name |
Security Threat Exclusion System SHIELD/ExLink-IA 1.0 |
IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71 |
category |
Network and Network-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
IT |
status |
archived |
active |
not_valid_after |
07.10.2013 |
28.10.2025 |
not_valid_before |
22.03.2007 |
28.10.2020 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0090_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_idapplet34_eidas_v1.0_en.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_idapplet34_eidas_v1.02.pdf |
manufacturer |
Hitachi Information Systems, Ltd |
ID&Trust Ltd. |
manufacturer_web |
|
https://www.idandtrust.com/ |
security_level |
EAL1 |
ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst |
977c07af0c4fe4e1 |
85a46d5f66760cd3 |
heuristics/cert_id |
JISEC-CC-CRP-C0090 |
OCSI/CERT/SYS/08/2016/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AVA_COMP.1, ASE_INT.1, ASE_COMP.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ADV_COMP.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ATE_COMP.1, ALC_COMP.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
1.0 |
3.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
OCSI/CERT/CCL/11/2022/RC |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/11/2022/RC |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0090
- certification_date: 01.03.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This product is a network management software that collects security logs from monitored FWs (*1) and IPSs(*2), sends them to SOC(*3) for analysis, and changes the FW's settings based on the instructions from SOC. (*1) abbreviation of Firewall. Network server that protects internal network resources from external network. (*2) abbreviation of Intrusion Prevention System. Software tool that prevents unauthorized access to server and network. It extends a function of IDS to detect unauthorized access, and take countermeasures such as blocking connections in real-time when detected. (*3) abbreviation of Security Operation Center. Facilities that receives security logs from SHIELD/ExLink-IAs and maintains an application software called "i-Monitor" to issue instructions to change FW's settings to HIELD/ExLink-IAs.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)
- product: Security Threat Exclusion System SHIELD/ExLink-IA
- product_type: IT Product (Security Management Software)
- toe_version: 1.0
- vendor: Hitachi Information Systems, Ltd
- expiration_date: 01.10.2013
- supplier: Hitachi Information Systems, Ltd
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0090_it6114.html
- toe_japan_name: Security Threat Exclusion System SHIELD/ExLink-IA 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
002505d0c2b4718a, b380aabf93b29692, d918b28fd7bb5d79, a33327d40f253f46, 64065d44659bf9ef |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0086b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0087b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0090_ecvr.pdf |
cr_idapplet34_eidas_v1.0_en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0090: 1
|
- DE:
- BSI-DSZ-CC-1040-2019-MA-01: 1
- IT:
- OCSI/CERT/SYS/08/2016/RC: 35
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0087: 1
- BSI-CC-PP-0056-V2-2012: 3
- BSI-CC-PP-0059-2009-MA-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 3
- BSI-CC-PP-0086: 3
- BSI-CC-PP-0087: 6
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL4: 11
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_COMP.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COMP: 1
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.2: 7
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP: 1
- AVA_COMP.1: 1
- AVA_VAN.5: 8
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FCS:
- FIA:
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FPT:
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 18
- NXP Semiconductors: 4
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- CCLab:
- CCLab Software Laboratory: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI TR-03105: 2
- BSI TR-03110: 4
- BSI TR-03110-1: 1
- BSI TR-03110-2: 1
- BSI TR-03110-3: 1
- BSI TR-03110-4: 1
- BSI TR-03117: 2
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20070323205523+09'00'
- /ModDate: D:20070323205523+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13145
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: OCSI
- /CreationDate: D:20201030125144+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20201030125144+00'00'
- /Title: Certification Report "IDentity Applet v3.4/eIDAS on NXP JCOP 4 P71"
- pdf_file_size_bytes: 583739
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
pdf_data/st_filename |
|
st_idapplet34_eidas_v1.02.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1040-2019-MA-01: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0056-: 2
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0068-: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0086: 1
- BSI-CC-PP-0086-2015: 1
- BSI-CC-PP-0087: 3
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 6: 2
- EAL 6+: 1
- EAL4: 18
- EAL4 augmented: 8
- EAL4+: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_SPM.1: 1
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 4
- ALC:
- ALC_DEL.1: 2
- ALC_DVS.2: 11
- ALC_FLR.1: 3
- ASE:
- ATE:
- ATE_DPT.1: 1
- ATE_DPT.2: 12
- ATE_FUN.1: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 2
- FAU_SAS: 18
- FAU_SAS.1: 4
- FCO:
- FCS:
- FCS_CKM: 148
- FCS_CKM.1: 25
- FCS_CKM.1.1: 5
- FCS_CKM.2: 10
- FCS_CKM.4: 24
- FCS_COP: 124
- FCS_COP.1: 42
- FCS_COP.1.1: 25
- FCS_RND: 21
- FCS_RND.1: 3
- FCS_RNG.1: 5
- FDP:
- FDP_ACC: 56
- FDP_ACC.1: 16
- FDP_ACC.2: 4
- FDP_ACF: 66
- FDP_ACF.1: 50
- FDP_IFC.1: 4
- FDP_IFC.2: 3
- FDP_IFF.1: 5
- FDP_ITC.1: 13
- FDP_ITC.2: 15
- FDP_RIP: 32
- FDP_RIP.1: 13
- FDP_ROL.1: 2
- FDP_SDI: 16
- FDP_SDI.1: 2
- FDP_SDI.2: 9
- FDP_UCT: 20
- FDP_UCT.1: 1
- FDP_UIT: 20
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 54
- FIA_AFL.1: 12
- FIA_API: 63
- FIA_API.1: 8
- FIA_ATD.1: 2
- FIA_UAU: 158
- FIA_UAU.1: 15
- FIA_UAU.4: 4
- FIA_UAU.5: 11
- FIA_UAU.6: 3
- FIA_UID: 54
- FIA_UID.1: 19
- FIA_UID.2: 1
- FIA_USB.1: 2
- FMT:
- FMT_LIM: 63
- FMT_LIM.1: 7
- FMT_LIM.2: 7
- FMT_MOF: 9
- FMT_MOF.1: 1
- FMT_MSA: 50
- FMT_MSA.1: 15
- FMT_MSA.2: 2
- FMT_MSA.3: 17
- FMT_MTD: 256
- FMT_MTD.1: 24
- FMT_MTD.3: 3
- FMT_SMF: 51
- FMT_SMF.1: 36
- FMT_SMR: 39
- FMT_SMR.1: 50
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_EMS: 39
- FPT_EMS.1: 13
- FPT_FLS: 25
- FPT_FLS.1: 8
- FPT_ITC: 2
- FPT_PHP: 36
- FPT_PHP.1: 2
- FPT_PHP.3: 3
- FPT_RCV.3: 1
- FPT_TDC.1: 1
- FPT_TST: 33
- FPT_TST.1: 5
- FTP:
- FTP_ITC: 34
- FTP_ITC.1: 13
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 2
- OE.KEY-CHANGE: 1
- OE.PROCESS_SEC_IC: 1
- OE.SECURITY-: 1
- OE.USE_DIAG: 1
- OE.USE_KEYS: 1
- OE.VERIFICATION: 1
- OE.VERIFICATION-: 1
- OSP:
- OSP.KEY-CHANGE: 1
- OSP.PROCESS-TOE: 1
- OSP.SECURE-BOX: 1
- OSP.SECURITY-DOMAINS: 1
- OSP.VERIFICATION: 1
- OT:
- OT.ALARM: 1
- OT.APPLI-AUTH: 1
- OT.ATTACK-COUNTER: 1
- OT.CARD-CONFIGURATION: 1
- OT.CARD-MANAGEMENT: 1
- OT.CIPHER: 1
- OT.COMM_AUTH: 2
- OT.COMM_CONFIDENTIALITY: 1
- OT.COMM_INTEGRITY: 1
- OT.DOMAIN-RIGHTS: 1
- OT.EXT-MEM: 1
- OT.FIREWALL: 1
- OT.GLOBAL_ARRAYS_CONFID: 1
- OT.IDENTIFICATION: 1
- OT.KEY-MNGT: 1
- OT.NATIVE: 1
- OT.OBJ-DELETION: 1
- OT.OPERATE: 1
- OT.PIN-MNGT: 1
- OT.REALLOCATION: 1
- OT.RESOURCES: 1
- OT.RESTRICTED-MODE: 1
- OT.RND: 1
- OT.RNG: 1
- OT.SCP: 3
- OT.SEC_BOX_FW: 1
- OT.SENSITIVE_RESULT_INTEG: 1
- OT.SID: 1
- OT.SID_MODULE: 1
- OT.TRANSACTION: 1
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- NXP:
- NXP: 6
- NXP Semiconductors: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 8
- TDES: 3
- Triple-DES: 8
- TripleDES: 5
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 2048: 1
- RSA-CRT: 3
- RSA-PSS: 1
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 7
- SHA-384: 2
- SHA-512: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 1
- malfunction: 1
- physical tampering: 3
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 582: 1
- BSI TR-03110: 5
- BSI TR-03117: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.ChipSecurity: 1
- EF.DG14: 1
- EF.DG15: 1
- EF.SOD: 1
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 2
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 737 • OT.SEC_BOX_FW 738 • OT.SENSITIVE_RESULT_INTEG 739 cannot be mapped because these are out of scope. 740 The objectives for the operational environment can be mapped as follows: 741 Objective from: 1
- none common user data EAC2 protected data EAC2 protected data Other terminals than the above are out of scope of this ST. In particular, terminals using Basic 246 Access Control (BAC) may be functionally: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /Author: David Lovasz
- /CreationDate: D:20201019125719+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20201019125719+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Title: IDENTITY APPLET V3.4/EIDAS - SECURITY TARGET
- pdf_file_size_bytes: 1688422
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 191
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |