name |
MULTOS SM10 R2 V1.0 |
Data Security Kit(D) Software V1.00E |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
KR |
JP |
status |
archived |
archived |
not_valid_after |
01.06.2019 |
31.01.2013 |
not_valid_before |
29.09.2006 |
31.10.2006 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-51-EN.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0057_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISIS-51-ST-EN.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer |
Samsung SDS |
KYOCERA MITA Corporation |
manufacturer_web |
https://www.sds.samsung.co.kr |
|
security_level |
ADV_IMP.2, ATE_DPT.2, AVA_VLA.4, EAL4+, ALC_DVS.2 |
EAL3 |
dgst |
88b6936acbc0755d |
48b4705efb8d55e7 |
heuristics/cert_id |
KECS-ISIS-0051-2006 |
JISEC-CC-CRP-C0057 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_RCR.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ADV_FSP.2, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, ATE_DPT.2, AGD_ADM.1, ALC_LCD.1, ADV_DVS.2, ATE_FUN.1, ADV_IMP.2, AVA_VLA.4, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 |
{} |
heuristics/extracted_versions |
1.0 |
1.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: SmartCard Operating System
- cert_id: KECS-ISIS-0051-2006
- certification_date: 29.09.2006
- enhanced:
- level: EAL4+
- product: MULTOS SM10
- product_link: https://itscc.kr/certprod/view.do?product_id=51&product_class=4
- vendor: Samsung SDS
|
- cert_id: JISEC-CC-CRP-C0057
- certification_date: 01.10.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0057_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE is a software module that is installed on the MFPs "KM-C2520/KM-C3225/KM-C3232, CS-C2520/CS-C3225/CS-C3232" of KYOCERA MITA Corporation, and which provides the ordinary functions, and also security functions for protecting residue data. This TOE is installed on the above-mentioned MFPs and protects image data remaining on the HDDs from unjust exposure, after various copying, printing, and network scanning processings, by providing an HDD overwriting function. And it has the administrator authentication function that identifies and authenticates a TOE machine administrator who sets the HDD overwrite deletion method and operates it.
- evaluation_facility: Japan Electronics & Information Technology Industries Association, Information Technology Security Center
- product: Data Security Kit(D) Software
- product_type: IT Product (data protection function in digital Multi Function Device)
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-10', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0057_it5065_02.html'})]
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0057_it5065.html
- toe_overseas_name: Data Security Kit(D) Software V2.10E
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ISIS-51-EN.pdf |
c0057_ecvr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- Certification No. C0057: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4+: 1
- EAL4: 2
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ALC:
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_DPT.2: 3
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: son
- /CreationDate: D:20061031112738+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20061031112738+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: KECS-ISIS-0051-2006 Cert Report(SDS MULTOS SM10 R2).hwp
- pdf_file_size_bytes: 698710
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /CreationDate: D:20061102202158+09'00'
- /ModDate: D:20061102202158+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12898
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
ISIS-51-ST-EN.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL3: 1
- EAL4: 37
- EAL4+: 8
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 11
- ACM_CAP.3: 3
- ACM_CAP.4: 21
- ACM_SCP.1: 1
- ACM_SCP.2: 8
- ADO:
- ADO_DEL.2: 10
- ADO_IGS.1: 9
- ADV:
- ADV_DVS.2: 1
- ADV_FSP.1: 10
- ADV_FSP.2: 12
- ADV_HLD.1: 1
- ADV_HLD.2: 20
- ADV_IMP.1: 5
- ADV_IMP.2: 18
- ADV_LLD.1: 21
- ADV_RCR.1: 11
- ADV_SPM.1: 19
- AGD:
- AGD_ADM.1: 21
- AGD_USR.1: 15
- ALC:
- ALC_DVS.1: 3
- ALC_DVS.2: 17
- ALC_LCD.1: 9
- ALC_TAT.1: 12
- ATE:
- ATE_COV.2: 8
- ATE_DPT.2: 14
- ATE_FUN.1: 16
- ATE_IND.2: 10
- AVA:
- AVA_MSU.2: 15
- AVA_SOF.1: 9
- AVA_VLA.4: 25
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 9
- FAU_ARP.1.1: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 11
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 8
- FCS_CKM.4.1: 1
- FCS_COP: 5
- FCS_COP.1: 10
- FCS_COP.1.1: 5
- FDP:
- FDP_ACC.1: 6
- FDP_ACC.2: 7
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 4
- FDP_RIP: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 11
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 9
- FIA_UAU.4.1: 1
- FIA_UAU.6: 9
- FIA_UAU.6.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA.1: 10
- FMT_MSA.1.1: 1
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_MTD.2: 8
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 1
- FPT:
- FPT_ACC.2: 1
- FPT_AMT.1: 8
- FPT_AMT.1.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 8
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_RCV.4: 8
- FPT_RCV.4.1: 1
- FPT_SEP.1: 8
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TST.1: 10
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.APP_INS: 3
- A.ATK_LEV: 3
- A.SEC_CNL: 3
- A.TOE_HNDL: 3
- A.TSF_DAT: 2
- A.UNDER_HW: 4
- O:
- O.ACC_AUTH: 3
- O.APP_SEP: 2
- O.AUTH_ISS: 3
- O.AUTH_RPR: 5
- O.AUTH_USR: 5
- O.CNR_LEAK: 10
- O.DAT_PROT: 5
- O.REM_RES: 3
- O.ROLLBACK: 5
- OE:
- OE.APP_INS: 3
- OE.ATK_LEV: 2
- OE.C_TAMPER: 2
- OE.OPN_PLAT: 7
- OE.SEC_CNL: 2
- OE.TRAINING: 5
- OE.TSF_DAT: 3
- OE.UNDER_HW: 4
- T:
- T.ABN_END: 3
- T.ISS_ABU: 4
- T.LEAK_INF: 3
- T.LOGI_ATK: 7
- T.REP_AUTH: 3
- T.RES_COL: 3
- T.RES_REU: 4
- T.SES_TEAR: 4
- T.TAMPER: 5
- T.UNAU_APP: 4
- T.UNAU_IFD: 7
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Physical tampering: 1
- malfunction: 1
- physical tampering: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- ISO:
- ISO/IEC 10536: 2
- ISO/IEC 14443: 2
- ISO/IEC 7810: 2
- ISO/IEC 7816: 2
- PKCS:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: <C0CCC1D8C8A3>
- /CreationDate: D:20061113110857
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20061113110857
- /Producer: AFPL Ghostscript 8.0
- /Title: Microsoft Word - [KC067-SP-0101]MULTOS - Security Target1.2_Public_R0.9.doc
- pdf_file_size_bytes: 3793683
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |