name |
Sony Smartcard RC-S251/SO2 version 1.0 |
ZTE Optical Transmission Equipment Series |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
ES |
NO |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
01.09.2019 |
not_valid_before |
03.09.2009 |
25.02.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2008-13-INF-396-en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-042%20CR%20v%201.0.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2008-13-DS-en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf |
manufacturer |
Sony Corporation |
ZTE Corporation |
manufacturer_web |
https://www.sony.com/ |
https://wwwen.zte.com.cn/global/index.html |
security_level |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL2+, ALC_FLR.2 |
dgst |
0b213cc35efc6bd9 |
a041cccd8254ec7a |
heuristics/cert_id |
2008-13-INF-396 |
SERTIT-042 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ADV_TDS.3, ASE_REQ.2, ATE_COMP.1, AVA_VLA.4, ALC_COMP.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, AVA_MSU.3 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Other Devices and Systems
- certification_date: 25.02.2013
- developer: ZTE Corporation
- enhanced:
- category: Other Devices and Systems
- cert_id: SERTIT-042
- certification_date: 25.02.2013
- description: SERTIT-042 C
- developer: ZTE Corporation
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134824-1607951230/SERTIT/Sertifikater/2013/42/ZTE%20Optical%20Transmission%20Equipment%20Security%20Target%20v1.2.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134821-1607951226/SERTIT/Sertifikater/2013/42/SERTIT-042%20CR%20v%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 2, ALC_FLR.2
- mutual_recognition: CCRA
- product: ZXONE 5800 v1.10, ZXMP S325 v2.10, ZXMP S385 v2.60, ZXMP M720 v1.00, ZXMP M820 v2.51, ZXWM M920 V4.20P01, ZXONE 8300 v1.00, ZXONE 8500 v1.00
- sponsor: ZTE Corporation
- product: ZTE Optical Transmission Equipment Series
- url: https://sertit.no/certified-products/product-archive/zte-optical-transmission-equipment-series
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
2008-13-INF-396-en.pdf |
SERTIT-042 CR v 1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 7
|
- EAL:
- EAL 2: 5
- EAL 2 augmented: 2
- EAL 2+: 21
- EAL1: 1
- EAL2: 1
- EAL2+: 2
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_MSU.3: 3
- AVA_VAN.5: 9
- AVA_VLA.4: 3
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 2
- ALC_CMS.2: 2
- ALC_DEL.1: 2
- ALC_FLR.2: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTP:
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.3: 2
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FAU_STG.4: 1
- FDP:
- FDP_ACC.2: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_IFF.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_SOS.1: 1
- FIA_UAU.2: 1
- FIA_UID.2: 1
- FMT:
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FTA:
- FTA_MCS.1: 1
- FTA_SSL.3: 1
|
pdf_data/report_keywords/cc_claims |
|
- O:
- O.AUDITING: 1
- O.AUTHENTICATE: 1
- O.AUTHORISE: 1
- OE:
- OE.CLIENT_SECURITY: 1
- OE.SERVER_SECURITY: 1
- OE.TIME: 1
- OE.TRUSTED_NETWORKS: 1
- T:
- T.AUTHORISED: 1
- T.CONFIDENTIALITY: 1
- T.INTEGRITY: 1
- T.PHYSICAL_ATTACK: 1
- T.UNAUTHORISED: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- and the packet control that conforms to the ISO 7816 and ISO 18092. “Reader/Writer Firmware” is out of scope of the TOE. • “FeliCa card” is an external contactless IC card that conforms to the ISO 18092: 1
- card” is out of scope of the TOE. MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL: 1
- out of scope: 2
|
|
pdf_data/report_metadata |
- /Author: Usuario1
- /CreationDate: D:20091126172130+01'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20091126172130+01'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - INF-396.DOC
- pdf_file_size_bytes: 503179
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /Author: Kvassnes, Kjartan Jæger
- /CreationDate: D:20130321125808+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20130321125953+01'00'
- /Producer: Microsoft® Word 2010
- /Title: tittel
- pdf_file_size_bytes: 1423728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
2008-13-DS-en.pdf |
ZTE Optical Transmission Equipment Security Target v1.2.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 5
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ALC:
- AVA:
- AVA_MSU.3: 1
- AVA_VAN.5: 3
- AVA_VLA.4: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 7
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA.1: 4
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 1
- FAU_GEN.3: 8
- FAU_GEN.3.1: 3
- FAU_GEN.3.2: 2
- FAU_SAR.1: 4
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.2: 5
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 5
- FDP_IFC.1.1: 1
- FDP_IFF.1: 6
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 5
- FIA_SOS.1.1: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 2
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 2
- FMT_SMF: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTA_MCS.1: 5
- FTA_MCS.1.1: 1
- FTA_MCS.1.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.ACCESS: 4
- O.AUDITING: 4
- O.AUTHENTICATE: 4
- O.AUTHORISE: 4
- OE:
- OE.CLIENT_SECURITY: 3
- OE.SERVER_SECURITY: 2
- OE.TIME: 3
- OE.TRUSTED_NETWORK: 1
- OE.TRUSTED_NETWORKS: 1
- OSP:
- OSP.FLEXIBLE_MANAGEMENT: 2
- T:
- T.AUTHORISED: 2
- T.CONFIDENTIALITY: 2
- T.INTEGRITY: 2
- T.PHYSICAL_ATTACK: 2
- T.UNAUTHORISED: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- “FeliCa card” is out of scope of the TOE: 1
- “Reader/Writer Firmware” is out of scope of the TOE: 1
- and the packet control that conforms to the [ISO 7816] and [ISO 18092]. “Reader/Writer Firmware” is out of scope of the TOE. “FeliCa card” is an external contactless IC card that conforms to the [ISO 18092: 1
- card” is out of scope of the TOE. 2.3. Delivery The TOE delivery items are listed in Table 3. Table 3: TOE delivery items: 1
- out of scope: 2
|
- OutOfScope:
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations Operations in the TOE are divided into • Topology: 1
- for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope for this ST. Accounting: The TOE supports flexible logging and auditing of events. General This: 1
- for ZTE maintenance staff that regularly services the TOE using the systems console, but this is out of scope for this ST. Accounting: The EMS supports flexible logging and auditing of security, operation and: 1
- out of scope: 3
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20090709180657+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0.7
- /ModDate: D:20090709180900+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20090709090625
- /Title: Microsoft Word - 251-STP-E01-10.doc
- pdf_file_size_bytes: 237445
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
- /CreationDate: D:20120816120620+02'00'
- /Creator: PDF24 Creator
- /ModDate: D:20120816120620+02'00'
- /Producer: GPL Ghostscript 8.61
- pdf_file_size_bytes: 699350
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |