| name |
MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0 |
KOMSCO JK62 V1.0 |
| category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
KR |
| status |
archived |
archived |
| not_valid_after |
07.10.2013 |
04.08.2025 |
| not_valid_before |
24.01.2007 |
04.08.2020 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0076_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-1031-2020%20CR(KOMSCO%20JK62%20V1.0)(eng).pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK62-TR-0001]%20Security%20Target-Lite-e-v1.2.pdf |
| manufacturer |
Miracle Linux Corporation |
KOMSCO |
| manufacturer_web |
|
https://www.komsco.com |
| security_level |
EAL1 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
ac287c45e166eaf5 |
011e7006a104139e |
| heuristics/cert_id |
JISEC-CC-CRP-C0076 |
KECS-ISIS-1031-2020 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
4.0 |
1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V3-2020 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V2-2019 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0076
- certification_date: 01.01.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is a common part of MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One which is commercially available distribution of the Linux operating system. It is a multi-user, multi-tasking operating system designed for use on Intel x86 platforms. This TOE provides identification and authorization, discretionary access control, process separation, auditing of identification and authorization to protect information against illegal access, falsification and information leaks.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System
- product_type: IT Product (Operating System)
- toe_version: V4.0
- vendor: MIRACLE LINUX CORPORATION
- expiration_date: 01.10.2013
- supplier: MIRACLE LINUX CORPORA TION
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0076_it6093.html
- toe_japan_name: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V3-2020 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V3-2020 |
| heuristics/protection_profiles |
{} |
17c3a7837f653cc7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[KECS-PP-0097a-2008] (CC V3.1R3) Smart Card Open Platform PP V2.2.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0076_ecvr.pdf |
KECS-ISIS-1031-2020 CR(KOMSCO JK62 V1.0)(eng).pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0076: 1
|
- DE:
- BSI-DSZ-CC-1110-V3-2020: 2
- KR:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 3
- ADV_TDS.4: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 6
- ALC_LCD.1: 2
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 3
- ATE:
- ATE_COV.2: 3
- ATE_DPT.3: 3
- ATE_FUN.1: 3
- ATE_IND.2: 4
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- miscellaneous:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20070126115647+09'00'
- /ModDate: D:20070126115647+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12684
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: 이은경
- /CreationDate: D:20200804095716+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200804095716+09'00'
- /Producer: Microsoft® Word 2016
- /Title: 평가단위보고서(ADV_ARC.1)
- pdf_file_size_bytes: 532845
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
| pdf_data/st_filename |
|
[JK62-TR-0001] Security Target-Lite-e-v1.2.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V3-2020: 3
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5+: 1
- EAL4: 2
- EAL5: 12
- EAL5+: 7
- EAL6+: 12
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 15
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 19
- ADV_IMP.1: 13
- ADV_INT.2: 11
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 20
- AGD:
- AGD_OPE.1: 17
- AGD_PRE.1: 10
- ALC:
- ALC_CMC.4: 17
- ALC_CMS.1: 1
- ALC_CMS.5: 10
- ALC_DEL.1: 7
- ALC_DVS.1: 1
- ALC_DVS.2: 17
- ALC_LCD.1: 9
- ALC_TAT.1: 2
- ALC_TAT.2: 13
- ASE:
- ASE_CCL.1: 16
- ASE_ECD.1: 14
- ASE_INT.1: 16
- ASE_OBJ.2: 13
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD.1: 10
- ASE_TSS.1: 7
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 7
- ATE_DPT.1: 2
- ATE_DPT.3: 10
- ATE_FUN.1: 13
- ATE_IND.2: 9
- AVA:
- AVA_VAN.4: 1
- AVA_VAN.5: 19
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_GEN.1: 3
- FAU_SAA.1: 8
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 29
- FCS_CKM.1.1: 4
- FCS_CKM.2: 11
- FCS_CKM.2.1: 1
- FCS_CKM.4: 21
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_COP.1: 42
- FCS_COP.1.1: 7
- FCS_RNG: 2
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.2: 12
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF.1: 18
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 8
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_RIP.1: 5
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 6
- FDP_UCT.1.1: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 2
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 12
- FIA_ATD.1.1: 2
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 23
- FIA_UAU.1.1: 5
- FIA_UAU.1.2: 4
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 3
- FMT_MSA.3: 9
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_MTD.2: 6
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_PHP.3: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 5
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_RCV.4: 4
- FPT_RCV.4.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 2
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
|
- D:
- D.APP_CODE: 1
- D.APP_DATA: 1
- D.CRYPTO: 1
- D.PIN: 1
- D.SEC_DATA: 1
- D.TS_CODE: 1
- D.TS_DATA: 1
- O:
- OP:
- OP.ARRAY_ACCESS: 5
- OP.CREATE: 3
- OP.DELETE: 10
- OP.INSTALL: 10
- OP.INSTANCE_FIELD: 5
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 5
- OP.JAVA: 3
- OP.LOAD: 10
- OP.THROW: 5
- OP.TYPE_ACCESS: 7
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 1
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- miscellaneous:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 2048: 1
- RSA-CRT: 1
- RSA2048: 11
- RSA4096: 6
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 2
- Key agreement: 1
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Physical tampering: 1
- SCA:
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- FIPS:
- FIPS 197: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 2
- ISO:
- ISO/IEC 18033-3: 1
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 3
- PKCS:
- PKCS #1: 2
- PKCS#1: 2
- PKCS#2: 2
- RFC:
- SCP:
- SCP 02: 1
- SCP 03: 1
- SCP02: 12
- SCP03: 10
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- the application although it is possible to load the application on the FLASH of IC Chip. That is out of scope in the ST. Note: The method for identifying the certified platform TOE security controller: 1
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |