name |
MULTOS SM10 R2 V1.0 |
Remote Communication Gate Application Software 3.34 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Network and Network-Related Devices and Systems |
scheme |
KR |
JP |
status |
archived |
archived |
not_valid_after |
01.06.2019 |
07.10.2013 |
not_valid_before |
29.09.2006 |
28.06.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-51-EN.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0048_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-51-ST-EN.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer |
Samsung SDS |
Ricoh Company, Ltd. |
manufacturer_web |
https://www.sds.samsung.co.kr |
|
security_level |
ADV_IMP.2, ATE_DPT.2, AVA_VLA.4, EAL4+, ALC_DVS.2 |
EAL3 |
dgst |
88b6936acbc0755d |
16c85272260e72be |
heuristics/cert_id |
KECS-ISIS-0051-2006 |
JISEC-CC-CRP-C0048 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ADV_FSP.2, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_LCD.1, ADV_DVS.2, ATE_FUN.1, ADV_IMP.2, AVA_VLA.4, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
{} |
heuristics/extracted_versions |
1.0 |
3.34 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: SmartCard Operating System
- cert_id: KECS-ISIS-0051-2006
- certification_date: 29.09.2006
- enhanced:
- level: EAL4+
- product: MULTOS SM10
- product_link: https://itscc.kr/certprod/view.do?product_id=51&product_class=4
- vendor: Samsung SDS
|
- cert_id: JISEC-CC-CRP-C0048
- certification_date: 01.06.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0048_eimg.pdf
- description: PRODUCT DESCRIPTION Remote Communication Gate Type N/L/BN1/BM1 (hereafter "RC Gate") is a communication device, which connects image I/O devices to a remote server. RC Gate is used primarily in business offices and offers the maintenance services such as machine trouble notification, automatic counter checking, ordering supplies like toner and firmware upgrading for the image I/O device. The TOE is application software embedded in the RC Gate. The security features of RC Gate are identification and authentication of operators, access control facilities for operators, identification and authentication of the server based on a digital certificate, and encrypted communication to protect information from Internet or telephone line threats.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Remote Communication Gate Application Software
- product_type: IT Product (Software for remote service appliance)
- report_link: https://www.ipa.go.jp/en/security/c0048_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0048_est.pdf
- toe_version: 3.34
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2008-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0048_it5049_02.html'})]
- supplier: Ricoh Company, Ltd.
- toe_japan_name: Remote Communication Gate Application Software 3.34
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0048_it5049.html
- toe_overseas_name: Remote Communication Gate Application Software 3.57
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ISIS-51-EN.pdf |
c0048_ecvr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0048: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4+: 1
- EAL4: 2
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 3
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: son
- /CreationDate: D:20061031112738+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20061031112738+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: KECS-ISIS-0051-2006 Cert Report(SDS MULTOS SM10 R2).hwp
- pdf_file_size_bytes: 698710
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20060628102008+09'00'
- /ModDate: D:20060628102008+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12877
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
ISIS-51-ST-EN.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL3: 1
- EAL4: 37
- EAL4+: 8
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 11
- ACM_CAP.3: 3
- ACM_CAP.4: 21
- ACM_SCP.1: 1
- ACM_SCP.2: 8
- ADO:
- ADO_DEL.2: 10
- ADO_IGS.1: 9
- ADV:
- ADV_DVS.2: 1
- ADV_FSP.1: 10
- ADV_FSP.2: 12
- ADV_HLD.1: 1
- ADV_HLD.2: 20
- ADV_IMP.1: 5
- ADV_IMP.2: 18
- ADV_LLD.1: 21
- ADV_RCR.1: 11
- ADV_SPM.1: 19
- AGD:
- AGD_ADM.1: 21
- AGD_USR.1: 15
- ALC:
- ALC_DVS.1: 3
- ALC_DVS.2: 17
- ALC_LCD.1: 9
- ALC_TAT.1: 12
- ATE:
- ATE_COV.2: 8
- ATE_DPT.2: 14
- ATE_FUN.1: 16
- ATE_IND.2: 10
- AVA:
- AVA_MSU.2: 15
- AVA_SOF.1: 9
- AVA_VLA.4: 25
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 11
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 5
- FCS_COP.1: 10
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 6
- FDP_ACC.2: 7
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 4
- FDP_RIP: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_MTD.2: 8
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_ACC.2: 1
- FPT_AMT.1: 8
- FPT_AMT.1.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 8
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_RCV.4: 8
- FPT_RCV.4.1: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APP_INS: 3
- A.ATK_LEV: 3
- A.SEC_CNL: 3
- A.TOE_HNDL: 3
- A.TSF_DAT: 2
- A.UNDER_HW: 4
- O:
- O.ACC_AUTH: 3
- O.APP_SEP: 2
- O.AUTH_ISS: 3
- O.AUTH_RPR: 5
- O.AUTH_USR: 5
- O.CNR_LEAK: 10
- O.DAT_PROT: 5
- O.REM_RES: 3
- O.ROLLBACK: 5
- OE:
- OE.APP_INS: 3
- OE.ATK_LEV: 2
- OE.C_TAMPER: 2
- OE.OPN_PLAT: 7
- OE.SEC_CNL: 2
- OE.TRAINING: 5
- OE.TSF_DAT: 3
- OE.UNDER_HW: 4
- T:
- T.ABN_END: 3
- T.ISS_ABU: 4
- T.LEAK_INF: 3
- T.LOGI_ATK: 7
- T.REP_AUTH: 3
- T.RES_COL: 3
- T.RES_REU: 4
- T.SES_TEAR: 4
- T.TAMPER: 5
- T.UNAU_APP: 4
- T.UNAU_IFD: 7
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical tampering: 1
- malfunction: 1
- physical tampering: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- ISO:
- ISO/IEC 10536: 2
- ISO/IEC 14443: 2
- ISO/IEC 7810: 2
- ISO/IEC 7816: 2
- PKCS:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: <C0CCC1D8C8A3>
- /CreationDate: D:20061113110857
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20061113110857
- /Producer: AFPL Ghostscript 8.0
- /Title: Microsoft Word - [KC067-SP-0101]MULTOS - Security Target1.2_Public_R0.9.doc
- pdf_file_size_bytes: 3793683
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |