name |
Mobile FeliCa OS 3.0 on T6NE1/0115_432B |
CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
active |
not_valid_after |
05.09.2021 |
08.10.2028 |
not_valid_before |
05.09.2016 |
09.10.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0513V3b_pdf.pdf |
manufacturer |
FeliCa Networks, Inc |
Cherry GmbH |
manufacturer_web |
https://https://www.felicanetworks.co.jp/en/ |
https://www.cherrycorp.com/ |
security_level |
EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 |
ADV_FSP.4, AVA_VAN.4, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 |
dgst |
6835e0576746ad57 |
21fe19a80fe913d5 |
heuristics/cert_id |
SERTIT-081 |
BSI-DSZ-CC-0513-V3-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
heuristics/extracted_versions |
3.0 |
1.1.1, 3.3.3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0513-V2-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0513-V2-2018 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 05.09.2016
- developer: FeliCa Networks, Inc.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-081
- certification_date: 05.09.2016
- description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
- developer: FeliCa Networks, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
- sponsor: FeliCa Networks, Inc.
- product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
- url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
|
- category: eHealth
- cert_id: BSI-DSZ-CC-0513-V3-2023
- certification_date: 09.10.2023
- enhanced:
- applicant: Cherry Digital Health GmbH Cherrystraße 2 91275 Auerbach/Opf Deutschland
- assurance_level: EAL3+,ADV_FSP.4,ADV_IMP.1,ADV_TDS.3,ALC_TAT.1,AVA_VAN.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3c_pdf.html?nn=456648
- certification_date: 09.10.2023
- description: The TOE is the smart card keyboard "G87-1505" version 3.0.1:1.1.1 with integrated smart card readers. It fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0513-V3-2023 (09.10.2023)', 'description': 'Certificate'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change. Only the secure delivery-chain has been updated.'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change. Only the secure delivery-chain has been updated.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 08.10.2028
- product: CHERRY eHealth Terminal G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22. Mai 2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0513V3b_pdf.pdf?__blob=publicationFile&v=2
- product: CHERRY eHealth Terminal G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0513.html
- vendor: Cherry Digital Health GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
e1444c335eeed890 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0032V2b_pdf.pdf |
pdf_data/cert_filename |
|
0513V3c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0513-V3-2023: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017"
- /Subject: Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- /Title: Certificate BSI-DSZ-CC-0513-V3-2023
- pdf_file_size_bytes: 235695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
SERTIT-081 CR 1.0.pdf |
0513V3a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADR_IMP.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.4 valid until: 08 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 conformant
- cert_id: BSI-DSZ-CC-0513-V3-2023
- cert_item: CHERRY eGK Tastatur G87-1505 FW-Version 3.3.3 HW-Version 1.1.1
- cert_lab: BSI
- developer: Cherry Digital Health GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC- PP-0032-V2-2015-MA-01, 22 May 2017
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0513-V2-: 1
- BSI-DSZ-CC-0513-V2-2018: 1
- BSI-DSZ-CC-0513-V3-2023: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-V2-2015-MA-01: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 18
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL 5: 2
- EAL3+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_TDS.3: 4
- ALC:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 4
- SHA256: 1
- SHA384: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
- TLS:
- TLS:
- TLS: 3
- TLS v1.2: 1
- TLSv1.2: 2
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
- G87:
- G87-1505: 10
- G87-1505LBZDE-: 1
- G87-1505LBZDE-10: 1
- G87-1505LBZDE-10_2017-12-19: 1
- G87-1505LBZDE-2: 1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- BSI:
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC 4492: 1
- RFC 5639: 1
- RFC1321: 1
- RFC2104: 2
- RFC2404: 1
- RFC2526: 1
- RFC3602: 1
- RFC5246: 2
- X509:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7] Evaluation Technical Report (ETR Summary), Version 2, 2023-08-21, TÜV Informationstechnik GmbH, (confidential document) [8] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- xlsx and G87-1505LBZDE-10_2017-12-19.xlsx, 2017-12-19, Bibliography G-87-1505 V4.0, 2023-07-23 (confidential document) [10] Handbuch für Administratoren eGK Tastatur G87-1505, Version 6440650-04, Feb 2018, Cherry GmbH: 1
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Wei Yuan
- /CreationDate: D:20160905104440Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20160905104440Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1388306
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /Keywords: "Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017"
- /Subject: Common Criteria, Certification, Zertifizierung, Cherry Digital Health GmbH, eHealth, Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- /Title: Certification Report BSI-DSZ-CC-0513-V3-2023
- pdf_file_size_bytes: 435399
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
[STP-T] F03T-ASEP01-E01-70.pdf |
0513V3b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0032-: 1
- BSI-CC-PP-0046: 1
- BSI-CC_PP_0032-V3-2016: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 3
- EAL 3 augmented: 3
- EAL3+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ATE:
- ATE_DPT.2: 6
- ATE_FUN.1: 2
- AVA:
|
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 5
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 4
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_RNG: 1
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITT.1: 6
- FDP_ITT.1.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 23
- FCS_CKM.2: 4
- FCS_CKM.4: 32
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 15
- FDP_ACC.1: 23
- FDP_ACF: 17
- FDP_ACF.1: 16
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC: 22
- FDP_IFC.1: 12
- FDP_IFF: 23
- FDP_IFF.1: 14
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 2
- FIA_ATD.1: 7
- FIA_ATD.1.1: 2
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 8
- FIA_UAU.7.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MSA: 22
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 19
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR.1: 23
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 2
- FPT_ITT.1: 8
- FPT_ITT.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 12
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.2: 11
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTA:
- FTP:
- FTP_ITC: 3
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 4
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AC: 18
- O.RND: 4
- O.SC: 13
- T:
|
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 7
- A.PUSH_SERVER: 4
- A.SM: 6
- O:
- O.ACCESS_CONTROL: 9
- O.MANAGEMENT: 7
- O.PIN_ENTRY: 6
- O.PROTECTION: 9
- O.SECURE_CHANNEL: 4
- O.STATE: 7
- OE:
- OE.ADMIN: 4
- OE.CONNECTOR: 6
- OE.ENV: 11
- OE.PUSH_SERVER: 4
- OE.SM: 2
- OSP:
- OSP.PIN: 1
- OSP.PIN_ENTRY: 4
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CONNECTOR: 3
- T.PIN: 6
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 4
- brainpoolP384r1: 3
- NIST:
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 5
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 5
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 5
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 5
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 5
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- malfunction: 3
- SCA:
- Leak-Inherent: 10
- Physical Probing: 2
- physical probing: 4
|
- FI:
- Physical tampering: 1
- physical tampering: 12
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 7500: 1
- BSI 7586: 1
- BSI TR-03116: 1
- BSI TR-03120: 3
|
pdf_data/st_keywords/device_model |
|
- G87:
- G87-1505: 7
- G87-1505LBZDE-2: 1
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- ISO:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC 4346: 1
- RFC 5246: 1
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
- out of scope: 1
|
- SecurityFunction:
- Security function SF.2: 1
|
pdf_data/st_metadata |
- /Author: FeliCa Networks, Inc
- /ChipVendor: Toshiba
- /Company: FeliCa Networks, Inc
- /CreationDate: D:20160708165517+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
- /DocNumber: F03T-ASEP01-E01-70
- /DocVersion: 1.70
- /IssueDate: June 2016
- /ModDate: D:20160708171515+09'00'
- /ModelName: T6NE1
- /Producer: Adobe PDF Library 11.0
- /ProductName: Mobile FeliCa OS 3.0 on T6NE1
- /ProductType: Mobile FeliCa IC Chip
- /SourceModified: D:20160708065621
- pdf_file_size_bytes: 365339
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |