name |
Symfoware Server Enterprise extended Edtion 4.0 |
Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816 |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
26.10.2021 |
not_valid_before |
26.11.2003 |
26.10.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_69fr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-lite_2016_69.pdf |
manufacturer |
Fujitsu Limited |
ERCOM SA. |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.ercom.fr |
security_level |
EAL4 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
505e2adba5d4a6cf |
9c61ce98b4f287da |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
ANSSI-CC-2016/69 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AVA_VLA.5, AVA_VAN.5, ADV_FSP.4, ALC_DVS.2, AGD_OPE.1, ALC_FLR.3, ADV_ARC.1, ADV_TDS.3, ADV_IMP.2, ATE_DPT.1, ASE_TSS.2, AGD_PRE.1 |
heuristics/extracted_versions |
4.0 |
5.1, 7.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0857-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/38 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-V2-2015, BSI-DSZ-CC-0857-2013 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2012/30, BSI-DSZ-CC-0857-V2-2015, ANSSI-CC-2012/71 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0555-2009, ANSSI-CC-2012/30, BSI-DSZ-CC-0857-V2-2015, ANSSI-CC-2012/71 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
ANSSI-CC-2016_69fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/69
- cert_item: Cryptosmart Card applet V5.1 sur la plateforme OBERTHUR ID-ONE COSMO V7.0.1-R2, version 816
- cert_item_version: V5.1
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: ERCOM 6, rue Dewoitine 78140 Vélizy France OBERTHUR TECHNOLOGIES 420, rue d’Estienne d’Orves 92700 Colombes France NXP Semiconductors Stresemannallee 101 D-22502 Hamburg Germany Commanditaire ERCOM 6, rue Dewoitine 78140 Vélizy France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Aucun
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0857-V2-2015: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.5: 5
- AVA_VLA.5: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 11
- NXP Semiconductors: 1
- Oberthur:
|
pdf_data/report_keywords/eval_facility |
|
- CESTI:
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_69fr
- pdf_file_size_bytes: 391988
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
|
Cible-lite_2016_69.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0857-V2-2015: 1
- FR:
- ANSSI-CC-2012/30: 1
- ANSSI-CC-2012/71: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 2
- ADV_FSP.4: 1
- ADV_IMP: 2
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 2
- ADV_SPM: 1
- ADV_TDS: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 2
- ALC_CMS: 2
- ALC_DEL: 2
- ALC_DVS: 5
- ALC_DVS.2: 2
- ALC_FLR: 1
- ALC_FLR.3: 1
- ALC_LCD: 2
- ALC_TAT: 2
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_OBJ: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_DPT.1: 1
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 20
- FCS_CKM.2: 3
- FCS_CKM.3: 1
- FCS_CKM.4: 25
- FCS_COP: 14
- FCS_COP.1: 45
- FCS_COP.1.1: 2
- FCS_RNG: 3
- FDP:
- FDP_ACC: 16
- FDP_ACC.1: 18
- FDP_ACC.2: 6
- FDP_ACF: 21
- FDP_ACF.1: 14
- FDP_ETC: 8
- FDP_ETC.1: 2
- FDP_IFC.1: 12
- FDP_IFF: 1
- FDP_ITC: 20
- FDP_ITC.1: 8
- FDP_ITC.2: 10
- FDP_RIP: 6
- FDP_RIP.1: 25
- FDP_ROL: 2
- FDP_ROL.1: 4
- FDP_SDI.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 14
- FIA_ATD: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_SOS.2: 7
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU: 2
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID: 6
- FIA_UID.1: 3
- FIA_USB.1: 1
- FMT:
- FMT_MSA: 35
- FMT_MSA.1: 6
- FMT_MSA.3: 9
- FMT_MTD: 3
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_SMF: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_RCV: 1
- FPR_UNO: 4
- FPR_UNO.1: 4
- FPT:
- FPT_AMT.1: 1
- FPT_FLS: 4
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_PHP: 5
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FPT_RCV: 3
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_RVM.1: 3
- FPT_SEP.1: 2
- FPT_TDC: 1
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 3
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 1
- FRU_RSA: 1
- FRU_RSA.1: 2
- FTP:
- FTP_ITC.1: 2
- FTP_TRP: 1
- FTP_TRP.1: 10
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.CONFIGURATION: 3
- A.KEY_QUALITY: 2
- A.SECURE_KEY_MANAGEMENT: 2
- A.TRAINED_ADMIN: 2
- A.TRUSTED_ADMIN: 3
- D:
- D.APDU_KEYS: 5
- D.APP_CODE: 3
- D.PLAINTEXT_DATA: 4
- D.SESSION_KEYS: 5
- D.TOE_INTERNAL_DATA: 6
- D.TOE_INTERNAL_INFORMATION: 2
- D.USER_AUTH_CODE: 6
- D.USER_SIGNATURE_KEY: 7
- D.USER_STORED_DATA: 4
- D.USER_STORED_KEYS: 6
- O:
- O.ALARM: 2
- O.APDU_ENCRYPTION: 7
- O.CIPHER: 2
- O.CRYPTOGRAPHIC_OPERATION: 12
- O.EMSEC: 8
- O.FUNCTION_ACCESS_CONTROL: 9
- O.KEY-MNGT: 2
- O.KEY_MANAGEMENT: 8
- O.LIMITED_AUTH_NUMBER: 6
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.PROTECT_SESSION_KEY: 7
- O.PUK_UNBLOCK: 6
- O.REALLOCATION: 2
- O.RESSOURCES: 1
- O.SCP: 4
- O.SCP_RECOVERY: 1
- O.SECURE_COMPARE: 1
- O.SENSITIVE_MEMORY_ERASING: 6
- O.SENSITIVE_MEMORY_ERASINGENFORCING: 1
- O.STRONG_MUTUAL_AUTHENTICATION: 8
- O.STRONG_SECCODE: 8
- O.TAMPER_DETECTION: 6
- O.TAMPER_RESISTANCE: 8
- O.TRANSACTION: 2
- O.USER_AUTHENTICATION: 8
- O.WIPE: 5
- OE:
- OE.ADMIN: 4
- OE.APPLET: 1
- OE.CARD_ADMIN_STATION: 4
- OE.HOST_AUDIT: 3
- OE.HOST_CORRECT_BEHAVIOR: 4
- OE.KEY_GENERATOR: 4
- OE.NON_TRIVIAL_SECCODE: 2
- OE.SECURE_KEY_MANAGEMENT: 3
- OE.SECURE_PERSONALIZATION: 3
- OE.SECURE_SECCODE_ENTRY: 2
- OE.VERIFICATION: 1
- OSP:
- OSP: 1
- OSP.ACCESS_CONTROL: 2
- OSP.DATA_WIPE: 3
- OSP.KEY_STORAGE: 3
- OSP.LOCAL_AUTHENTICATION: 3
- OSP.MUTUAL_AUTHENTICATION: 2
- OSP.PUK_UNBLOCK: 2
- OSP.RGS_CRYPTO: 3
- OSP.RSA_PRIVATE_KEY_OPERATION: 2
- OSP.SYMMETRIC_ENCRYPTION: 4
- OSP.SYMMETRIC_INTEGRITY: 2
- OSP.TOE_AUDIT: 3
- OSP.VERIFICATION: 1
- T:
- T.ABUSE_FUNC: 3
- T.INTERFACE_EAVESDROP: 3
- T.KEY_DERIVE: 2
- T.MASQUERADE: 3
- T.PHYSICAL: 3
- T.TOE_DATA_COMPROMISE: 2
- T.TOE_DATA_CORRUPTION: 3
|
pdf_data/st_keywords/vendor |
|
- NXP:
- Oberthur:
- Oberthur: 4
- Oberthur Technologies: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- side channel: 5
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 180-4: 3
- FIPS PUB 197: 2
- FIPS PUB 198-1: 3
- ISO:
- PKCS:
- PKCS #1: 3
- PKCS #11: 1
- PKCS #3: 1
- PKCS#1: 12
- PKCS#11: 8
- PKCS#3: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2: 1
- Java Card 2.2.2: 1
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: julien.kowalski
- /CreationDate: D:20161107162613+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20161107162613+01'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: Cryptosmart card 5.1
- pdf_file_size_bytes: 2770686
- pdf_hyperlinks: http://www.ssi.gouv.fr/site_article38.html
- pdf_is_encrypted: False
- pdf_number_of_pages: 92
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |