| name |
ERUCES Tricryption Key Server and Agent 6.2 |
MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0 |
| category |
Data Protection |
Operating Systems |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
08.05.2014 |
07.10.2013 |
| not_valid_before |
15.09.2009 |
24.01.2007 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10138-vr.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0076_ecvr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10138-st.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
| manufacturer |
ERUCES, Inc. |
Miracle Linux Corporation |
| manufacturer_web |
https://www.eruces.com/ |
|
| security_level |
AVA_MSU.1, EAL2+, ALC_FLR.2 |
EAL1 |
| dgst |
2a47f2b0cb580410 |
ac287c45e166eaf5 |
| heuristics/cert_id |
CCEVS-VR-VID-10138-2009 |
JISEC-CC-CRP-C0076 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, ADV_HLD.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ALC_FLR.2, ADV_RCR.1, ATE_COV.1, AVA_SOF.1, ATE_FUN.1, AGD_USR.1, ADV_FSP.1 |
{} |
| heuristics/extracted_versions |
6.2 |
4.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10138/
- categories: ['Sensitive Data Protection']
- category: Sensitive Data Protection
- certification_date: 15.09.2009
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date: 15.09.2011
- id: CCEVS-VR-VID10138
- product: ERUCES Tricryption Key Server and Agent 6.2
- scheme: US
- url: https://www.niap-ccevs.org/products/10138
- vendor: ERUCES, Inc.
|
- cert_id: JISEC-CC-CRP-C0076
- certification_date: 01.01.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is a common part of MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One which is commercially available distribution of the Linux operating system. It is a multi-user, multi-tasking operating system designed for use on Intel x86 platforms. This TOE provides identification and authorization, discretionary access control, process separation, auditing of identification and authorization to protect information against illegal access, falsification and information leaks.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System
- product_type: IT Product (Operating System)
- toe_version: V4.0
- vendor: MIRACLE LINUX CORPORATION
- expiration_date: 01.10.2013
- supplier: MIRACLE LINUX CORPORA TION
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0076_it6093.html
- toe_japan_name: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10138-vr.pdf |
c0076_ecvr.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10138-2009
- cert_item: ERUCES Tricryption® KeyServer and Agent Version 6.2
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10138-2009: 1
|
- JP:
- Certification No. C0076: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 5
- EAL 2 augmented: 1
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_: 1
- A.PHYSICAL: 1
- T:
- T.AUDIT_COMPROMISE: 1
- T.MASQUERADE: 1
- T.SYSACC: 1
- T.TSF_COMPROMISE: 1
- T.UNAUTH_ACCESS: 1
- T.UNDETECTED_ACTIONS: 1
- T.UNIDENTIFIED_ACTIONS: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: Eve Pierre
- /CreationDate: D:20091130161935
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20091130161935
- /Producer: Microsoft® Office Word 2007
- /Title: Validation Report
- pdf_file_size_bytes: 274056
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20070126115647+09'00'
- /ModDate: D:20070126115647+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12684
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/st_filename |
st_vid10138-st.pdf |
|
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 12
- EAL 2 augmented: 2
- EAL 2+: 2
|
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL: 2
- ADO_DEL.1: 6
- ADO_IGS: 2
- ADO_IGS.1: 8
- ADV:
- ADV_FSP: 2
- ADV_FSP.1: 21
- ADV_HLD: 2
- ADV_HLD.1: 15
- ADV_RCR: 2
- ADV_RCR.1: 7
- ADV_SPM: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 19
- AGD_USR: 2
- AGD_USR.1: 16
- ALC:
- ATE:
- ATE_COV: 2
- ATE_COV.1: 5
- ATE_FUN: 2
- ATE_FUN.1: 13
- ATE_IND: 2
- ATE_IND.2: 8
- AVA:
- AVA_MSU: 1
- AVA_MSU.1: 17
- AVA_SOF: 2
- AVA_SOF.1: 7
- AVA_VLA: 2
- AVA_VLA.1: 9
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_SAR: 7
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_SAR.3: 3
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM: 6
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 7
- FCS_CKM.4.1: 1
- FCS_COP: 2
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 6
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF: 4
- FDP_ACF.1: 4
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 1
- FIA:
- FIA_ATD: 3
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_UAU: 3
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UID: 3
- FIA_UID.1: 2
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FIA_USB: 3
- FIA_USB.1: 4
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 21
- FMT_MSA.2: 3
- FMT_MSA.3: 6
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 14
- FMT_REV: 19
- FMT_SMF: 5
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR: 4
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 3
- FPT_ITT.1: 4
- FPT_ITT.1.1: 1
- FPT_RVM: 2
- FPT_RVM.1: 3
- FPT_RVM.1.1: 1
- FPT_SEP: 2
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 3
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FTA:
- FTA_SSL: 3
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
|
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 4
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 4
- O:
- O.ACCESS: 4
- O.ADMIN_ROLE: 3
- O.AUDIT_GENERATION: 4
- O.CRYPTOMODULE: 2
- O.DISCRETIONARY_ACCESS: 4
- O.MANAGE: 3
- O.USER_AUTHENTICATION: 3
- O.USER_IDENTIFICATION: 4
- OE:
- OE.AUDIT_REVIEW: 4
- OE.CONFIG: 2
- OE.CRYPTOMODULE: 1
- OE.INSTALL: 2
- OE.NO_GENERAL_PURPOSE: 2
- OE.PERSON: 2
- OE.PHYSICAL: 2
- OE.TIME: 3
- OE.TOE_PROTECTION: 3
- OE.TRUST_IT: 2
- T:
- T.AUDIT_COMPROMISE: 4
- T.MASQUERADE: 2
- T.SYSACC: 4
- T.TSF_COMPROMISE: 2
- T.UNAUTH_ACCESS: 4
- T.UNDETECTED_ACTIONS: 2
- T.UNIDENTIFIED_ACTIONS: 4
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 9
- FIPS PUB 140-2: 3
- FIPS PUB 180-1: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- RFC:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: agjames
- /CreationDate: D:20091124153947
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20091124153947
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: Security Target
- pdf_file_size_bytes: 817826
- pdf_hyperlinks: http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140sp/140sp1094.pdf
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
False |
| state/st/download_ok |
True |
False |
| state/st/extract_ok |
True |
False |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |