name |
Symfoware Server Enterprise extended Edtion 4.0 |
IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71 |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
IT |
status |
archived |
active |
not_valid_after |
10.12.2010 |
11.10.2026 |
not_valid_before |
26.11.2003 |
11.10.2021 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34p1_qscd_v1.0_en.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34p1_qscd_v1.05.pdf |
manufacturer |
Fujitsu Limited |
ID&Trust Ltd. |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.idandtrust.com/ |
security_level |
EAL4 |
EAL4+, AVA_VAN.5 |
dgst |
505e2adba5d4a6cf |
79ad3198683a51cf |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
OCSI/CERT/CCL/07/2021/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ADV_COMP.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ATE_COMP.1, ALC_COMP.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
3.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
OCSI/CERT/CCL/10/2022/RC |
heuristics/report_references/directly_referencing |
{} |
OCSI/CERT/SYS/07/2016/RC, BSI-DSZ-CC-1136-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/10/2022/RC |
heuristics/report_references/indirectly_referencing |
{} |
OCSI/CERT/SYS/07/2016/RC, BSI-DSZ-CC-1136-2021 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021 |
heuristics/protection_profiles |
{} |
1f7ea2e05de5b88b, d918b28fd7bb5d79 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
cr_idapplet34p1_qscd_v1.0_en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- IT:
- OCSI/CERT/CCL/07/2021/RC: 32
- OCSI/CERT/SYS/07/2016/RC: 1
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COMP: 1
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP: 1
- AVA_COMP.1: 1
- AVA_VAN.5: 8
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 20
- NXP Semiconductors: 4
|
pdf_data/report_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: OCSI
- /CreationDate: D:20211011115757+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20211011115757+00'00'
- /Title: Certification Report "IDentity Applet v3.4-p1/QSCD on NXP JCOP 4 P71"
- pdf_file_size_bytes: 560124
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
pdf_data/st_filename |
|
st_idapplet34p1_qscd_v1.05.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 3
- BSI-CC-PP-0056-: 1
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0087: 2
- BSI-CC-PP-0099-2017: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 6: 2
- EAL 6+: 1
- EAL4: 11
- EAL4 augmented: 6
- EAL4+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 3
- ADV_IMP.1: 3
- ADV_SPM.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.1: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 4
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 2
- FAU_GEN: 1
- FAU_SAS.1: 1
- FCO:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 14
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 14
- FCS_CKM.4.1: 1
- FCS_COP: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FCS_RNG.1: 4
- FDP:
- FDP_ACC: 36
- FDP_ACC.1: 19
- FDP_ACC.2: 4
- FDP_ACF: 30
- FDP_ACF.1: 24
- FDP_DAU: 11
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 10
- FDP_IFC.2: 2
- FDP_IFF.1: 4
- FDP_ITC.1: 4
- FDP_ITC.2: 5
- FDP_RIP: 1
- FDP_RIP.1: 17
- FDP_RIP.1.1: 1
- FDP_ROL.1: 2
- FDP_SDI: 21
- FDP_SDI.1: 2
- FDP_SDI.2: 9
- FDP_UIT.1: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 7
- FIA_API.1: 11
- FIA_API.1.1: 2
- FIA_ATD.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UID: 1
- FIA_UID.1: 17
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 26
- FMT_MSA.1: 15
- FMT_MSA.2: 11
- FMT_MSA.2.1: 1
- FMT_MSA.3: 27
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 20
- FMT_MTD.1: 3
- FMT_MTD.3: 1
- FMT_SMF: 2
- FMT_SMF.1: 31
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 32
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 2
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_PHP: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_RCV.3: 1
- FPT_TDC.1: 1
- FPT_TST: 3
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 6
- OE.KEY-CHANGE: 1
- OE.PROCESS_SEC_IC: 1
- OE.SECURITY-: 1
- OE.USE_DIAG: 1
- OE.USE_KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-: 1
- OT:
- OT.ALARM: 1
- OT.APPLI-AUTH: 1
- OT.ATTACK-COUNTER: 1
- OT.CARD-CONFIGURATION: 1
- OT.CARD-MANAGEMENT: 1
- OT.CIPHER: 1
- OT.COMM_AUTH: 1
- OT.COMM_CONFIDENTIALITY: 1
- OT.COMM_INTEGRITY: 1
- OT.DOMAIN-RIGHTS: 1
- OT.FIREWALL: 1
- OT.GLOBAL_ARRAYS_CONFID: 1
- OT.GLOBAL_ARRAYS_INTEG: 1
- OT.IDENTIFICATION: 1
- OT.KEY-MNGT: 1
- OT.NATIVE: 1
- OT.OBJ-DELETION: 1
- OT.OPERATE: 1
- OT.PIN-MNGT: 1
- OT.REALLOCATION: 1
- OT.RESOURCES: 1
- OT.RESTRICTED-MODE: 1
- OT.RND: 1
- OT.RNG: 1
- OT.SCP: 3
- OT.SEC_BOX_FW: 1
- OT.SENSITIVE_RESULTS_INTEG: 1
- OT.SID_MODULE: 1
- OT.TRANSACTION: 1
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 5
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 2
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-03110: 3
- BSI TR-03110-1: 1
- BSI TR-03110-2: 1
- BSI TR-03110-3: 1
- BSI TR-03110-4: 1
- BSI TR-03117: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 2
- ISO/IEC 7816-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- • OT.CARD-CONFIGURATION • OT.ATTACK-COUNTER • OT.RESTRICTED-MODE cannot be mapped because these are out of scope. 103 The objectives for the operational environment can be mapped as follows: Security Objectives: 1
|
pdf_data/st_metadata |
|
- /Author: David Lovasz
- /CreationDate: D:20210707095150+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20210707095150+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: IDentity Applet V3.4 /QSCD - Security Target
- pdf_file_size_bytes: 2377998
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 75
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |