| name |
MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0 |
Plateforme ID Motion V2 |
| category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
archived |
| not_valid_after |
07.10.2013 |
30.08.2023 |
| not_valid_before |
24.01.2007 |
30.08.2018 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0076_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_35.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_35en.pdf |
| manufacturer |
Miracle Linux Corporation |
gemalto |
| manufacturer_web |
None |
None |
| security_level |
EAL1 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
ac287c45e166eaf5 |
957e5033a2f0d265 |
| heuristics/cert_id |
JISEC-CC-CRP-C0076 |
ANSSI-CC-2018/35 |
| heuristics/cert_lab |
[] |
THALES |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ADV_TDS.3, ALC_DVS.2, AGD_PRE.1, AVA_VAN.5, AGD_OPE.1, ALC_FLR.1, ADV_FSP.4, ADV_SPM.1, ADV_ARC.1, ADV_IMP.1 |
| heuristics/extracted_versions |
4.0 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2018/36v2, ANSSI-CC-2018/50, ANSSI-CC-2018/37v2 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2018/36v2, ANSSI-CC-2018/50, ANSSI-CC-2018/37v2 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0945-2017 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0076
- certification_date: 01.01.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is a common part of MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One which is commercially available distribution of the Linux operating system. It is a multi-user, multi-tasking operating system designed for use on Intel x86 platforms. This TOE provides identification and authorization, discretionary access control, process separation, auditing of identification and authorization to protect information against illegal access, falsification and information leaks.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System
- product_type: IT Product (Operating System)
- toe_version: V4.0
- vendor: MIRACLE LINUX CORPORATION
- expiration_date: 01.10.2013
- supplier: MIRACLE LINUX CORPORA TION
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0076_it6093.html
- toe_japan_name: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0945-2017 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0076_ecvr.pdf |
anssi-cc-2018_35.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/35
- cert_item: Plateforme ID Motion V2
- cert_item_version: OS version Multos V4.5.2 AMD version 0151v001
- cert_lab: THALES (TCS – CNES) 290 allée du Lac, 31670 Labège, France
- developer: Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat Infineon Technologies AG Am Campeon 1-12 85579 Neubiberg Commanditaire Gemalto La Vigie, Avenue du jujubier, ZI Athélia IV, BP 90- 13702 La Ciotat
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Néant
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0076: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon Technologies AG: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20070126115647+09'00'
- /ModDate: D:20070126115647+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12684
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Category: Référence, Version
- /Comments: Gemalto
- /Company: SGDSN/ANSSI
- /CreationDate: D:20180905165231+02'00'
- /Creator: Acrobat PDFMaker 11 pour Word
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180926135019+02'00'
- /Producer: Adobe PDF Library 11.0
- /SourceModified: D:20180905145227
- /Subject:
- /Title:
- pdf_file_size_bytes: 700370
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
| pdf_data/st_filename |
|
anssi-cible-cc-2018_35en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 14
- EAL5 augmented: 2
- EAL5+: 1
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 2
- ADV_SPM.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- AVA:
- AVA_VAN: 2
- AVA_VAN.4: 2
- AVA_VAN.5: 9
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 10
- FAU_ARP.1.1: 2
- FAU_GEN.1: 4
- FAU_SAA: 3
- FAU_SAA.1: 11
- FAU_SAA.1.1: 2
- FAU_SAA.1.2: 2
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 19
- FCS_CKM.1.1: 1
- FCS_CKM.3: 13
- FCS_CKM.3.1: 1
- FCS_CKM.4: 16
- FCS_CKM.4.1: 1
- FCS_COP: 5
- FCS_COP.1: 25
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 4
- FDP_ACC.2: 12
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 1
- FDP_ACF: 3
- FDP_ACF.1: 14
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_DAU: 3
- FDP_DAU.1: 8
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_ITC: 3
- FDP_ITC.1: 13
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_RIP: 3
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_ROL: 3
- FDP_ROL.1: 3
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI: 3
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 3
- FIA_ATD.1: 7
- FIA_ATD.1.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 11
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UID: 3
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB: 3
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 9
- FMT_MOF.1.1: 2
- FMT_MSA: 5
- FMT_MSA.1: 14
- FMT_MSA.1.1: 1
- FMT_MSA.2: 13
- FMT_MSA.2.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 4
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_MTD.2: 4
- FMT_MTD.2.1: 1
- FMT_MTD.2.2: 1
- FMT_SMR: 3
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 4
- FPR_UNO.1: 6
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RCV: 2
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_TDC: 3
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 4
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_RSA: 3
- FRU_RSA.1: 4
- FRU_RSA.1.1: 1
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- O:
- O.APPLI_DE: 1
- O.APPLI_DEV: 9
- O.CIPHER: 3
- O.DECIPHER: 3
- O.DEV_DIS_ES: 7
- O.DIS: 2
- O.DIS_MECH: 1
- O.DIS_MECHANIS: 1
- O.DLV_: 6
- O.DLV_DATA: 4
- O.DLV_RESP: 1
- O.EFFECT_L: 4
- O.EFFECT_R: 3
- O.INIT_ACS: 5
- O.LOAD: 4
- O.MOD_MEM: 1
- O.MOD_MEMORY: 1
- O.REMOVE: 4
- O.RESOURCE: 2
- O.RESOURCES: 1
- O.ROLLBACK: 3
- O.SAMPLES_ACS: 1
- O.SAMPLE_ACS: 3
- O.SECURITY: 4
- O.SEGREGATE: 4
- O.SIDE: 5
- O.TAMPER_E: 1
- O.TAMPER_ES: 11
- O.TEST_OPE: 1
- O.USE_DIAG: 1
- OSP:
- OSP.CIPHER: 3
- OSP.CONF-ALU: 3
- T:
- T.APP_CORR: 5
- T.APP_DISC: 9
- T.APP_MOD: 5
- T.APP_READ: 5
- T.APP_REMOVE: 5
- T.CLON: 2
- T.DEL_REMOVE: 5
- T.DIS: 1
- T.DIS_DATA: 7
- T.DIS_TEST_ES: 5
- T.ERR_REMOVE: 5
- T.LOAD_APP: 6
- T.LOAD_MAN: 5
- T.LOAD_MOD: 7
- T.LOAD_OTHER: 5
- T.MOD: 5
- T.MOD_DATA: 4
- T.MOD_EXE: 5
- T.MOD_LOAD: 5
- T.MOD_SHARE: 5
- T.MOD_TSF: 5
- T.RESOURCES: 5
- T.T_CMD: 5
- T.T_ES: 5
- T.T_TOOLS: 5
|
| pdf_data/st_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 6
- Infineon Technologies: 3
- Thales:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 2
- SHA-512: 3
- SHA224: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- physical tampering: 1
- SCA:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- ICAO:
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- the TOE, the product also contain native applications and native modules used by ICAO application (out of scope of the TOE) Mel applications and native modules: NATIVE/MEL Application: GMF v1.0 The GMF: 1
- to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 3 shows how these security functions satisfy the TOE security functional requirements. 8.1.1: 1
|
| pdf_data/st_metadata |
|
- /CreationDate: D:20180627105258+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: Security Target, CC, MULTOS, IDMotion, Platform
- /ModDate: D:20180926135044+02'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2248731
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 82
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |