KSignAccess V4.1

CSV information ?

Status active
Valid from 30.03.2022
Valid until 30.03.2027
Scheme 🇰🇷 KR
Manufacturer KSign Co., LTD.
Category Access Control Devices and Systems
Security level

Heuristics summary ?

Certificate ID: KECS-CISS-1153-2022

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
HMAC
Asymmetric Algorithms
RSA-PSS
Hash functions
SHA256, SHA-256, PBKDF2

Security level
EAL1+
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_PRE.1, AGD_OPE.1, ALC_CMC.1, ALC_CMS.1, ATE_FUN.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1
Certificates
KECS-CISS-1153-2022
Evaluation facilities
KOSYAS

Standards
CCMB-2017-04-001, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Author Administrator
Creation date D:20220329133328+09'00'
Modification date D:20220329133328+09'00'
Pages 23
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Security target ?

Extracted keywords

Symmetric Algorithms
SEED, HMAC
Asymmetric Algorithms
RSA-PSS, RSAPSS
Hash functions
SHA256, SHA-256, PBKDF2
Schemes
Key Exchange
Protocols
SSH, SSL, TLS
Randomness
RBG
Block cipher modes
CBC

Trusted Execution Environments
PSP

Security level
EAL 1+, EAL1, EAL1+, EAL1 augmented
Claims
OE.PHYSICAL_CONTROL, OE.TRUSTED_ADMIN, OE.LOG_BACKUP, OE.OPERATION_SYSTEM_REINFORCEMENT, OE.SECURE_DEVELOPMENT, OE.TIME, OE.DBMS
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_FUN.1, ATE_IND.1, ATE_COV.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_OBJ.1, ASE_ECD.1, ASE_REQ.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN, FAU_ARP.1, FAU_GEN.1, FAU_SAA.1, FAU_SAR.1, FAU_SAR.3, FAU_STG.3, FAU_STG.4, FAU_ARP.1.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAA.1.1, FAU_SAA.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FAU_STG.1, FAU_STG.3.1, FAU_STG.4.1, FCS_RBG.1, FCS_RBG.1.1, FCS_CKM.1, FCS_CKM.2, FCS_CKM.4, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ITC.1, FDP_ITC.2, FIA_IMA.1, FIA_SOS.3, FIA_IMA.1.1, FIA_SOS.2, FIA_SOS.3.1, FIA_UAU.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.2, FIA_UAU.4, FIA_UAU.7, FIA_UID.2, FIA_AFL.1.1, FIA_AFL.1.2, FIA_SOS.1.1, FIA_SOS.2.1, FIA_SOS.2.2, FIA_UID.1, FIA_UAU.2.1, FIA_UAU.4.1, FIA_UAU.7.1, FIA_UID.2.1, FMT_PWD.1, FMT_SMF.1, FMT_SMR.1, FMT_PWD.1.1, FMT_PWD.1.2, FMT_PWD.1.3, FMT_MOF.1, FMT_MTD.1, FMT_MOF.1.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_PST.1, FPT_PST.1.1, FPT_ITT.1, FPT_TST.1, FPT_STM.1, FPT_ITT.1.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_SSL.5, FTA_SSL.5.1, FTA_MCS.2, FTA_TSE.1, FTA_MCS.1, FTA_MCS.2.1, FTA_MCS.2.2, FTA_TSE.1.1

Standards
NIST SP 800-90, PKCS#5, RFC 2246, RFC5652, ISO/IEC 18033-2, ISO/IEC 14888-2, ISO/IEC 97972, ISO/IEC 101183, ISO/IEC 10118-3, ISO/IEC 18031, ISO/IEC 18033-, ISO/IEC 9797-2, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title 1
Author Byeong Il Park
Creation date D:20220329134244+09'00'
Modification date D:20220329134244+09'00'
Pages 102
Creator Microsoft® Word 2019
Producer Microsoft® Word 2019

Heuristics ?

Certificate ID: KECS-CISS-1153-2022

Extracted SARs

ADV_FSP.1, ALC_CMS.1, ASE_INT.1, AGD_OPE.1, ASE_CCL.1, AGD_PRE.1, ATE_COV.1, ASE_ECD.1, ASE_OBJ.1, ATE_IND.1, AVA_VAN.1, ALC_CMC.1, ATE_FUN.1, ASE_REQ.1, ASE_TSS.1

Scheme data ?

Product KSignAccess V4.1
Cert Id KECS-CISS-1153-2022
Product Link https://itscc.kr/certprod/view.do?product_id=1153&product_class=1
Vendor KSign Co., LTD.
Level PP Compliant
Category SSO
Certification Date 30.03.2022
Enhanced
Product KSignAccess V4.1
Cc Version CC V3.1 R5
Assurance Level PP Compliant
Certification Date 30.03.2022
Expiration Date 30.03.2027
Product Type SSO
Cert Id KECS-CISS-1153-2022
Report Link https://itscc.kr/file/download.do?file=KPR100000002265
Target Link https://itscc.kr/file/download.do?file=KPR100000001891
Cert Link https://itscc.kr/file/download.do?file=KPR100000001894
Protection Profile Korean National Protection Profile for Single Sign On V1.0 Assurance maintenance1
Developer KSign Co., LTD.
Holder KSign Co., LTD.

References ?

No references are available for this certificate.

Updates ?

  • 09.11.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The scheme_data property was set to {'product': 'KSignAccess V4.1', 'cert_id': 'KECS-CISS-1153-2022', 'product_link': 'https://itscc.kr/certprod/view.do?product_id=1153&product_class=1', 'vendor': 'KSign Co., LTD.', 'level': 'PP Compliant', 'category': 'SSO', 'certification_date': '2022-03-30', 'enhanced': {'product': 'KSignAccess V4.1', 'cc_version': 'CC V3.1 R5', 'assurance_level': 'PP Compliant', 'certification_date': '2022-03-30', 'expiration_date': '2027-03-30', 'product_type': 'SSO', 'cert_id': 'KECS-CISS-1153-2022', 'report_link': 'https://itscc.kr/file/download.do?file=KPR100000002265', 'target_link': 'https://itscc.kr/file/download.do?file=KPR100000001891', 'cert_link': 'https://itscc.kr/file/download.do?file=KPR100000001894', 'protection_profile': 'Korean National Protection Profile for Single Sign On V1.0 Assurance maintenance1', 'developer': 'KSign Co., LTD.', 'holder': 'KSign Co., LTD.'}}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '1cd30f1bae8f44da7155eaf1b69d45b8faa156b4596fd575bcd24fc728d7e87f', 'txt_hash': '15efb271317529b4b0f0ffecd0d7975d24fe4128828c7435a50ad2a372353a17'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1583632, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 102, '/Title': '1', '/Author': 'Byeong Il Park', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20220329134244+09'00'", '/ModDate': "D:20220329134244+09'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 1+': 1, 'EAL1': 3, 'EAL1+': 1, 'EAL1 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 14}, 'AGD': {'AGD_OPE.1': 13, 'AGD_PRE.1': 7}, 'ALC': {'ALC_CMC.1': 5, 'ALC_CMS.1': 7}, 'ATE': {'ATE_FUN.1': 14, 'ATE_IND.1': 6, 'ATE_COV.1': 3}, 'AVA': {'AVA_VAN.1': 7}, 'ASE': {'ASE_INT.1': 15, 'ASE_CCL.1': 15, 'ASE_OBJ.1': 5, 'ASE_ECD.1': 13, 'ASE_REQ.1': 13, 'ASE_TSS.1': 6}}, 'cc_sfr': {'FAU': {'FAU_GEN': 4, 'FAU_ARP.1': 8, 'FAU_GEN.1': 7, 'FAU_SAA.1': 9, 'FAU_SAR.1': 7, 'FAU_SAR.3': 4, 'FAU_STG.3': 11, 'FAU_STG.4': 10, 'FAU_ARP.1.1': 1, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1, 'FAU_STG.1': 3, 'FAU_STG.3.1': 1, 'FAU_STG.4.1': 1}, 'FCS': {'FCS_RBG.1': 9, 'FCS_RBG.1.1': 2, 'FCS_CKM.1': 25, 'FCS_CKM.2': 10, 'FCS_CKM.4': 25, 'FCS_COP.1': 41, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 6}, 'FDP': {'FDP_ITC.1': 17, 'FDP_ITC.2': 17}, 'FIA': {'FIA_IMA.1': 9, 'FIA_SOS.3': 11, 'FIA_IMA.1.1': 2, 'FIA_SOS.2': 8, 'FIA_SOS.3.1': 2, 'FIA_UAU.1': 18, 'FIA_AFL.1': 19, 'FIA_SOS.1': 6, 'FIA_UAU.2': 22, 'FIA_UAU.4': 12, 'FIA_UAU.7': 10, 'FIA_UID.2': 17, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_SOS.1.1': 1, 'FIA_SOS.2.1': 1, 'FIA_SOS.2.2': 1, 'FIA_UID.1': 14, 'FIA_UAU.2.1': 2, 'FIA_UAU.4.1': 2, 'FIA_UAU.7.1': 2, 'FIA_UID.2.1': 2}, 'FMT': {'FMT_PWD.1': 11, 'FMT_SMF.1': 10, 'FMT_SMR.1': 17, 'FMT_PWD.1.1': 2, 'FMT_PWD.1.2': 2, 'FMT_PWD.1.3': 2, 'FMT_MOF.1': 10, 'FMT_MTD.1': 10, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 2, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_PST.1': 9, 'FPT_PST.1.1': 1, 'FPT_ITT.1': 7, 'FPT_TST.1': 8, 'FPT_STM.1': 4, 'FPT_ITT.1.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTA': {'FTA_SSL.5': 12, 'FTA_SSL.5.1': 2, 'FTA_MCS.2': 7, 'FTA_TSE.1': 7, 'FTA_MCS.1': 1, 'FTA_MCS.2.1': 1, 'FTA_MCS.2.2': 1, 'FTA_TSE.1.1': 1}}, 'cc_claims': {'OE': {'OE.PHYSICAL_CONTROL': 1, 'OE.TRUSTED_ADMIN': 1, 'OE.LOG_BACKUP': 1, 'OE.OPERATION_SYSTEM_REINFORCEMENT': 1, 'OE.SECURE_DEVELOPMENT': 1, 'OE.TIME': 1, 'OE.DBMS': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'miscellaneous': {'SEED': {'SEED': 1}}, 'constructions': {'MAC': {'HMAC': 12}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 5, 'RSAPSS': 2}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 10, 'SHA-256': 2}}, 'PBKDF': {'PBKDF2': 2}}, 'crypto_scheme': {'KEX': {'Key Exchange': 1}}, 'crypto_protocol': {'SSH': {'SSH': 1}, 'TLS': {'SSL': {'SSL': 1}, 'TLS': {'TLS': 2}}}, 'randomness': {'RNG': {'RBG': 5}}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'AMD': {'PSP': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'NIST': {'NIST SP 800-90': 4}, 'PKCS': {'PKCS#5': 1}, 'RFC': {'RFC 2246': 1, 'RFC5652': 1}, 'ISO': {'ISO/IEC 18033-2': 4, 'ISO/IEC 14888-2': 3, 'ISO/IEC 97972': 2, 'ISO/IEC 101183': 2, 'ISO/IEC 10118-3': 3, 'ISO/IEC 18031': 4, 'ISO/IEC 18033-': 1, 'ISO/IEC 9797-2': 2}, 'CC': {'CCMB-2017-04-001': 1, 'CCMB-2017-04-002': 1, 'CCMB-2017-04-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to KSignAccess V4.1 Security Target V1.3.pdf.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-22-11%20Certification%20Report(KSignAccess%20V4.1).pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KSignAccess%20V4.1%20Security%20Target%20V1.3.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '83f0473a56864c428fd9e9daa5265398c37d69c0eb29a14a8bbae81820467243', 'txt_hash': 'ea3b47cb27251a346583d33d4eeb81c090f9e20b9c7498c879ad4a0be8ae2966'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 651238, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 23, '/Author': 'Administrator', '/Creator': 'Microsoft® Word 2019', '/CreationDate': "D:20220329133328+09'00'", '/ModDate': "D:20220329133328+09'00'", '/Producer': 'Microsoft® Word 2019', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'KR': {'KECS-CISS-1153-2022': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1+': 3}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 3}, 'AGD': {'AGD_PRE.1': 3, 'AGD_OPE.1': 2}, 'ALC': {'ALC_CMC.1': 2, 'ALC_CMS.1': 2}, 'ATE': {'ATE_FUN.1': 3, 'ATE_IND.1': 4}, 'AVA': {'AVA_VAN.1': 5}, 'ASE': {'ASE_INT.1': 3, 'ASE_CCL.1': 2, 'ASE_OBJ.1': 2, 'ASE_ECD.1': 3, 'ASE_REQ.1': 2, 'ASE_TSS.1': 3}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'KOSYAS': {'KOSYAS': 3}}, 'symmetric_crypto': {'constructions': {'MAC': {'HMAC': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA-PSS': 1}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA2': {'SHA256': 1, 'SHA-256': 1}}, 'PBKDF': {'PBKDF2': 1}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to KECS-CR-22-11 Certification Report(KSignAccess V4.1).pdf.

    The computed heuristics were updated.

    • The cert_id property was set to KECS-CISS-1153-2022.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}]}.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name KSignAccess V4.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Access Control Devices and Systems",
  "cert_link": null,
  "dgst": "e46d2fb0b3f0861d",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "KECS-CISS-1153-2022",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.1"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "SSO",
      "cert_id": "KECS-CISS-1153-2022",
      "certification_date": "2022-03-30",
      "enhanced": {
        "assurance_level": "PP Compliant",
        "cc_version": "CC V3.1 R5",
        "cert_id": "KECS-CISS-1153-2022",
        "cert_link": "https://itscc.kr/file/download.do?file=KPR100000001894",
        "certification_date": "2022-03-30",
        "developer": "KSign Co., LTD.",
        "expiration_date": "2027-03-30",
        "holder": "KSign Co., LTD.",
        "product": "KSignAccess V4.1",
        "product_type": "SSO",
        "protection_profile": "Korean National Protection Profile for Single Sign On V1.0 Assurance maintenance1",
        "report_link": "https://itscc.kr/file/download.do?file=KPR100000002265",
        "target_link": "https://itscc.kr/file/download.do?file=KPR100000001891"
      },
      "level": "PP Compliant",
      "product": "KSignAccess V4.1",
      "product_link": "https://itscc.kr/certprod/view.do?product_id=1153\u0026product_class=1",
      "vendor": "KSign Co., LTD."
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "KSign Co., LTD.",
  "manufacturer_web": null,
  "name": "KSignAccess V4.1",
  "not_valid_after": "2027-03-30",
  "not_valid_before": "2022-03-30",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "KECS-CR-22-11 Certification Report(KSignAccess V4.1).pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-PSS": 1
        }
      },
      "cc_cert_id": {
        "KR": {
          "KECS-CISS-1153-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 3
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 3
        },
        "ALC": {
          "ALC_CMC.1": 2,
          "ALC_CMS.1": 2
        },
        "ASE": {
          "ASE_CCL.1": 2,
          "ASE_ECD.1": 3,
          "ASE_INT.1": 3,
          "ASE_OBJ.1": 2,
          "ASE_REQ.1": 2,
          "ASE_TSS.1": 3
        },
        "ATE": {
          "ATE_FUN.1": 3,
          "ATE_IND.1": 4
        },
        "AVA": {
          "AVA_VAN.1": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "KOSYAS": {
          "KOSYAS": 3
        }
      },
      "hash_function": {
        "PBKDF": {
          "PBKDF2": 1
        },
        "SHA": {
          "SHA2": {
            "SHA-256": 1,
            "SHA256": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Administrator",
      "/CreationDate": "D:20220329133328+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20220329133328+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "pdf_file_size_bytes": 651238,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "KSignAccess V4.1 Security Target V1.3.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "RSA": {
          "RSA-PSS": 5,
          "RSAPSS": 2
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "OE": {
          "OE.DBMS": 3,
          "OE.LOG_BACKUP": 1,
          "OE.OPERATION_SYSTEM_REINFORCEMENT": 1,
          "OE.PHYSICAL_CONTROL": 1,
          "OE.SECURE_DEVELOPMENT": 1,
          "OE.TIME": 1,
          "OE.TRUSTED_ADMIN": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 14
        },
        "AGD": {
          "AGD_OPE.1": 13,
          "AGD_PRE.1": 7
        },
        "ALC": {
          "ALC_CMC.1": 5,
          "ALC_CMS.1": 7
        },
        "ASE": {
          "ASE_CCL.1": 15,
          "ASE_ECD.1": 13,
          "ASE_INT.1": 15,
          "ASE_OBJ.1": 5,
          "ASE_REQ.1": 13,
          "ASE_TSS.1": 6
        },
        "ATE": {
          "ATE_COV.1": 3,
          "ATE_FUN.1": 14,
          "ATE_IND.1": 6
        },
        "AVA": {
          "AVA_VAN.1": 7
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1+": 1,
          "EAL1": 3,
          "EAL1 augmented": 2,
          "EAL1+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 8,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 4,
          "FAU_GEN.1": 7,
          "FAU_GEN.1.1": 1,
          "FAU_GEN.1.2": 1,
          "FAU_SAA.1": 9,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1,
          "FAU_SAR.1": 7,
          "FAU_SAR.1.1": 1,
          "FAU_SAR.1.2": 1,
          "FAU_SAR.3": 4,
          "FAU_SAR.3.1": 1,
          "FAU_STG.1": 3,
          "FAU_STG.3": 11,
          "FAU_STG.3.1": 1,
          "FAU_STG.4": 10,
          "FAU_STG.4.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 25,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 10,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.4": 25,
          "FCS_CKM.4.1": 1,
          "FCS_COP.1": 41,
          "FCS_COP.1.1": 6,
          "FCS_RBG.1": 9,
          "FCS_RBG.1.1": 2
        },
        "FDP": {
          "FDP_ITC.1": 17,
          "FDP_ITC.2": 17
        },
        "FIA": {
          "FIA_AFL.1": 19,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_IMA.1": 9,
          "FIA_IMA.1.1": 2,
          "FIA_SOS.1": 6,
          "FIA_SOS.1.1": 1,
          "FIA_SOS.2": 8,
          "FIA_SOS.2.1": 1,
          "FIA_SOS.2.2": 1,
          "FIA_SOS.3": 11,
          "FIA_SOS.3.1": 2,
          "FIA_UAU.1": 18,
          "FIA_UAU.2": 22,
          "FIA_UAU.2.1": 2,
          "FIA_UAU.4": 12,
          "FIA_UAU.4.1": 2,
          "FIA_UAU.7": 10,
          "FIA_UAU.7.1": 2,
          "FIA_UID.1": 14,
          "FIA_UID.2": 17,
          "FIA_UID.2.1": 2
        },
        "FMT": {
          "FMT_MOF.1": 10,
          "FMT_MOF.1.1": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_PWD.1": 11,
          "FMT_PWD.1.1": 2,
          "FMT_PWD.1.2": 2,
          "FMT_PWD.1.3": 2,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 17,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ITT.1": 7,
          "FPT_ITT.1.1": 1,
          "FPT_PST.1": 9,
          "FPT_PST.1.1": 1,
          "FPT_STM.1": 4,
          "FPT_TST.1": 8,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        },
        "FTA": {
          "FTA_MCS.1": 1,
          "FTA_MCS.2": 7,
          "FTA_MCS.2.1": 1,
          "FTA_MCS.2.2": 1,
          "FTA_SSL.5": 12,
          "FTA_SSL.5.1": 2,
          "FTA_TSE.1": 7,
          "FTA_TSE.1.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "SSH": {
          "SSH": 1
        },
        "TLS": {
          "SSL": {
            "SSL": 1
          },
          "TLS": {
            "TLS": 2
          }
        }
      },
      "crypto_scheme": {
        "KEX": {
          "Key Exchange": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF2": 2
        },
        "SHA": {
          "SHA2": {
            "SHA-256": 2,
            "SHA256": 10
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RBG": 5
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        },
        "ISO": {
          "ISO/IEC 10118-3": 3,
          "ISO/IEC 101183": 2,
          "ISO/IEC 14888-2": 3,
          "ISO/IEC 18031": 4,
          "ISO/IEC 18033-": 1,
          "ISO/IEC 18033-2": 4,
          "ISO/IEC 9797-2": 2,
          "ISO/IEC 97972": 2
        },
        "NIST": {
          "NIST SP 800-90": 4
        },
        "PKCS": {
          "PKCS#5": 1
        },
        "RFC": {
          "RFC 2246": 1,
          "RFC5652": 1
        }
      },
      "symmetric_crypto": {
        "constructions": {
          "MAC": {
            "HMAC": 12
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "AMD": {
          "PSP": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Byeong Il Park",
      "/CreationDate": "D:20220329134244+09\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2019",
      "/ModDate": "D:20220329134244+09\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2019",
      "/Title": "1",
      "pdf_file_size_bytes": 1583632,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 102
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/KECS-PP-0822a-2017_PP_EN.pdf",
        "pp_name": "Korean National Protection Profile for Single Sign On V1.1"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-22-11%20Certification%20Report(KSignAccess%20V4.1).pdf",
  "scheme": "KR",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KSignAccess%20V4.1%20Security%20Target%20V1.3.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "83f0473a56864c428fd9e9daa5265398c37d69c0eb29a14a8bbae81820467243",
      "txt_hash": "ea3b47cb27251a346583d33d4eeb81c090f9e20b9c7498c879ad4a0be8ae2966"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1cd30f1bae8f44da7155eaf1b69d45b8faa156b4596fd575bcd24fc728d7e87f",
      "txt_hash": "15efb271317529b4b0f0ffecd0d7975d24fe4128828c7435a50ad2a372353a17"
    }
  },
  "status": "active"
}