC
Creation date D:20110729144857+09'00'
Modification date D:20110729144857+09'00'
Pages 25
Creator PDFCreator Version 1.2.0
Producer GPL Ghostscript 9.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, TDES, ARIA, SEED
Asymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1
Schemes
MAC, Key agreement, Key Agreement
Engines
TORNADO

JavaCard versions
GlobalPlatform 2.1.1
JavaCard API constants
TYPE_ACCESS
Vendor
Samsung

Security level
EAL4+, EAL5+, EAL 4+, EAL4
Claims
D.APP_CODE, D.APP_DATA, D.PIN, D.TS_CODE, D.TS_DATA, D.SEC_DATA, D.CRYPTO, O.IDENTIFICATI, O.JAVAOBJECT, A.TOE, A.TSF, OP.LOAD, OP.INSTALL, OP.DELETE, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OE.TSF
Security Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.4, AVA_MSU.2, AVA_VLA.4, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_REQ.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_ATD.1, FIA_UAU.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UAU.4.1, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.1.1, FMT_MOF.1.1, FMT_SMR.1.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_RCV.3, FPT_TST.1, FPT_RCV.4, FPT_FLS.1.1, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_RCV.4.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1
Certificates
BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0501-2008-MA-04, BSI-DSZ-CC-0624-2010-MA-04

Side-channel analysis
DPA, SPA, timing attack, Physical tampering, Malfunction, malfunction, DFA
Certification process
out of scope, the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of

Standards
PKCS#2, AIS20, SCP02, SCP 02, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003

File metadata

Title [????] Security Target Lite_e
Author ITSCC
Creation date D:20110729101020+09'00'
Modification date D:20110729101020+09'00'
Pages 90
Creator PDFCreator Version 1.2.0
Producer GPL Ghostscript 9.0

References

Outgoing

Heuristics ?

Certificate ID: KECS-ISIS-0272-2010

Extracted SARs

ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_VAN.4, AVA_VLA.4

Scheme data ?

Product KOMSCO JK11
Cert Id KECS-ISIS-0272-2010
Product Link https://itscc.kr/certprod/view.do?product_id=272&product_class=4
Vendor KOMSCO Co., Ltd.
Level EAL4+
Category SmartCard Operating System
Certification Date 12.10.2010
Enhanced
Product KOMSCO JK11
Cc Version CC V3.1 R3
Assurance Level EAL4+
Certification Date 12.10.2010
Expiration Date 01.06.2019
Product Type SmartCard Operating System
Cert Id KECS-ISIS-0272-2010
Report Link https://itscc.kr/file/download.do?file=KPR100000001200
Target Link https://itscc.kr/file/download.do?file=KPR100000001202
Cert Link https://itscc.kr/file/download.do?file=KPR100000001201
Protection Profile Smart Card Open Platform Protection Profile V2.1
Developer KOMSCO Co., Ltd.
Holder KOMSCO Co., Ltd.

References ?

Updates ?

  • 21.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'prev_certificates': [], 'next_certificates': []}.
  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'KOMSCO JK11', 'cert_id': 'KECS-ISIS-0272-2010', 'product_link': 'https://itscc.kr/certprod/view.do?product_id=272&product_class=4', 'vendor': 'KOMSCO Co., Ltd.', 'level': 'EAL4+', 'category': 'SmartCard Operating System', 'certification_date': '2010-10-12', 'enhanced': {'product': 'KOMSCO JK11', 'cc_version': 'CC V3.1 R3', 'assurance_level': 'EAL4+', 'certification_date': '2010-10-12', 'expiration_date': '2019-06-01', 'product_type': 'SmartCard Operating System', 'cert_id': 'KECS-ISIS-0272-2010', 'report_link': 'https://itscc.kr/file/download.do?file=KPR100000001200', 'target_link': 'https://itscc.kr/file/download.do?file=KPR100000001202', 'cert_link': 'https://itscc.kr/file/download.do?file=KPR100000001201', 'protection_profile': 'Smart Card Open Platform Protection Profile V2.1', 'developer': 'KOMSCO Co., Ltd.', 'holder': 'KOMSCO Co., Ltd.'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ab59294fa0998b0c8f235974085aa38914f67cc96fa4287a47035cb96eb4c397', 'txt_hash': '7e4d2b3496132c30e3628a7f6a76e188ca72414f1d8d9cd42ff9fd1705c50a28'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8d54ef21e6a713964de8d940cd07a4830ce50843c6e995ceb2b20b6f97a59935', 'txt_hash': '4d8fa92cd3448838189c54fbd5b7760e8ff978d372a421184857d12feef9759d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 306165, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20110729144857+09'00'", '/ModDate': "D:20110729144857+09'00'", '/Title': 'KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'ITSCC', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1626173, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 90, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20110729101020+09'00'", '/ModDate': "D:20110729101020+09'00'", '/Title': '[????] Security Target Lite_e', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'ITSCC', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'KR': {'KECS-ISIS-0272-2010': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.TOE': 1, 'A.TSF': 1}}, 'vendor': {'Samsung': {'Samsung': 6}}, 'eval_facility': {'KISA': {'KISA': 2}}, 'symmetric_crypto': {'DES': {'3DES': {'TDES': 1}}, 'miscellaneous': {'ARIA': {'ARIA': 3}, 'SEED': {'SEED': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP02': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0438-2007': 1, 'BSI-DSZ-CC-0501-2008-MA-04': 1, 'BSI-DSZ-CC-0624-2010-MA-04': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 6, 'EAL5+': 1, 'EAL 4+': 1, 'EAL4': 12}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1, 'ADV_ARC.1': 16, 'ADV_FSP.4': 15, 'ADV_IMP.1': 11, 'ADV_TDS.3': 21, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 17, 'AGD_PRE.1': 10}, 'ALC': {'ALC_DVS.2': 1, 'ALC_CMC.4': 17, 'ALC_CMS.4': 8, 'ALC_DEL.1': 7, 'ALC_DVS.1': 8, 'ALC_LCD.1': 9, 'ALC_TAT.1': 10, 'ALC_CMS.1': 1}, 'ATE': {'ATE_DPT.2': 14, 'ATE_COV.2': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 9, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.4': 15, 'AVA_MSU.2': 1, 'AVA_VLA.4': 1, 'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 16, 'ASE_CCL.1': 16, 'ASE_SPD.1': 10, 'ASE_OBJ.2': 13, 'ASE_ECD.1': 14, 'ASE_REQ.2': 15, 'ASE_TSS.1': 7, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_SAA.1': 10, 'FAU_ARP.1.1': 1, 'FAU_GEN.1': 3, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1}, 'FCS': {'FCS_CKM.1': 13, 'FCS_CKM.4': 13, 'FCS_COP.1': 18, 'FCS_CKM.2': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 3}, 'FDP': {'FDP_ACC.2': 15, 'FDP_ACF.1': 20, 'FDP_RIP.1': 6, 'FDP_SDI.2': 6, 'FDP_UCT.1': 9, 'FDP_UIT.1': 8, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1': 15, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_IFC.1': 8, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 2}, 'FIA': {'FIA_AFL.1': 7, 'FIA_SOS.1': 7, 'FIA_UAU.4': 7, 'FIA_UAU.6': 6, 'FIA_UID.1': 13, 'FIA_ATD.1': 13, 'FIA_UAU.1': 22, 'FIA_USB.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.2': 3, 'FIA_UAU.1.1': 7, 'FIA_UAU.4.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF.1': 7, 'FMT_MSA.3': 10, 'FMT_MTD.1': 7, 'FMT_MTD.2': 7, 'FMT_SMF.1': 11, 'FMT_SMR.1': 18, 'FMT_MSA.1': 15, 'FMT_MSA.3.1': 2, 'FMT_MSA.1.1': 3, 'FMT_MOF.1.1': 1, 'FMT_SMR.1.1': 5, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 6, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_RCV.3': 6, 'FPT_TST.1': 6, 'FPT_RCV.4': 5, 'FPT_FLS.1.1': 1, 'FPT_RCV.2': 1, 'FPT_RCV.3.1': 1, 'FPT_RCV.3.2': 1, 'FPT_RCV.3.3': 1, 'FPT_RCV.3.4': 1, 'FPT_RCV.4.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.APP_CODE': 1, 'D.APP_DATA': 1, 'D.PIN': 1, 'D.TS_CODE': 1, 'D.TS_DATA': 1, 'D.SEC_DATA': 1, 'D.CRYPTO': 1}, 'O': {'O.IDENTIFICATI': 1, 'O.JAVAOBJECT': 2}, 'A': {'A.TOE': 2, 'A.TSF': 2}, 'OP': {'OP.LOAD': 10, 'OP.INSTALL': 10, 'OP.DELETE': 10, 'OP.ARRAY_ACCESS': 5, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_VIRTUAL': 5, 'OP.INVK_INTERFACE': 7, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 7, 'OP.JAVA': 3, 'OP.CREATE': 3}, 'OE': {'OE.TSF': 3}}, 'vendor': {'Samsung': {'Samsung': 12}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 8}}, 'miscellaneous': {'ARIA': {'ARIA': 4}, 'SEED': {'SEED': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 6}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1, 'timing attack': 1}, 'FI': {'Physical tampering': 2, 'Malfunction': 7, 'malfunction': 2, 'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#2': 1}, 'BSI': {'AIS20': 1}, 'SCP': {'SCP02': 20, 'SCP 02': 1}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 8}}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of': 1}}}.
    • The report_filename property was set to KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf.
    • The st_filename property was set to KOMSCO JK11 Security Target Lite_e.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to KECS-ISIS-0272-2010.
    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0438-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0438-2007']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]} values discarded.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name KOMSCO JK11 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "794dbdddfa49f688",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "KECS-ISIS-0272-2010",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 4
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": [],
    "prev_certificates": [],
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "SmartCard Operating System",
      "cert_id": "KECS-ISIS-0272-2010",
      "certification_date": "2010-10-12",
      "enhanced": {
        "assurance_level": "EAL4+",
        "cc_version": "CC V3.1 R3",
        "cert_id": "KECS-ISIS-0272-2010",
        "cert_link": "https://itscc.kr/file/download.do?file=KPR100000001201",
        "certification_date": "2010-10-12",
        "developer": "KOMSCO Co., Ltd.",
        "expiration_date": "2019-06-01",
        "holder": "KOMSCO Co., Ltd.",
        "product": "KOMSCO JK11",
        "product_type": "SmartCard Operating System",
        "protection_profile": "Smart Card Open Platform Protection Profile V2.1",
        "report_link": "https://itscc.kr/file/download.do?file=KPR100000001200",
        "target_link": "https://itscc.kr/file/download.do?file=KPR100000001202"
      },
      "level": "EAL4+",
      "product": "KOMSCO JK11",
      "product_link": "https://itscc.kr/certprod/view.do?product_id=272\u0026product_class=4",
      "vendor": "KOMSCO Co., Ltd."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0438-2007"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0438-2007"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "KOMSCO",
  "manufacturer_web": "https://www.komsco.com",
  "name": "KOMSCO JK11",
  "not_valid_after": "2019-06-01",
  "not_valid_before": "2010-10-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDH": {
            "ECDH": 1
          }
        }
      },
      "cc_cert_id": {
        "KR": {
          "KECS-ISIS-0272-2010": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.TOE": 1,
          "A.TSF": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.1": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.2": 1,
          "ATE_DPT": 1,
          "ATE_DPT.2": 2,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.4": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4+": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "KISA": {
          "KISA": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "SCP": {
          "SCP02": 4
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "TDES": 1
          }
        },
        "miscellaneous": {
          "ARIA": {
            "ARIA": 3
          },
          "SEED": {
            "SEED": 4
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 6
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ITSCC",
      "/CreationDate": "D:20110729144857+09\u002700\u0027",
      "/Creator": "PDFCreator Version 1.2.0",
      "/Keywords": "",
      "/ModDate": "D:20110729144857+09\u002700\u0027",
      "/Producer": "GPL Ghostscript  9.0",
      "/Subject": "",
      "/Title": "KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp",
      "pdf_file_size_bytes": 306165,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "KOMSCO JK11 Security Target Lite_e.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        },
        "RSA": {
          "RSA 1024": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0438-2007": 1,
          "BSI-DSZ-CC-0501-2008-MA-04": 1,
          "BSI-DSZ-CC-0624-2010-MA-04": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.TOE": 2,
          "A.TSF": 2
        },
        "D": {
          "D.APP_CODE": 1,
          "D.APP_DATA": 1,
          "D.CRYPTO": 1,
          "D.PIN": 1,
          "D.SEC_DATA": 1,
          "D.TS_CODE": 1,
          "D.TS_DATA": 1
        },
        "O": {
          "O.IDENTIFICATI": 1,
          "O.JAVAOBJECT": 2
        },
        "OE": {
          "OE.TSF": 3
        },
        "OP": {
          "OP.ARRAY_ACCESS": 5,
          "OP.CREATE": 3,
          "OP.DELETE": 10,
          "OP.INSTALL": 10,
          "OP.INSTANCE_FIELD": 5,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 5,
          "OP.JAVA": 3,
          "OP.LOAD": 10,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 7
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 16,
          "ADV_FSP.1": 3,
          "ADV_FSP.2": 2,
          "ADV_FSP.4": 15,
          "ADV_IMP.1": 11,
          "ADV_IMP.2": 1,
          "ADV_TDS.1": 2,
          "ADV_TDS.3": 21
        },
        "AGD": {
          "AGD_OPE.1": 17,
          "AGD_PRE.1": 10
        },
        "ALC": {
          "ALC_CMC.4": 17,
          "ALC_CMS.1": 1,
          "ALC_CMS.4": 8,
          "ALC_DEL.1": 7,
          "ALC_DVS.1": 8,
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 9,
          "ALC_TAT.1": 10
        },
        "ASE": {
          "ASE_CCL.1": 16,
          "ASE_ECD.1": 14,
          "ASE_INT.1": 16,
          "ASE_OBJ.2": 13,
          "ASE_REQ.1": 2,
          "ASE_REQ.2": 15,
          "ASE_SPD.1": 10,
          "ASE_TSS.1": 7
        },
        "ATE": {
          "ATE_COV.1": 2,
          "ATE_COV.2": 7,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 14,
          "ATE_FUN.1": 14,
          "ATE_IND.2": 9
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 15,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL4": 12,
          "EAL4+": 6,
          "EAL5+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 7,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 3,
          "FAU_SAA.1": 10,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 13,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 13,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 18,
          "FCS_COP.1.1": 3
        },
        "FDP": {
          "FDP_ACC.1": 15,
          "FDP_ACC.2": 15,
          "FDP_ACC.2.1": 2,
          "FDP_ACC.2.2": 2,
          "FDP_ACF.1": 20,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 8,
          "FDP_ITC.1": 6,
          "FDP_ITC.2": 6,
          "FDP_RIP.1": 6,
          "FDP_RIP.1.1": 1,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 8,
          "FDP_UIT.1.1": 2
        },
        "FIA": {
          "FIA_AFL.1": 7,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 13,
          "FIA_ATD.1.1": 2,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 22,
          "FIA_UAU.1.1": 7,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 7,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.6": 6,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 13,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1,
          "FIA_USB.1": 6,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 15,
          "FMT_MSA.1.1": 3,
          "FMT_MSA.3": 10,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 7,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMF.1": 11,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 5,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNO.1": 6,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 6,
          "FPT_FLS.1.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 6,
          "FPT_RCV.3.1": 1,
          "FPT_RCV.3.2": 1,
          "FPT_RCV.3.3": 1,
          "FPT_RCV.3.4": 1,
          "FPT_RCV.4": 5,
          "FPT_RCV.4.1": 1,
          "FPT_TST.1": 6,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTP": {
          "FTP_ITC.1": 6,
          "FTP_TRP.1": 5
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "TORNADO": {
          "TORNADO": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1,
          "Key agreement": 1
        },
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "misc": {
          "TYPE_ACCESS": 8
        }
      },
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.1.1": 3
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "Malfunction": 7,
          "Physical tampering": 2,
          "malfunction": 2
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1,
          "timing attack": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        },
        "CC": {
          "CCMB-2009-07-001": 2,
          "CCMB-2009-07-002": 2,
          "CCMB-2009-07-003": 2
        },
        "PKCS": {
          "PKCS#2": 1
        },
        "SCP": {
          "SCP 02": 1,
          "SCP02": 20
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "TDES": 8
          },
          "DES": {
            "DES": 1
          }
        },
        "miscellaneous": {
          "ARIA": {
            "ARIA": 4
          },
          "SEED": {
            "SEED": 5
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 12
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "ITSCC",
      "/CreationDate": "D:20110729101020+09\u002700\u0027",
      "/Creator": "PDFCreator Version 1.2.0",
      "/Keywords": "",
      "/ModDate": "D:20110729101020+09\u002700\u0027",
      "/Producer": "GPL Ghostscript  9.0",
      "/Subject": "",
      "/Title": "[????] Security Target Lite_e",
      "pdf_file_size_bytes": 1626173,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 90
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf",
  "scheme": "KR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ATE_DPT.2",
      "EAL4+",
      "AVA_VAN.4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ab59294fa0998b0c8f235974085aa38914f67cc96fa4287a47035cb96eb4c397",
      "txt_hash": "7e4d2b3496132c30e3628a7f6a76e188ca72414f1d8d9cd42ff9fd1705c50a28"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "8d54ef21e6a713964de8d940cd07a4830ce50843c6e995ceb2b20b6f97a59935",
      "txt_hash": "4d8fa92cd3448838189c54fbd5b7760e8ff978d372a421184857d12feef9759d"
    }
  },
  "status": "archived"
}