| name |
Smart card reader SPR332 firmware version 6.01 |
SecurePay Platform V4.9.1 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
| scheme |
DE |
MY |
| status |
archived |
active |
| not_valid_after |
01.09.2019 |
16.06.2026 |
| not_valid_before |
19.02.2010 |
16.06.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C119-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurePay%20Security%20Target%20v1.0.pdf |
| manufacturer |
SCM Microsystems GmbH |
SecurePay Sdn. Bhd. |
| manufacturer_web |
https://www.scmmicro.com/ |
https://www.securepay.my/ |
| security_level |
EAL3+ |
EAL2 |
| dgst |
4dea0e662a7132d0 |
b61f25e372177a5d |
| heuristics/cert_id |
BSI-DSZ-CC-0592-2010 |
ISCB-5-RPT-C119-CR-v1 |
| heuristics/cert_lab |
BSI |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_LLD.1, ALC_TAT.1, ADV_FSP.1, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VAN.4, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, AVA_MSU.3, ATE_FUN.1, ALC_DVS.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
6.01 |
4.9.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0394-2006 |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0394-2006 |
{} |
| heuristics/scheme_data |
|
- cert_no: 2021-003-C119
- certification_date: 16.06.2021
- developer: SecurePay Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C119
- certification_date: 16.06.2021
- developer: A-3A-13, Blok A, Radia Office,Persiaran Arked, Bukit Jelutong,40150 Shah Alam, Selangor Amir Amir Haris Ahmad ([email protected]) https://www.securepay.my/
- expiration_date: 16.06.2026
- mutual_recognition: CCRA
- product: SecurePay Platform V4.9.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/ISCB-5-RPT-C119-CR-v1.pdf
- scope: The TOE is a software platform as a service whilst installed, configured and deployed on an enterprise cloud environment. The TOE is used by corporate, S_M_E_'s_ _or merchants as a secure payment processing platform for their customers. Users also able to perform e-commerce transaction, sending bills, bulk payments, collections and statutory payments. The TOE is connected to various banks which facilitate same day processing, ensure data integrity, reduces processing discrepancies and faster response time. It is simple, robust, user friendly, scalable, secured and available 24x7.Below are the primary features of the TOE: E-Commerce - Users able to use the TOE as an e-commerce portal and conduct business over the internet. Collection - Users able to create bill form and payment form for their customers Payment Processing - The TOE provides a secure payment processing platform and it is connected to various major banks in Malaysia API integration - Third-party developers able to use and access the TOE via API integrations
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/SecurePay_Security_Target_v1.0.pdf
- type: Other Devices and Systems
- expiration_date: 16.06.2026
- level: EAL2
- product: SecurePay Platform V4.9.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/131
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20210702032620Z00'00'
- /Creator: Word
- /ModDate: D:20210702032620Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 196015
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
0592a_pdf.pdf |
ISCB-5-RPT-C119-CR-v1.pdf |
| pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0592-2010
- cert_item: Smart card reader SPR332 firmware version 6.01
- cert_lab: BSI
- developer: SCM Microsystems GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0394-2006: 2
- BSI-DSZ-CC-0592: 1
- BSI-DSZ-CC-0592-2010: 17
|
- MY:
- ISCB-5-RPT-C119-CR-v1: 31
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 2
- EAL 3 augmented: 2
- EAL 4: 4
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 6
- EAL3 augmented: 1
- EAL3+: 1
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 4
- ADO_IGS: 2
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.1: 4
- ADV_INT: 2
- ADV_LLD: 2
- ADV_LLD.1: 4
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 2
- ALC_TAT.1: 4
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VAN.4: 1
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 5
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 2
- FIA_UAU.6: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.CLOUD: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.TIMESTAMP: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-8: 4
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- Report, Version 5, 2009-12-15, EVALUATION TECHNICAL REPORT (ETR), TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 3.10, 2009-08-28, Configuration Item Record: 1
|
|
| pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100308113143+01'00'
- /Creator: Writer
- /Keywords: "SCM Microsystems GmbH, smart card reader SPR332 firmware version 6.01, class 2 smart card reader"
- /ModDate: D:20100309113000+01'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0592-2010
- pdf_file_size_bytes: 756117
- pdf_hyperlinks: https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /CreationDate: D:20210624100326Z00'00'
- /Creator: Word
- /ModDate: D:20210624100326Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 952717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
| pdf_data/st_filename |
0592b_pdf.pdf |
SecurePay Security Target v1.0.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.2: 4
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_LLD.1: 4
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 2
- ALC_TAT: 1
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 1
- AVA_MSU.3: 3
- AVA_SOF.1: 1
- AVA_VLA.4: 4
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.4: 4
- FCS_COP: 16
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 7
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ITC.1: 4
- FDP_RIP: 1
- FDP_RIP.2: 6
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.2: 4
- FMT_MSA.3: 2
- FPT:
- FTA:
|
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.DOWNLOAD: 3
- O.INS_BYTE: 4
- O.REVEAL: 5
- O.SEAL: 5
- O.SIGNAL: 4
- O.STORE: 3
- O.TRANSFER: 2
- OE:
- OE.FWLOAD: 3
- OE.ISO_EMV: 1
- OE.KEYPAD: 1
- OE.LED: 2
- OE.SEAL: 3
- OE.SIG_APP: 1
- OE.STORE: 2
- OE.UNOBSERV: 1
- OE.USAGE: 2
- OE.VERSION: 1
- OP:
- OP.F_DOWNLD: 2
- OP.L_CONTROL: 2
- OP.P_ENTRY: 2
- OP.P_VERIFY: 1
- T:
- T.DOWNLOAD: 3
- T.REVEAL: 3
- T.SEAL: 2
- T.STORE: 2
|
- A:
- A.CLOUD: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.TIMESTAMP: 3
- O:
- O.ACC_CONTROL: 1
- O.ACC_CTRL: 4
- O.AUDREC: 3
- O.AUTH: 4
- O.MANAGE: 4
- O.PASSWORD: 3
- O.TOECOM: 4
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 4
- OE.CLOUD: 2
- OE.TIMESTAMP: 3
- T:
- T.AUDREC: 3
- T.NOMGMT: 2
- T.PSWD_CRACKING: 2
- T.UNAUTH: 3
- T.WEB_ATTACK: 3
|
| pdf_data/st_keywords/vendor |
|
- Microsoft:
- STMicroelectronics:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- ISO:
- ISO/IEC 10118-3: 1
- ISO/IEC 14888-: 1
- ISO/IEC 7816: 2
- ISO/IEC 7816-4: 15
- PKCS:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: SCM Microsystems GmbH
- /CreationDate: D:20090903094043Z
- /Creator: FreePDF XP 3.24 - http://shbox.de
- /Keywords: smart card reader, evaluation, SPR332, Common Criteria, Security Target
- /ModDate: D:20100308145215+01'00'
- /Producer: AFPL Ghostscript 8.54
- /Subject: Security Target for the smart card reader SPR 332
- /Title: Security_Target_SPR332_135
- pdf_file_size_bytes: 315728
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |