This page was not yet optimized for use on mobile
devices.
Composite system comprised of ECI LightSOFT Software, STMS Software and Apollo Software
CSV information
| Status | active |
|---|---|
| Valid from | 13.04.2022 |
| Valid until | 12.04.2027 |
| Scheme | 🇮🇳 IN |
| Manufacturer | ECI Telecom Ltd., 30 Hasivim Street, Petach Tikvah, 4959388, Israel |
| Category | Network and Network-Related Devices and Systems |
| Security level | EAL2 |
Heuristics summary
Certificate ID: IC3S/KOL01/ECITelecom/EAL2/0420/0019
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Hash functions
SHA2Security level
EAL2Certificates
IC3S/KOLO1/ECITelecom/EAL2/0420/0019/CREvaluation facilities
Common Criteria Test Laboratory, ERTLCertification report
Extracted keywords
Protocols
SSHSecurity level
EAL2, EAL 2, EAL 4Claims
A.ECI, A.LOCATE, A.MANAGE, A.MGMTNETWORK, A.NOEVIL, A.NOTRST, A.PROTCT, A.ORACLE, A.ORBIX, A.SOLARIS, A.ADMIN_CREDENTIALS_SECURE, A.LIMITED_FUNCTIONALITY, A.NO_THRU_TRAFFIC_PROTECTION, A.PHYSICAL_PROTECTION, A.TRUSTED_ADMINISTRATORCertificates
IC3S/KOL01/ECITelecom/EAL2/0420/0019 /CR, IC3S/KOL01/ECITelecom/EAL2/0420/0019Evaluation facilities
Common Criteria Test Laboratory, ERTLFile metadata
| Author | Tapas Bandopadhyay |
|---|---|
| Creation date | D:20220309165723+05'30' |
| Modification date | D:20220309165723+05'30' |
| Pages | 19 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Security target
Extracted keywords
Security level
EAL2Claims
O.ACCESS, O.AUDITS, O.EADMIN, O.IDAUTH, O.PROTCT, O.INVFLW, T.COMINT, T.LOSSOF, T.NOHALT, T.PRIVIL, A.ECI, A.LOCATE, A.MANAGE, A.MGMTNETWORK, A.NOEVIL, A.NOTRST, A.PROTCT, A.ORACLE, A.ORBIX, A.SOLARIS, A.MGMTNETWOR, A.MGMTNETW, OE.MGMTNETWORK, OE.ECI, OE.CREDEN, OE.INSTAL, OE.MGMTNET, OE.PERSON, OE.PHYCAL, OE.TIME, OE.ORACLE, OE.ORBIX, OE.SOLARISSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_GEN.1, FAU_SAR.1, FAU_SAR.2, FAU_STG.2, FAU_ARP.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2.1, FAU_STG.2.1, FAU_STG.2.2, FAU_STG.2.3, FIA_AFL.1, FIA_ATD.1, FIA_UAU.1, FIA_UID.1, FIA_UAU.7, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.7.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_TEE.1, FPT_TEE.1.1, FPT_TEE.1.2, FPT_STM.1File metadata
| Title | SECURITY TARGET |
|---|---|
| Author | User |
| Creation date | D:20220316143332+05'30' |
| Modification date | D:20220316143332+05'30' |
| Pages | 38 |
| Creator | Microsoft® Word 2016 |
| Producer | Microsoft® Word 2016 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
IC3S/KOL01/ECITelecom/EAL2/0420/0019Extracted SARs
ADV_ARC.1, ADV_FSP.2, ADV_TDS.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.2, ALC_CMS.2, ALC_DEL.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Network and Network-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI%20CC%20Certificate.pdf",
"dgst": "f83e964eac1e84f7",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "IC3S/KOL01/ECITelecom/EAL2/0420/0019",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL2",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "ECI Telecom Ltd., 30 Hasivim Street, Petach Tikvah, 4959388, Israel",
"manufacturer_web": "https://info.rbbn.com/eci-now-ribbon/",
"name": "Composite system comprised of ECI LightSOFT Software, STMS Software and Apollo Software",
"not_valid_after": "2027-04-12",
"not_valid_before": "2022-04-13",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "ECI CC Certificate.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IN": {
"IC3S/KOLO1/ECITelecom/EAL2/0420/0019/CR": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ERTL": {
"Common Criteria Test Laboratory, ERTL": 1
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA2": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "CR- ECITL EAL2 version 1.0 .pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"IN": {
"IC3S/KOL01/ECITelecom/EAL2/0420/0019": 1,
"IC3S/KOL01/ECITelecom/EAL2/0420/0019 /CR": 19
}
},
"cc_claims": {
"A": {
"A.ADMIN_CREDENTIALS_SECURE": 1,
"A.ECI": 1,
"A.LIMITED_FUNCTIONALITY": 1,
"A.LOCATE": 1,
"A.MANAGE": 1,
"A.MGMTNETWORK": 1,
"A.NOEVIL": 1,
"A.NOTRST": 1,
"A.NO_THRU_TRAFFIC_PROTECTION": 1,
"A.ORACLE": 1,
"A.ORBIX": 1,
"A.PHYSICAL_PROTECTION": 1,
"A.PROTCT": 1,
"A.SOLARIS": 1,
"A.TRUSTED_ADMINISTRATOR": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL 2": 2,
"EAL 4": 2,
"EAL2": 5
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 5
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"ERTL": {
"Common Criteria Test Laboratory, ERTL": 5
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Tapas Bandopadhyay",
"/CreationDate": "D:20220309165723+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20220309165723+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"pdf_file_size_bytes": 1296405,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteria-india.gov.in/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 19
},
"st_filename": "ECI LightSOFT-STMS-Apollo Security Target v1.3.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ECI": 3,
"A.LOCATE": 3,
"A.MANAGE": 3,
"A.MGMTNETW": 1,
"A.MGMTNETWOR": 1,
"A.MGMTNETWORK": 1,
"A.NOEVIL": 3,
"A.NOTRST": 3,
"A.ORACLE": 3,
"A.ORBIX": 3,
"A.PROTCT": 3,
"A.SOLARIS": 3
},
"O": {
"O.ACCESS": 9,
"O.AUDITS": 3,
"O.EADMIN": 5,
"O.IDAUTH": 13,
"O.INVFLW": 1,
"O.PROTCT": 6
},
"OE": {
"OE.CREDEN": 4,
"OE.ECI": 3,
"OE.INSTAL": 4,
"OE.MGMTNET": 1,
"OE.MGMTNETWORK": 2,
"OE.ORACLE": 2,
"OE.ORBIX": 3,
"OE.PERSON": 5,
"OE.PHYCAL": 6,
"OE.SOLARIS": 2,
"OE.TIME": 4
},
"T": {
"T.COMINT": 3,
"T.LOSSOF": 3,
"T.NOHALT": 3,
"T.PRIVIL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.2": 1,
"ADV_TDS.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.2": 1,
"ALC_CMS.2": 1,
"ALC_DEL.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.2": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 1,
"FAU_GEN.1": 11,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_SAR.1": 8,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 8,
"FAU_SAR.2.1": 1,
"FAU_STG.2": 9,
"FAU_STG.2.1": 1,
"FAU_STG.2.2": 1,
"FAU_STG.2.3": 1
},
"FIA": {
"FIA_AFL.1": 8,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 7,
"FIA_ATD.1.1": 1,
"FIA_UAU.1": 10,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.7": 8,
"FIA_UAU.7.1": 1,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MTD.1": 13,
"FMT_MTD.1.1": 2,
"FMT_SMF.1": 8,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_STM.1": 1,
"FPT_TEE.1": 7,
"FPT_TEE.1.1": 1,
"FPT_TEE.1.2": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "User",
"/CreationDate": "D:20220316143332+05\u002730\u0027",
"/Creator": "Microsoft\u00ae Word 2016",
"/ModDate": "D:20220316143332+05\u002730\u0027",
"/Producer": "Microsoft\u00ae Word 2016",
"/Title": "SECURITY TARGET",
"pdf_file_size_bytes": 889470,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.ecitele.com/",
"http://www.consulting-cc.com/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20ECITL%20EAL2%20version%201.0%20.pdf",
"scheme": "IN",
"security_level": {
"_type": "Set",
"elements": [
"EAL2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ECI%20LightSOFT-STMS-Apollo%20Security%20Target%20v1.3.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "176d426f43bc58409e4cf2ff40c55b5f9dc55edcc8f11e4e33b1c3d72090e402",
"txt_hash": "326f3e1338b11565b3bcede9b671bc77bf3d369ce44f347dff96f22a7d090743"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "e6fd08700f4331e6ff6c411657052d99f9bb5cd60ce4f8de2ac876baa65494c7",
"txt_hash": "04a5e648cc3e0425ee4745493c553345a8971b699e6ddbe7c9efb35bb32070ac"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "17955ee3bbfa2733064a9771e0cba3692d5678f391941ba2e2df7b91e53618ed",
"txt_hash": "8a8f859db0e5352dedebb08cf23f51f4e8665ddc4770fbe5a9b793f0c8b18551"
}
},
"status": "active"
}