name |
BULL Trustway PCI 2400 (PCA2 version 76675628-115A S302) |
CBB business application unit Version 1.0 |
category |
Data Protection |
Other Devices and Systems |
scheme |
FR |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
10.12.2010 |
not_valid_before |
26.11.2004 |
11.03.2005 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2004_34.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0024_ecvr2.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2004_34.pdf |
|
manufacturer |
BULL S.A. |
The Bank of Tokyo-Mitsubishi/ MITSUBISHI ELECTRIC INFORMATION SYSTEMS CORPORATION |
manufacturer_web |
https://www.bull.com |
https://www.mitsubishielectric.com/ |
security_level |
AVA_VLA.4, ADV_IMP.2, AVA_CCA.1, EAL4+, ALC_FLR.3 |
EAL2 |
dgst |
b278cf9ab3b5931f |
fcef5c6a6d0cec57 |
heuristics/cert_id |
ANSSI-CC-2004/34 |
JISEC-CC-CRP-C0024 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_IMP.2, ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ASE_TSS.1, ADV_HLD.2, ATE_DPT.1, ADV_FSP.2, ALC_FLR.3, ALC_DVS.1, AVA_VLA.4, ADV_SPM.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ATE_IND.2, ASE_PPC.1, AGD_ADM.1, ASE_SRE.1, AVA_CCA.1, ASE_INT.1, ATE_FUN.1, ADV_RCR.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1 |
{} |
heuristics/extracted_versions |
2400, 76675628 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0159
- certification_date: 01.05.2008
- claim: EAL2+ ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE TOE is application software installed in dedicated terminals for banking services that are placed in stores such as supermarkets. By using the terminals, customers can take banking services such as address corrections and changing signature. The terminal can also accept application forms in bulk. To enable these services, TOE has the acceptance function, the collection function, and the data communication function. TOE security functions TOE has the following security functions: - Encryption function of individual information. - Identification and authentication of user.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: ABB business application software
- product_type: Business application in a terminal for banking services
- toe_version: 1.0
- vendor: AEON BANK, LTD. / Mitsubishi Electric Information Systems Corporation
- expiration_date: 01.01.2011
- supplier: AEON BANK, LTD./ Mitsubishi Electric Information Systems Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0159_it7174.html
- toe_japan_name: ABB business application software 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
2004_34.pdf |
c0024_ecvr2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- Rapport de certification 2004/34: 15
|
- JP:
- Certification No. C0024: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL1: 1
- EAL3: 1
- EAL4: 1
- EAL41: 1
- EAL5: 1
- EAL7: 2
- ITSEC:
|
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 2
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 3
- ADV_INT: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 4
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 2
- AVA_CCA.1: 2
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.4: 3
|
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_GEN.2: 2
- FAU_STG.2: 2
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 2
- FCS_COP.1: 2
- FCS_RND.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FDP_BKP.1: 3
- FDP_ETC.1: 2
- FDP_IFC.1: 2
- FDP_IFF.4: 2
- FDP_RIP.1: 2
- FDP_SDI.2: 2
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.1: 2
- FIA_UID.1: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MSA.1: 2
- FMT_MSA.2: 2
- FMT_MSA.3: 2
- FMT_MTD.1: 2
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FPT:
- FPT_AMT.1: 2
- FPT_FLS.1: 2
- FPT_ITC.1: 2
- FPT_ITI.1: 2
- FPT_PHP.2: 2
- FPT_PHP.3: 2
- FPT_RCV.1: 2
- FPT_STM.1: 2
- FPT_TRP.1: 1
- FPT_TST.1: 2
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- Serma:
- SERMA: 1
- Serma Technologies: 2
|
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- ISO:
- PKCS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Patrick REDON
- /CreationDate: D:20041126175603+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.3
- /ModDate: D:20041126175737+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: BULL TrustWay PCI 2400 (PCA2 version 76675628-115A S302)
- /Title: Rapport de certification 2004/34
- pdf_file_size_bytes: 907122
- pdf_hyperlinks: mailto:[email protected], mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /Author: IPA/JISEC
- /Company: IPA/ISEC
- /CreationDate: D:20051104120631+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20051104120640+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /SourceModified: D:20051104030140
- /Title: TOE List
- pdf_file_size_bytes: 23139
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
cible2004_34.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 27
- EAL4 augmented: 1
|
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 12
- ACM_CAP.2: 1
- ACM_CAP.3: 4
- ACM_CAP.4: 23
- ACM_SCP.2: 8
- ADO:
- ADO_DEL.2: 13
- ADO_IGS.1: 10
- ADV:
- ADV_FSP.1: 17
- ADV_FSP.2: 17
- ADV_HLD.1: 4
- ADV_HLD.2: 18
- ADV_IMP.1: 5
- ADV_IMP.2: 17
- ADV_LLD.1: 18
- ADV_RCR.1: 10
- ADV_SPM.1: 13
- AGD:
- AGD_ADM.1: 21
- AGD_USR.1: 16
- ALC:
- ALC_DVS.1: 11
- ALC_FLR.3: 7
- ALC_FLR.3.1: 1
- ALC_FLR.3.2: 2
- ALC_FLR.3.3: 3
- ALC_FLR.3.4: 1
- ALC_FLR.3.6: 1
- ALC_FLR.3.7: 1
- ALC_LCD.1: 11
- ALC_TAT.1: 11
- ATE:
- ATE_COV.2: 9
- ATE_DPT.1: 7
- ATE_FUN.1: 15
- ATE_IND.2: 8
- AVA:
- AVA_CCA.1: 27
- AVA_MSU.2: 12
- AVA_SOF.1: 10
- AVA_VLA.4: 23
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 22
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 11
- FAU_GEN.2.1: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 16
- FAU_STG.1: 2
- FAU_STG.2: 3
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 32
- FCS_CKM.2: 20
- FCS_CKM.2.1: 1
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_COP: 75
- FCS_COP.1: 28
- FCS_RND: 4
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_RND.1.2: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 62
- FDP_ACC.1: 5
- FDP_ACF: 50
- FDP_ACF.1: 20
- FDP_AFC: 3
- FDP_BKP: 4
- FDP_BKP.1: 30
- FDP_BKP.1.1: 2
- FDP_BKP.1.2: 2
- FDP_BKP.1.3: 2
- FDP_BKP.1.4: 3
- FDP_BKP.1.5: 2
- FDP_ETC.1: 8
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 24
- FDP_IFC.1: 2
- FDP_IFF: 20
- FDP_IFF.1: 4
- FDP_IFF.4: 4
- FDP_ITC.1: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 5
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 7
- FIA_UID.1: 14
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF.1: 17
- FMT_MSA: 25
- FMT_MSA.1: 3
- FMT_MSA.2: 14
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 50
- FMT_MTD.1: 5
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT.1: 12
- FPT_AMT.1.1: 1
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_ITC.1: 9
- FPT_ITC.1.1: 1
- FPT_ITI.1: 11
- FPT_ITI.1.1: 1
- FPT_ITI.1.2: 1
- FPT_PHP.2: 17
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RCV.1: 8
- FPT_RCV.1.1: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FPT_TRP: 1
- FPT_TST.1: 21
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 7
- malfunction: 4
- physical tampering: 18
- SCA:
- DPA: 1
- SPA: 1
- Side-channel: 3
- Side-channels: 4
- side-channel: 4
- side-channels: 8
- timing attacks: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 1
- FIPS 180-1: 1
- FIPS 46-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 186-2: 7
- FIPS140-1: 1
- FIPS140-2: 2
- FIPS180-1: 1
- FIPS46-3: 3
- PKCS:
- PKCS#1: 11
- PKCS#11: 7
- PKCS#8: 3
- RFC:
- RFC 1321: 1
- RFC 2104: 1
- RFC1321: 1
- RFC2104: 5
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: webssi
- /CreationDate: D:20050104182856+01'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20050104182856+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Title: Microsoft Word - cible_2004_34.doc
- pdf_file_size_bytes: 548753
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 102
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |