name |
HiRDB / Single Server Version 7 07-03 |
ID-One ePass 64 v1 with BAC and AA embedded on secure microcontroller Atmel |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
22.11.2006 |
11.06.2008 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0065_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_16en.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2008_16en.pdf |
manufacturer |
Hitachi, Ltd. |
Oberthur Card System / Philips (NXP) |
manufacturer_web |
https://www.hitachi.com/ |
https://www.oberthur.com/ |
security_level |
EAL1 |
ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst |
6b0ce7e3167a63fb |
144b70bf62163c00 |
heuristics/cert_id |
JISEC-CC-CRP-C0065 |
ANSSI-CC-2008/16 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AVA_VLA.4, ALC_DVS.2, ADV_IMP.2, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
7, 07, 03 |
64 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2008/05, ANSSI-CC-2008/12 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2007/04, ANSSI-CC-2008/05, ANSSI-CC-2008/03, ANSSI-CC-2008/12, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0098
- certification_date:
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE(HiRDB / Single Server Version 8) is a software product for Relational Database Management System(RDBMS). The TOE acts as a database server and provides access to the information stored in the database. Users generally access to the information stored in the database by requests for SQL execution at HiRDB server from HiRDB clients. The TOE provides functions that work for various and efficient data manipulation to meet the needs of users. And it also provides security functions that restrict access to user data to authorized users. Security functions of the TOE include the following. - Audit - Discretionary Access Control - Identification and Authentication - Security Management
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: HiRDB / Single Server Version 8
- product_type: IT Product (Data Base Management System)
- toe_version: 08-01
- vendor: Hitachi, Ltd.
- expiration_date: 01.10.2013
- supplier: Hitachi, Ltd.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0098_it7133.html
- toe_japan_name: HiRDB / Single Server Version 8 08-01
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2008/05 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2008/05 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0065_ecvr.pdf |
dcssi-2008_16en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ADV_IMP.2, ALC_DVS.2
- cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
- cert_id: DCSSI-2008/16
- cert_item: ID-One ePass 64 v1 on Atmel with BAC and AA
- cert_item_version: Reference of the application: LDS 1.7 on AT90SC12872RCFT, version 1.0 Reference of the microcontroller with embedded software: AT90SC12872RCFT - M / AT58803-O-AA
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Tél : +33 (0)5 57 26 08 75, mél : [email protected]
- developer: Oberthur Technologies 71-73, Rue des Hautes Pâtures – 92726 Nanterre Cedex, France ATMEL Secure Microcontroller SolutionsMaxwell Building - Scottish Enterprise technology ParkEast Kilbride, G75 0QR – Scotland, United Kingdom Sponsor Oberthur Technologies 71-73, Rue des Hautes Pâtures – 92726 Nanterre Cedex, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-PP-0017 version 1.0 Common Criteria Protection Profile - Machine Readable Travel Document with “ICAO Application”, Basic Access Control
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0065: 1
|
- FR:
- DCSSI-2008/05: 1
- DCSSI-2008/12: 2
- DCSSI-2008/16: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL5+: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 1
- ACM_SCP: 1
- ADO:
- ADV:
- ADV_FSP: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_LLD: 1
- ADV_RCR: 1
- ADV_SPM: 1
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_VLA: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur: 1
- Oberthur Technologies: 9
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- CCMB-2005-08-004: 1
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061122204438+09'00'
- /ModDate: D:20061122204438+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 20053
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Mathieu Robert
- /CreationDate: D:20080611132943+02'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.5
- /ModDate: D:20080611132945+03'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: ID-One ePass 64 v1 on Atmel with BAC and AA
- /Title: DCSSI-2008/16
- pdf_file_size_bytes: 254122
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
|
dcssi-cible2008_16en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- DCSSI-2008/05: 2
- DCSSI-2008/5: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0017: 1
- BSI-PP-0002-2001: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4 augmented: 2
- EAL4+: 3
- EAL5+: 3
|
pdf_data/st_keywords/cc_sar |
|
- ACM:
- ADO:
- ADV:
- ADV_IMP.2: 1
- ADV_SPM.1: 1
- ALC:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 21
- FCS_CKM.2: 3
- FCS_CKM.4: 19
- FCS_COP: 14
- FCS_COP.1: 26
- FCS_RND: 9
- FCS_RND.1: 10
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 23
- FDP_ACF: 6
- FDP_ACF.1: 20
- FDP_DAU: 3
- FDP_DAU.1: 3
- FDP_IFC: 1
- FDP_IFC.1: 5
- FDP_IFF: 1
- FDP_ITC: 4
- FDP_ITC.1: 13
- FDP_ITC.1.3: 1
- FDP_ITC.2: 11
- FDP_UCT: 6
- FDP_UCT.1: 7
- FDP_UIT: 6
- FDP_UIT.1: 7
- FIA:
- FIA_API: 6
- FIA_API.1: 6
- FIA_UAU: 17
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 2
- FIA_UAU.6: 6
- FIA_UID.1: 5
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 1
- FMT_LIM.1: 8
- FMT_LIM.1.1: 1
- FMT_LIM.2: 7
- FMT_LIM.2.1: 1
- FMT_MOF: 2
- FMT_MOF.1: 10
- FMT_MOF.1.1: 2
- FMT_MSA.2: 13
- FMT_MSA.3: 3
- FMT_MTD: 7
- FMT_MTD.1: 17
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RVM.1: 4
- FPT_RVM.1.1: 1
- FPT_SEP.1: 5
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 4
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.CONFIG: 1
- O.HW_AES: 1
- O.IC: 2
- O.MEM_ACCESS: 1
- O.MF_FW: 1
- O.RND: 4
- O.SFR_ACCESS: 1
- O.TOE: 2
- OE:
- T:
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- OBERTHUR: 9
- Oberthur: 1
- Oberthur Technologies: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 2
- Triple-DES: 17
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 13
- Physical Tampering: 2
- Physical tampering: 1
- fault injection: 1
- malfunction: 5
- physical tampering: 2
- SCA:
- DPA: 1
- Leak-Inherent: 6
- Physical Probing: 1
- physical probing: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 4
- EF.DG15: 5
- EF.SOD: 2
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCIMB-2004-01-003: 1
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 46-3: 3
- ICAO:
- ISO:
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 7816-2: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: 20080529191302FRNA-1170
- /CreationDate: D:20080529191251+02'00'
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20080611133111+03'00'
- /Producer: AFPL Ghostscript 8.50
- /Title: FQR 110 4119 ST
- pdf_file_size_bytes: 800232
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 100
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |