name |
OSⅣ/MSP SECURE AF2 V10L10 C06121 |
Sm@rtSIM CX Hercules M4M |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
UK |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
31.03.2022 |
not_valid_before |
27.04.2007 |
31.03.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0092_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP%20299.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ASE_ST_Lite_SkySIM_CX_Hercules_M4M.PDF |
manufacturer |
Fujitsu Limited |
G+D Mobile Security GmbH |
manufacturer_web |
|
https://www.gi-de.com/de/de/mobile-security/ |
security_level |
EAL1 |
AVA_VAN.5, ALC_DVS.2, EAL4+ |
dgst |
ddba5b2783f6f7eb |
10c11cee79adf14f |
heuristics/cert_id |
JISEC-CC-CRP-C0092 |
CRP299 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0092
- certification_date: 01.04.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is the OS (Operating System) for enterprise computing which has been enhanced on the security functions of access control, identification and authentication of user and so on. The applications on the TOE which the users can use are operable in multi-user and multi-task environments. And the relationships of access between a user and resources can be defined in detail by this TOE. Based on these definitions the access control is performed and only the permitted user can use the resources securely within the permitted range. This TOE has the following security functions. - identification and authentication - access control - auditing - security management - TOE protection
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: OSIV/MSP SECURE AF2
- product_type: IT Product (Operating System)
- toe_version: V10L10 C06121
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0092_it6104.html
- toe_japan_name: OSIV/MSP SECURE AF2 V10L10 C06121
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2015/61 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2015/61 |
heuristics/protection_profiles |
{} |
9399bd94f9925b16, 7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0092_ecvr.pdf |
CRP 299.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0092: 1
|
- FR:
- ANSSI-CC-2014/46-M01: 1
- ANSSI-CC-PP-2010/03: 1
- UK:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
- EAL1: 1
- EAL2: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 15
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- SCP:
- SCP02: 1
- SCP03: 1
- SCP80: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20070501103509+09'00'
- /ModDate: D:20070501103509+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13066
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
ASE_ST_Lite_SkySIM_CX_Hercules_M4M.PDF |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2015/61: 1
- ANSSI-CC-PP-2010/03: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 2
- EAL4: 2
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 12
- FAU_ARP.1.1: 2
- FCO:
- FCS:
- FCS_CKM.1: 4
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.2.1: 2
- FCS_CKM.3: 5
- FCS_CKM.3.1: 2
- FCS_CKM.4: 3
- FCS_CKM.4.1: 2
- FCS_COP: 5
- FCS_COP.1: 11
- FCS_COP.1.1: 4
- FCS_PHP.3: 1
- FCS_RNG: 4
- FCS_RNG.1: 16
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 8
- FDP_ACC.1: 3
- FDP_ACC.2: 9
- FDP_ACF: 8
- FDP_ACF.1: 28
- FDP_IFC: 13
- FDP_IFC.1: 2
- FDP_IFC.2: 6
- FDP_IFF: 13
- FDP_IFF.1: 28
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 14
- FDP_ITC.1: 1
- FDP_ITC.2: 15
- FDP_MSA.3: 1
- FDP_RIP: 16
- FDP_RIP.1: 18
- FDP_ROL: 10
- FDP_ROL.1: 11
- FDP_SDI.2: 5
- FDP_SDI.2.1: 3
- FDP_SDI.2.2: 2
- FDP_UIT: 10
- FDP_UIT.1: 6
- FIA:
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_UAU: 4
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UID: 14
- FIA_UID.1: 6
- FIA_UID.2: 2
- FIA_USB: 4
- FIA_USB.1: 6
- FMT:
- FMT_MSA: 55
- FMT_MSA.1: 12
- FMT_MSA.2: 3
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MTD: 10
- FMT_MTD.1: 2
- FMT_MTD.3: 2
- FMT_SMF: 19
- FMT_SMF.1: 13
- FMT_SMF.1.1: 2
- FMT_SMR: 18
- FMT_SMR.1: 18
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 2
- FPT:
- FPT_FLS: 21
- FPT_FLS.1: 23
- FPT_FLS.1.1: 4
- FPT_PHP.3: 8
- FPT_PHP.3.1: 2
- FPT_RCV: 7
- FPT_RCV.3: 11
- FPT_TDC.1: 3
- FPT_TDC.1.1: 2
- FPT_TDC.1.2: 3
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 3
- A.APPS-PROVIDER: 3
- A.CONTROLLING-AUTHORITY: 3
- A.DELETION: 7
- A.KEY-ESCROW: 3
- A.MOBILE-OPERATOR: 3
- A.OTA-ADMIN: 3
- A.PERSONALIZER: 3
- A.PRODUCTION: 3
- A.VERIFICATION: 4
- A.VERIFICATION-AUTHORITY: 3
- D:
- D.API_DATA: 1
- D.APP_CODE: 1
- D.APP_C_DATA: 1
- D.APP_I_DATA: 3
- D.APP_KEYS: 2
- D.APSD_KEYS: 2
- D.CARD_MNGT_DATA: 1
- D.CASD_KEYS: 2
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 2
- D.JCS_CODE: 2
- D.JCS_DATA: 2
- D.PIN: 2
- D.SEC_DATA: 2
- D.VASD_KEYS: 2
- O:
- O.ALARM: 19
- O.APPLET: 16
- O.APPLI-AUTH: 7
- O.CARD-: 4
- O.CARD-MANAGEMENT: 30
- O.CARD_MANAGEMENT: 2
- O.CIPHER: 12
- O.CODE_PKG: 14
- O.COMM_AUTH: 8
- O.COMM_CONFIDENTIALITY: 6
- O.COMM_INTEGRITY: 9
- O.DELETION: 10
- O.DOMAIN-RIGHTS: 11
- O.FIREWALL: 26
- O.GLOBAL-ARRAYS-CONFID: 3
- O.GLOBAL-ARRAYS-INTEG: 2
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INTEG: 6
- O.INPUT-VALIDATION: 1
- O.INSTALL: 17
- O.INTEG-APPLI-CODE: 1
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 10
- O.LOAD: 19
- O.NATIVE: 12
- O.OBJ-DELETION: 5
- O.OPERATE: 25
- O.PIN-: 1
- O.PIN-MNGT: 8
- O.REALLOCATION: 9
- O.REMOTE: 1
- O.REMOTE_MTHD: 1
- O.REMOTE_OBJ: 1
- O.REPLAY: 1
- O.RESOURCES: 11
- O.RMI_SERVICE: 1
- O.RND: 3
- O.ROR: 1
- O.SCP: 79
- O.SCP-IC: 1
- O.SCP-SUPPORT: 3
- O.SID: 22
- O.TRANSACTION: 10
- OE:
- OE.AID-: 1
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 6
- OE.APPLET: 8
- OE.APPS-PROVIDER: 6
- OE.BASIC-: 7
- OE.BASIC-APPS-: 3
- OE.BASIC-APPS-VALIDATION: 14
- OE.CA-: 1
- OE.CA-KEYS: 7
- OE.CARD-MANAGEMENT: 2
- OE.CARD_MANAGEMENT: 2
- OE.CODE-: 4
- OE.CODE-EVIDENCE: 17
- OE.CONTROLLING-AUTHORITY: 6
- OE.KEY-CHANGE: 7
- OE.KEY-ESCROW: 6
- OE.KEY-GENERATION: 6
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 4
- OE.OTA-SERVERS: 6
- OE.PERSONALIZER: 4
- OE.PRODUCTION: 6
- OE.QUOTAS: 6
- OE.SCP: 19
- OE.SCP-SUPPORT: 2
- OE.SECURE-APPS-CERTIFICATION: 7
- OE.SECURITY-DOMAINS: 4
- OE.SHARE-CONTROL: 7
- OE.VA-KEYS: 7
- OE.VERIFICATION: 37
- OE.VERIFICATION-AUTHORITY: 4
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 1
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 6
- OP.INVK_VIRTUAL: 5
- OP.INVOKE: 1
- OP.JAVA: 6
- OP.PUT: 5
- OP.RET_RORD: 1
- OP.THROW: 4
- OP.TYPE_ACCESS: 4
- OSP:
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 3
- OSP.BASIC-APPS-VALIDATION: 4
- OSP.CASD-KEYS: 3
- OSP.KEY-CHANGE: 3
- OSP.KEY-GENERATION: 3
- OSP.OPERATOR-KEYS: 3
- OSP.OTA-LOADING: 3
- OSP.OTA-SERVERS: 3
- OSP.QUOTAS: 3
- OSP.SECURE-APPS-CERTIFICATION: 4
- OSP.SECURITY-DOMAINS: 3
- OSP.SHARE-: 1
- OSP.SHARE-CONTROL: 3
- OSP.VASD-KEYS: 3
- OSP.VERIFICATION: 7
- R:
- T:
- T.COM-EXPLOIT: 1
- T.COM_EXPLOIT: 5
- T.CONFID-APPLI-DATA: 20
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 9
- T.DELETION: 5
- T.EXE-CODE: 10
- T.EXECODE: 1
- T.INSTALL: 7
- T.INTEG-: 1
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 13
- T.INTEG-APPLI-DATA: 21
- T.INTEG-JCS-: 3
- T.INTEG-JCS-CODE: 6
- T.INTEG-JCS-DATA: 12
- T.INTEG-USER-DATA: 12
- T.LIFE_CYCLE: 5
- T.NATIVE: 7
- T.OBJ-DELETION: 4
- T.PHYSICAL: 12
- T.RESOURCES: 8
- T.SECURE_DELETION: 10
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTHORIZED_CARD-: 1
- T.UNAUTHORIZED_CARD-MNGT: 1
- T.UNAUTHORIZED_CARD_MNGT: 7
|
pdf_data/st_keywords/vendor |
|
- GD:
- G&D: 1
- Giesecke & Devrient: 17
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 3
- SHA-384: 2
- SHA-512: 3
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- physical tampering: 4
- SCA:
- DPA: 2
- Leak-Inherent: 2
- physical probing: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 186-3: 1
- FIPS 186-4: 5
- FIPS 197: 5
- FIPS 46-3: 2
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 46-3: 1
- ISO:
- ISO/IEC 18031: 8
- ISO/IEC 9797-: 1
- ISO/IEC 9797-1: 3
- NIST:
- PKCS:
- RFC:
- RFC 2104: 1
- RFC 3447: 1
- RFC 5639: 1
- RFC2104: 1
- RFC3447: 3
- RFC5639: 4
- SCP:
- SCP02: 6
- SCP03: 6
- SCP80: 4
- SCP81: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 3
- javacard.security: 18
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this security target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Augmentation: ALC_DVS.2 and AVA_VAN.5
- /Author: Giesecke & Devrient
- /Company: Giesecke & Devrient GmbH
- /CreationDate: D:20161222135100+01'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords: Version 2.1/2016-12-22
- /ModDate: D:20161222135122+01'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20161222125027
- /State: Public
- /Styles: supported
- /Subject: SkySIM CX Hercules M4M V1.0
- /TOE_Configuration: Basic configuration
- /TOE_HW_ST: ST33G1M2 Rev. F
- /TOE_Name: SkySIM CX Hercules M4M V1.0
- /TemplVersion: 1.0
- /Title: Security Target Lite
- /conformance_claim: demonstrable
- pdf_file_size_bytes: 1065844
- pdf_hyperlinks: http://www.secg.org/collateral/sec2_final.pdf, http://www.osptalliance.org/resources
- pdf_is_encrypted: False
- pdf_number_of_pages: 104
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |