name |
Symfoware Server Enterprise Extended Edition 7.0.2 |
ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
07.06.2022 |
not_valid_before |
31.10.2006 |
07.06.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0061_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_35fr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2017_35_lite.pdf |
manufacturer |
Fujitsu Limited |
NXP Semiconductors |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.nxp.com/ |
security_level |
EAL1 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
99f7dcbd9b823ee5 |
fec4ac98558ebab7 |
heuristics/cert_id |
JISEC-CC-CRP-C0061 |
ANSSI-CC-2017/35 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7.0.2 |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-16-99111-CR2 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0973-2016, NSCIB-CC-16-99111-CR2, NSCIB-CC-16-99111-CR |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0144
- certification_date: 01.01.2008
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- cc_version: 2.3
- description: PRODUCT DESCRIPTION Symfoware Server is Fujitsu's relational database management system designed for enterprise business. Symfoware Server processes huge data speedily during user's working and also user can use it effectively for their own business style. Using SQL language, user is able to define the data structure, and access to the structured data. Symfoware Server offers the security functions of the user control, the resource control, and the audit log, etc. to protect the data base from malicious access in addition to the function for such a data base access. Symfoware Server runs on Red Hat Enterprise Linux 5(for Intel Itanium).
- evaluation_facility: Information Technology Security Center
- product: Symfoware Server Enterprise Extended Edition
- product_type: IT Product (Database)
- toe_version: 9.0.1
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0144_it7181.html
- toe_japan_name: Symfoware Server Enterprise Extended Edition 9.0.1
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0897-V2-2014, NSCIB-CC-16-99111-CR |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0897-V2-2014, NSCIB-CC-16-99111-CR |
heuristics/protection_profiles |
{} |
b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0061_ecvr.pdf |
anssi-cc-2017_35fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/35
- cert_item: ChipDoc P60 on JCOP 3 SECID P60 (OSA) ICAO EAC avec AA, CA et PACE masqué sur composant P6022J VB
- cert_item_version: v7b1
- cert_lab: THALES (TCS – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France
- developer: NXP Semiconductors GmbH Stresemannallee 101, 22529 Hamburg, Allemagne Commanditaire NXP Semiconductors GmbH Stresemannallee 101, 22529 Hamburg, Allemagne
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: BSI-CC-PP-0056-V2-2012, [PP EAC], version 1.3.0 Machine Readable Travel Document with ICAO Application BSI-CC-PP-0068-V2-2011, [PP-PACE], version 1.0 Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0061: 1
|
- FR:
- ANSSI-CC-2017/35: 18
- ANSSI-PP-2010-03-M1: 1
- NL:
- NSCIB-CC-15-67206-CR: 1
- NSCIB-CC-16-99111-CR2: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 2
- BSI-CC-PP-0068-V2-2011: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
- EAL2: 2
- EAL5: 3
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 13
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20061102205911+09'00'
- /ModDate: D:20061102205911+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 11633
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20170615085519+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.023
- /ModDate: D:20170619153553+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 630192
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
|
anssi_cible_2017_35_lite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0897-V2-2014: 1
- BSI-DSZ-CC-0973: 1
- NL:
- NSCIB-CC-15-67206: 1
- NSCIB-CC-16-99111: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP0055: 1
- BSI-CC-PP0056-V2-2012: 1
- BSI-CC-PP0068-V2-2011-MA-01: 1
- BSI-PP-0035-2007: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 4+: 3
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4+: 1
- EAL5: 7
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.2: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.2: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 4
- ASE_OBJ.2: 3
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.2: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 4
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 8
- FCS_CKM.2: 1
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_COP: 43
- FCS_COP.1: 6
- FCS_RND: 8
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 3
- FDP_ACF: 8
- FDP_ACF.1: 17
- FDP_ITC: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_UCT: 5
- FDP_UCT.1: 3
- FDP_UIT: 5
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 3
- FIA_API: 14
- FIA_API.1: 11
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 47
- FIA_UAU.1: 4
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 7
- FIA_UAU.6: 5
- FIA_UID: 11
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 4
- FMT_MTD: 53
- FMT_MTD.1: 14
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 18
- FMT_SMR.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 14
- NXP Semiconductors: 2
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 3
- malfunction: 6
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 2006: 1
- BSI TR-03110: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 12
- EF.DG13: 2
- EF.DG14: 7
- EF.DG15: 4
- EF.DG16: 11
- EF.DG2: 6
- EF.DG3: 16
- EF.DG4: 15
- EF.DG5: 5
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 46-3: 2
- FIPS PUB 180-2: 1
- FIPS PUB 197-2001: 1
- FIPS PUB 46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20170309091002+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Common Criteria
Security Target Lite
EAL5+
ChipDoc
ICAO EAC
- /ModDate: D:20170619153557+02'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 1614458
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |