| name |
MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0 |
Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12 |
| category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
07.10.2013 |
26.02.2021 |
| not_valid_before |
24.01.2007 |
26.02.2016 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0076_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016-06.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2016-06.pdf |
| manufacturer |
Miracle Linux Corporation |
Gemalto - Infineon Technologies AG |
| manufacturer_web |
|
https://www.gemalto.com/ |
| security_level |
EAL1 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
ac287c45e166eaf5 |
832bbe4dde3c99d0 |
| heuristics/cert_id |
JISEC-CC-CRP-C0076 |
ANSSI-CC-2016/06 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
AVA_VAN.5, ALC_DVS.2 |
| heuristics/extracted_versions |
4.0 |
1.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2016/24 |
| heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2015/73 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/24 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0926-2014, BSI-DSZ-CC-0757-2011, BSI-DSZ-CC-0907-2013, ANSSI-CC-2015/73 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0076
- certification_date: 01.01.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is a common part of MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One which is commercially available distribution of the Linux operating system. It is a multi-user, multi-tasking operating system designed for use on Intel x86 platforms. This TOE provides identification and authorization, discretionary access control, process separation, auditing of identification and authorization to protect information against illegal access, falsification and information leaks.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System
- product_type: IT Product (Operating System)
- toe_version: V4.0
- vendor: MIRACLE LINUX CORPORATION
- expiration_date: 01.10.2013
- supplier: MIRACLE LINUX CORPORA TION
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0076_it6093.html
- toe_japan_name: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
85bef5b6f16c4d33 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0076_ecvr.pdf |
ANSSI-CC-2016-06.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/06
- cert_item: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
- cert_item_version: Version 1.0
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France Infineon Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92190 Meudon Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card System Protection Profile – Open Configuration [PP-JCS Open Configuration], version 3.0
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0076: 1
|
- FR:
- ANSSI-CC-2015/73: 1
- ANSSI-CC-2016/06: 22
- NL:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 27
- Infineon Technologies: 1
|
| pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 1
- Serma Safety & Security: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20070126115647+09'00'
- /ModDate: D:20070126115647+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12684
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Jonathan Gimenez
- /CreationDate: D:20160226154150+01'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.017
- /ModDate: D:20160226154150+01'00'
- /Producer: Microsoft® Word 2010
- /Subject: Plateforme Java Card MultiApp Essential v1.0, en configuration ouverte, sur le composant Infineon M7794 A12 ou G12
- /Title: ANSSI-CC-2016/06
- pdf_file_size_bytes: 796998
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
| pdf_data/st_filename |
|
cible2016-06.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-PP-2010/03-M01: 1
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0076: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-: 1
- PP-SSCD-P2: 1
- PP-SSCD-P3: 1
- PP-SSCD-P4: 1
- PP-SSCD-P5: 1
- PP-SSCD-P6: 1
- PP-SSCD-T2: 1
- PP-SSCD-T3: 1
- PP-SSCD-T5: 1
- PP-SSCD-T6: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- ALC:
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 5
- FAU_ARP.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 7
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FCS_RND: 7
- FCS_RND.1: 7
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 1
- FDP_ACC.2: 6
- FDP_ACF: 16
- FDP_ACF.1: 13
- FDP_IFC: 4
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 4
- FDP_IFF.1: 10
- FDP_ITC: 4
- FDP_ITC.2: 5
- FDP_RIP: 17
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 3
- FIA_ATD.1: 1
- FIA_SOS.2: 1
- FIA_UAI.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 1
- FIA_UID: 4
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 21
- FMT_MSA.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 10
- FMT_MTD: 4
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 6
- FMT_SMF.1: 3
- FMT_SMR: 9
- FMT_SMR.1: 8
- FPR:
- FPR_UNO: 2
- FPR_UNO.1: 3
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 10
- FPT_FLS.1: 5
- FPT_ITT: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_RCV.4: 1
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FTP:
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 4
- A.DELETION: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.ALARM: 11
- O.APPLET: 28
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 14
- O.CIPHER: 5
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 4
- O.FIREWALL: 11
- O.GLOBAL_ARRAYS_CONFID: 5
- O.GLOBAL_ARRAYS_INTEG: 4
- O.INSTALL: 7
- O.JAVAOBJECT: 56
- O.KEY-: 1
- O.KEY-MNGT: 4
- O.KEY_MNGT: 1
- O.LOAD: 5
- O.NATIVE: 7
- O.OBJ-DELETION: 3
- O.OPERATE: 14
- O.PIN-: 1
- O.PIN-MNGT: 4
- O.REALLOCATION: 4
- O.RESOURCES: 5
- O.RND: 7
- O.SCP: 21
- O.SID: 9
- O.TRANSACTION: 5
- OE:
- OE.APPLET: 3
- OE.APPS-VALIDATION: 1
- OE.CODE-EVIDENCE: 10
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA224: 2
- SHA256: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- fault induction: 2
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- physical probing: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- PKCS:
- PKCS#1: 8
- PKCS#3: 1
- PKCS#5: 3
- SCP:
- SCP01: 3
- SCP02: 3
- SCP03: 3
|
| pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 7
- JavaCard 3.0: 1
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
| pdf_data/st_metadata |
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20150908153505+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC
- /ModDate: D:20150908153505+02'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1662139
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 83
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |