| name |
Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329 |
ORGA 6141 online Version 3.8.2:1.2.0 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
NO |
DE |
| status |
archived |
active |
| not_valid_after |
05.09.2021 |
24.07.2027 |
| not_valid_before |
05.09.2016 |
25.07.2022 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V4c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-082%20CR%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V4a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-S]%20F03S-ASEP01-E01-70.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V4b_pdf.pdf |
| manufacturer |
FeliCa Networks, Inc |
Worldlline Healthcare GmbH |
| manufacturer_web |
https://https://www.felicanetworks.co.jp/en/ |
https://de.worldline.com |
| security_level |
EAL4+, ATE_DPT.2, AVA_VAN.4, ALC_DVS.2 |
EAL3+, ADV_FSP.4, ALC_TAT.1, AVA_VAN.4, ADV_IMP.1, ADV_TDS.3 |
| dgst |
459fd0c8cc4aea97 |
bc0a53a328deee90 |
| heuristics/cert_id |
SERTIT-082 |
BSI-DSZ-CC-0519-V4-2022 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, AVA_VAN.4, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, AVA_VAN.4, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ALC_DVS.1, ALC_CMS.3, ALC_TAT.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
3.0 |
3.8.2, 1.2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0519-V5-2024 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0519-V3-2021 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0519-V6-2025, BSI-DSZ-CC-0519-V5-2024 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0519-V3-2021 |
| heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 05.09.2016
- developer: FeliCa Networks, Inc.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-082
- certification_date: 05.09.2016
- description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Samsung Electronics Co., Ltd chip S3CS9AB.
- developer: FeliCa Networks, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135073-1607952767/SERTIT/Sertifikater/2016/82/%5BSTP-S%5D%20F03S-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135076-1607952771/SERTIT/Sertifikater/2016/82/SERTIT-082%20CR%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: Software: Mobile FeliCa OS Version 3.0 0114_5329; Hardware: S3CS9AB 32-Bit RISC Microcontroller for Smart Card 0
- sponsor: FeliCa Networks, Inc.
- product: Mobile FeliCa OS 3.0 on S3CS9AB/0114_5329
- url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-s3cs9ab-0114-5329
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
e1444c335eeed890 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf |
| pdf_data/cert_filename |
|
0519V4c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0519-V4-2022: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
| pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220729073024+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Kartenterminal, Wordline"
- /ModDate: D:20220729104256+02'00'
- /Producer: LibreOffice 6.3
- /Title: Certificate BSI-DSZ-CC-0519-V4-2022
- pdf_file_size_bytes: 252744
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
SERTIT-082 CR 1.0.pdf |
0519V4a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4
- cc_version: PP conformant Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-0519-V4-2022
- cert_item: ORGA 6141 online V3.8.2:1.2.0
- cert_lab: BSI
- developer: Worldline Healthcare GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0519-V3-2021: 3
- BSI-DSZ-CC-0519-V4-2022: 13
- NL:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V2-2015-MA-01: 3
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 2
- EAL 4+: 19
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 2
- EAL3+: 1
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
- FCS:
- FCS_CKM.1: 9
- FCS_COP: 1
- FCS_COP.1: 1
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 1
- AES-128: 2
- AES-256: 2
- HPC:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 1
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC3526: 1
- RFC4492: 3
- RFC5246: 8
- RFC5289: 4
- RFC5639: 1
- RFC7027: 1
- X509:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Datensatz PDXpert ORGA_6141_online_V_3.8.2_Freigegeben_2022_07_12.pdx, Worldline Healthcare GmbH (confidential document) [10] Configuration list SW for the TOE, Version 3.8.2, 2022-05-17, SVN Log Dateien: 1
- GmbH [7] Evaluation Technical Report, Version 1, 2022-07-20, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- zip, Worldline Healthcare GmbH (confidential document) [11] Guidance documentation for the TOE Bedienungsanleitung Stationäres eHealth Kartenterminal: 1
|
| pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Wei Yuan
- /CreationDate: D:20160905104804Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20160905104804Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1408292
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20220729073024+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, eHealth, Kartenterminal, Wordline"
- /ModDate: D:20220729104144+02'00'
- /Producer: LibreOffice 6.3
- /Title: Certification Report BSI-DSZ-CC-0519-V4-2022
- pdf_file_size_bytes: 628047
- pdf_hyperlinks: https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
| pdf_data/st_filename |
[STP-S] F03S-ASEP01-E01-70.pdf |
0519V4b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0032-: 1
- BSI-CC-PP-0032-V2-2015-MA-01: 1
- BSI-CC-PP-0046: 1
- BSI-CC-PP-0082: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 2
- EAL 3 augmented: 2
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ATE:
- ATE_DPT.2: 6
- ATE_FUN.1: 2
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 6
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_RNG: 1
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITT.1: 6
- FDP_ITT.1.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 14
- FCS_CKM.2: 4
- FCS_CKM.4: 34
- FCS_CKM.4.1: 1
- FCS_COP: 57
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 12
- FDP_ACF: 27
- FDP_ACF.1: 16
- FDP_IFC: 25
- FDP_IFC.1: 12
- FDP_IFF: 25
- FDP_IFF.1: 17
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 18
- FIA_AFL.1: 5
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 9
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 45
- FMT_MSA.1: 8
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.1: 10
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 13
- FPT_PHP.3.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 4
- FTP_TRP: 9
- FTP_TRP.1: 3
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AC: 18
- O.RND: 4
- O.SC: 13
- T:
|
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 6
- A.PUSH_SERV: 1
- A.PUSH_SERVER: 3
- A.SAC: 6
- A.SM: 5
- O:
- O.AC-: 2
- O.ACCESS_CON-: 1
- O.ACCESS_CONTROL: 6
- O.MANAGEMENT: 7
- O.PIN_ENTRY: 6
- O.PRO-: 1
- O.PROTECTION: 8
- O.SECURE_CHANNEL: 4
- O.STATE: 7
- OE:
- OE.ADMIN: 6
- OE.CONNECTOR: 6
- OE.ENV: 13
- OE.PUSH_SERVER: 2
- OE.SAC: 10
- OE.SM: 3
- OSP:
- OSP.PIN_EN-: 1
- OSP.PIN_ENTRY: 4
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CON-: 1
- T.F-CONNECTOR: 2
- T.F-SAC: 7
- T.PIN: 6
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 4
- AES128: 1
- AES256: 1
- HPC:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- malfunction: 3
- SCA:
- Leak-Inherent: 10
- Physical Probing: 2
- physical probing: 4
|
|
| pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7500: 1
- BSI TR-03120: 2
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- PKCS:
- RFC:
- RFC3268: 2
- RFC5246: 1
- RFC5289: 1
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
- out of scope: 1
|
|
| pdf_data/st_metadata |
- /Author: FeliCa Networks, Inc
- /ChipVendor: Samsung
- /Company: FeliCa Networks, Inc
- /CreationDate: D:20160818133615+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /DocName: Security Target for Mobile FeliCa OS 3.0 on S3CS9AB
- /DocNumber: F03S-ASEP01-E01-70
- /DocVersion: 1.70
- /IssueDate: August 2016
- /ModDate: D:20160818134717+09'00'
- /ModelName: S3CS9AB
- /Producer: Adobe PDF Library 11.0
- /ProductName: Mobile FeliCa OS 3.0 on S3CS9AB
- /ProductType: Mobile FeliCa IC Chip
- /SourceModified: D:20160818042422
- pdf_file_size_bytes: 366825
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /CreationDate: D:20220601114222+02'00'
- /Creator: Microsoft® Word für Microsoft 365
- /ModDate: D:20220601114222+02'00'
- /Producer: Microsoft® Word für Microsoft 365
- /Subject: CC-Evaluierung ORGA 6141 online EAL3 augmented
- /Title: ORGA 6141 online Security Target
- pdf_file_size_bytes: 2805307
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |