name |
Sony Smartcard RC-S251/SO2 version 1.0 |
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
ES |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
31.12.2014 |
not_valid_before |
03.09.2009 |
21.12.2012 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2008-13-INF-396-en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2008-13-DS-en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf |
manufacturer |
Sony Corporation |
RIOREY Incorporated |
manufacturer_web |
https://www.sony.com/ |
https://www.riorey.com/ |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL4+, ALC_FLR.1 |
dgst |
0b213cc35efc6bd9 |
7f09c099abfb5dbf |
heuristics/cert_id |
2008-13-INF-396 |
CCEVS-VR-VID-10380-2012 |
heuristics/cert_lab |
[] |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ADV_TDS.3, ASE_REQ.2, ATE_COMP.1, AVA_VLA.4, ALC_COMP.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, AVA_MSU.3 |
AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ALC_CMS.4, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ADV_FSP.4, ATE_IND.2, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.3, ADV_IMP.1 |
heuristics/extracted_versions |
1.0 |
5.0.12 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Miscellaneous
- certification_date: 21.12.2012
- evaluation_facility: CygnaCom Solutions, Inc
- expiration_date: 21.12.2014
- id: CCEVS-VR-VID10380
- product: RioRey™ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
- scheme: US
- url: https://www.niap-ccevs.org/product/10380
- vendor: RioRey, Inc.
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
2008-13-INF-396-en.pdf |
st_vid10380-vr.pdf |
pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10380-2012
- cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
|
- US:
- CCEVS-VR-VID10380-2012: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 7
|
- EAL:
- EAL 4: 8
- EAL 4 augmented: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_MSU.3: 3
- AVA_VAN.5: 9
- AVA_VLA.4: 3
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.4: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 2
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 3
- AVA:
- AVA_VAN.2: 1
- AVA_VAN.3: 1
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.BACKUP: 1
- A.CONNECT: 1
- A.NOEVIL: 1
- A.PHYSICAL: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- and the packet control that conforms to the ISO 7816 and ISO 18092. “Reader/Writer Firmware” is out of scope of the TOE. • “FeliCa card” is an external contactless IC card that conforms to the ISO 18092: 1
- card” is out of scope of the TOE. MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL: 1
- out of scope: 2
|
|
pdf_data/report_metadata |
- /Author: Usuario1
- /CreationDate: D:20091126172130+01'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20091126172130+01'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - INF-396.DOC
- pdf_file_size_bytes: 503179
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
|
pdf_data/st_filename |
2008-13-DS-en.pdf |
st_vid10380-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 5
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ALC:
- AVA:
- AVA_MSU.3: 1
- AVA_VAN.5: 3
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 17
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 8
- FAU_SAR.3.1: 1
- FAU_STG.1: 7
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_UAU_EXT.2: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 2
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU_EXT.2: 14
- FIA_UAU_EXT.2.1: 3
- FIA_UID: 1
- FIA_UID.1: 8
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD.1: 14
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_STM.1: 2
- FRU:
- FRU_DDOS: 2
- FRU_DDOS_EXT.1: 13
- FRU_DDOS_EXT.1.1: 3
- FRU_DDOS_EXT.1.2: 3
- FRU_DDOS_EXT.1.3: 3
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.BACKUP: 3
- A.CONNECT: 3
- A.NOEVIL: 3
- A.PHYSICAL: 3
- O:
- O.AUDIT: 10
- O.DDOSALERT: 5
- O.DDOSMITIGATE: 6
- O.FAILSAFE: 6
- O.IDAUTH: 9
- O.MANAGE: 8
- O.PROCOM: 5
- O.TRANSMISSION: 1
- OE:
- OE.AUDIT: 4
- OE.BACKUP: 3
- OE.CONNECT: 3
- OE.NOEVIL: 3
- OE.PHYSICAL: 3
- OE.TIME: 5
- T:
- T.AUDIT: 4
- T.DDOSATTACK: 3
- T.FAILURE: 3
- T.MANAGE: 3
- T.NOAUTH: 3
- T.PROCOM: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- RFC:
- RFC 1858: 2
- RFC 1918: 1
- RFC1858: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- “FeliCa card” is out of scope of the TOE: 1
- “Reader/Writer Firmware” is out of scope of the TOE: 1
- and the packet control that conforms to the [ISO 7816] and [ISO 18092]. “Reader/Writer Firmware” is out of scope of the TOE. “FeliCa card” is an external contactless IC card that conforms to the [ISO 18092: 1
- card” is out of scope of the TOE. 2.3. Delivery The TOE delivery items are listed in Table 3. Table 3: TOE delivery items: 1
- out of scope: 2
|
- OutOfScope:
- out of scope: 1
- software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20090709180657+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0.7
- /ModDate: D:20090709180900+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20090709090625
- /Title: Microsoft Word - 251-STP-E01-10.doc
- pdf_file_size_bytes: 237445
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /CreationDate: D:20130115104027
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20130115104027
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1295508
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 61
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |