name |
MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0 |
MICARDO V4.0 R1.0 eHC v1.2 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
01.09.2019 |
not_valid_before |
24.01.2007 |
15.05.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0076_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0861a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0861b_pdf.pdf |
manufacturer |
Miracle Linux Corporation |
Morpho Cards GmbH |
manufacturer_web |
|
https://www.morpho.com/e-documents |
security_level |
EAL1 |
AVA_VAN.5, EAL4+ |
dgst |
ac287c45e166eaf5 |
cb48c0a7c7fc3bbe |
heuristics/cert_id |
JISEC-CC-CRP-C0076 |
BSI-DSZ-CC-0861-2014 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_IMP.2, AVA_VAN.5, ADV_ARC.1, ATE_IND.3, ALC_CMC.5, ADV_TDS.6, AGD_OPE.1, ATE_COV.3, APE_SPD.1, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, ATE_FUN.2, APE_INT.1, ALC_DVS.2, ADV_FSP.6, AGD_PRE.1, ASE_CCL.1, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ALC_FLR.1, ATE_DPT.4, ALC_LCD.2, ASE_INT.1, APE_ECD.1, ALC_TAT.3, ASE_SPD.1, APE_OBJ.2, ALC_CMS.5 |
heuristics/extracted_versions |
4.0 |
1.2, 4.0, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0837-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0391-2009, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0673-2010, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0602-2009, NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0411-2007 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0076
- certification_date: 01.01.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is a common part of MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One which is commercially available distribution of the Linux operating system. It is a multi-user, multi-tasking operating system designed for use on Intel x86 platforms. This TOE provides identification and authorization, discretionary access control, process separation, auditing of identification and authorization to protect information against illegal access, falsification and information leaks.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System
- product_type: IT Product (Operating System)
- toe_version: V4.0
- vendor: MIRACLE LINUX CORPORATION
- expiration_date: 01.10.2013
- supplier: MIRACLE LINUX CORPORA TION
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0076_it6093.html
- toe_japan_name: MIRACLE LINUX V4.0 / MIRACLE LINUX V4.0 One / MIRACLE LINUX V4.0 x86-64 / MIRACLE LINUX V4.0 x86-64 One Operating System V4.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
NSCIB-CC-12-36243-CR |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
NSCIB-CC-12-36243-CR |
heuristics/protection_profiles |
{} |
248ee1444754e863 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0020_V3b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0076_ecvr.pdf |
0861a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0861-2014
- cert_item: MICARDO V4.0 R1.0 eHC v1.2
- cert_lab: BSI
- developer: Morpho Cards GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0076: 1
|
- DE:
- BSI-DSZ-CC-0673-2010: 1
- BSI-DSZ-CC-0837: 1
- BSI-DSZ-CC-0837-2013: 4
- BSI-DSZ-CC-0837-2013-MA-01: 1
- BSI-DSZ-CC-0861: 1
- BSI-DSZ-CC-0861-2014: 22
- NL:
- NSCIB-CC-12-36243: 1
- NSCIB-CC-12-36243-MA1: 1
- NSCIB-CC-36243: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0020-V3-2010-MA-01: 4
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 7
- EAL 4 augmented: 3
- EAL 5: 1
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL6: 3
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 1
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ALC_TAT.2: 1
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 1
- FCS_COP: 8
- FCS_RND.1: 1
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Morpho:
- NXP:
- NXP: 6
- NXP Semiconductors: 1
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- physical probing: 1
- side channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-03116-1: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 3
- AIS 25: 3
- AIS 26: 2
- AIS 31: 4
- AIS 32: 1
- AIS 34: 1
- AIS 35: 2
- AIS 36: 4
- AIS 38: 1
- AIS20: 1
- AIS36: 2
- FIPS:
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 2013, Morpho Cards GmbH (confidential document) [11] Preparative Procedures for the Initialiser for MICARDO V4.0 R1.0 V1.2, Version X1.004, 02: 1
- Report BSI-DSZ-CC-0861, Version 1.8, 25 April 2014, SRC Security Research & Consulting GmbH (confidential document) [10] Preparative Procedures for the Personaliser for MICARDO V4.0 R1.0 V1.2, Version X1.002, 17: 1
- Version X1.00.19, 10 April 2014, Security Target – MICARDO V4.0 R1.0 V1.2, Morpho Cards GmbH (confidential document) [7] Protection Profile for electronic Health Card (eHC) - elektronische Gesundheitskarte (eGK: 1
- v4.0 Release 1 (Software Release Sheet – SRS), Version X1.0010, 10 April 2014, Morpho Cards GmbH (confidential document) 9 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070126115647+09'00'
- /ModDate: D:20070126115647+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12684
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20140526110553+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, MICARDO, Morpho, eHC, v1.2"
- /ModDate: D:20140526110917+02'00'
- /Producer: LibreOffice 3.6
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0861-2014
- pdf_file_size_bytes: 1080045
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
|
0861b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0837: 2
- BSI-DSZ-CC-0837-2013-MA-01: 1
- BSI-DSZ-CC-0837-MA-01: 1
- BSI-DSZ-CC-0861: 1
- NL:
- NSCIB-CC-12-36243: 2
- NSCIB-CC-12-36243-MA1: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0020-V3-2010-MA-01: 1
- BSI-PP-0020-V3-2010-MA-01: 1
- BSI-PP-0035: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 9
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 7
- FCS_COP.1: 8
- FCS_RND: 2
- FCS_RND.1: 1
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 4
- FDP_ACC.2: 2
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 3
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 8
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 4
- FDP_UCT.1.1: 1
- FDP_UIT.1: 2
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 4
- FIA_ATD.1: 1
- FIA_ATD.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UID.1: 3
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 3
- FMT_LIM.1.1: 1
- FMT_LIM.2: 3
- FMT_LIM.2.1: 1
- FMT_MSA.3: 1
- FMT_MTD: 5
- FMT_MTD.1: 6
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 1
- FPT_FLS.1.1: 1
- FPT_PHP.3: 1
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
- Morpho:
- NXP:
- NXP: 6
- NXP Semiconductors: 20
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 6
- malfunction: 1
- physical tampering: 1
- SCA:
- DPA: 6
- SPA: 6
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 7816-4: 2
- ISO/IEC 9796-2: 1
- PKCS:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Karsten Klohs
- /CreationDate: D:20140417111536+02'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140526113904+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target
- /Title: MICARDO V4.0 R1.0 eHC V1.2
- pdf_file_size_bytes: 586793
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 60
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |