NEC Groups Information Leakage Prevention System Version: 1.0
CSV information ?
Status | archived |
---|---|
Valid from | 26.12.2007 |
Valid until | 07.10.2013 |
Scheme | 🇯🇵 JP |
Manufacturer | NEC Corporation |
Category | Other Devices and Systems |
Security level | ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Vendor
MicrosoftSecurity level
EAL1, EAL1 augmentedClaims
T.INJUSTICE_LOGON, T.UNAUTHORIZED_ACCESS, T.INJUSTICE_CONNECT, A.MANAGE_SAFE_PLACE, A.FACILITIES_IN_SECURE_ROOM, A.UNJUST_SOFTWARE, A.PASSWORD_MANAGEMENT, A.NETWORK, A.OPERATOR_MANAGEMENT, A.LOG_BACKUP, A.PC_STARTUP_SETSecurity Assurance Requirements (SAR)
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Certificates
CRP-C0134-01, Certification No. C0134Standards
CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
Title | untitled |
---|---|
Creation date | D:20080227110226+09'00' |
Modification date | D:20080227110226+09'00' |
Pages | 20 |
Producer | Acrobat Distiller 6.0 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, 3DESSchemes
MACProtocols
SSLVendor
MicrosoftSecurity level
EAL1Claims
O.RE_AUTH, O.ACCESS_CONTROL, O.AUDIT, O.ACCESS_CONTROL_MEDIA, O.CRYPTOGRAPHY, O.LOG_COLLECT, O.ACCESS, O.CRYPTO, O.ACCESS_CONTROL_, T.INJUSTICE_LOGON, T.UNAUTHORISED_ACCESS, T.INJUSTICE_CONNECT, A.MANAGE_SAFE_PLACE, A.FACILITIES_IN_SECURE_ROOM, A.UNJUST_SOFTWARE, A.PASSWORD_MANAGEMENT, A.NETWORK, A.OPERATOR_MANAGEMENT, A.LOG_BACKUP, A.PC_STARTUP_SET, OE.SECURITY_PARAMETER, OE.MANAGE_PC_PLACE, OE.FACILITIES_IN_SECURE_ROOM, OE.UNJUST_SOFTWARE, OE.PASSWORD_MANAGEMENT, OE.NETWORK, OE.OPERATOR_MANAGEMENT, OE.LOG_BACKUP, OE.LOG_COLLECT, OE.USERDATA_CRYPTOGRAPHY, OE.PC_STARTUP_SET, OE.LOG_, OE.SECURITY_, OE.PC_STARTUPSecurity Assurance Requirements (SAR)
ADV_FSP, AGD_OPE, AGD_PRE, ALC_CMC, ALC_CMS, ATE_IND, AVA_VAN, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_REQ, ASE_SPD, ASE_TSSSecurity Functional Requirements (SFR)
FAU_GEN.1, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2, FAU_GEN.2.1, FAU_SAR.1, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.2, FAU_SAR.2.1, FAU_SAR.3, FAU_SAR.3.1, FAU_STG.1, FAU_STG.1.1, FAU_STG.1.2, FAU_STG.3, FAU_STG.3.1, FAU_STG.4, FAU_STG.4.1, FAU_STG, FCS_CKM.1, FCS_CKM.2, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACF, FDP_ITC.1, FDP_ITC.2, FDP_ACC, FDP_ACF.1, FDP_ACC.1, FDP_ETC.2, FDP_IFC.1, FDP_ETC.2.1, FDP_ETC.2.2, FDP_ETC.2.3, FDP_ETC.2.4, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FIA_AFL.1, FIA_UAU.2, FIA_UAU.6, FIA_UID.2, FIA_UID.1, FIA_AFL, FIA_UAU.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1, FIA_ATD.1.1, FIA_SOS.1, FIA_SOS.1.1, FIA_UAU.6.1, FIA_UAU.7, FIA_UAU, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MTD.1, FMT_MSA.2, FMT_MSA.3, FMT_MSA, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1, FMT_MTD.1.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPT_STM.1, FPT_TDC.1, FPT_ITT.1, FPT_ITT.1.1, FPT_STM.1.1, FTP_ITC.1, FTP_TRP, FTP_TRP.1Standards
FIPS PUB 197, FIPS PUB 46-3, CCMB-2006-09-001, CCMB-2006-09-002, CCMB-2006-09-003, CCMB-2006-09-004File metadata
Creation date | D:20080226213013+09'00' |
---|---|
Modification date | D:20080226213216+09'00' |
Pages | 87 |
Creator | PScript5.dll Version 5.2.2 |
Producer | Acrobat Distiller 8.1.0 (Windows) |
Heuristics ?
Extracted SARs
ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Scheme data ?
Cert Id | JISEC-CC-CRP-C0134 | |
---|---|---|
Supplier | NEC Corporation | |
Toe Overseas Name | ----- | |
Expiration Date | 01.10.2013 | |
Claim | EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Certification Date | 01.12.2007 | |
Toe Overseas Link | None | |
Toe Japan Name | NEC Group Information Leakage Prevention System 1.0 | |
Toe Japan Link | https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html | |
Enhanced | ||
Product | NEC Group Information Leakage Prevention System | |
Toe Version | 1.0 | |
Product Type | Information Leakage Prevention System | |
Cc Version | 3.1 | |
Assurance Level | EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1 | |
Vendor | NEC Corporation | |
Evaluation Facility | Electronic Commerce Security Technology Laboratory Inc. | |
Report Link | https://www.ipa.go.jp/en/security/c0134_erpt.pdf | |
Target Link | https://www.ipa.go.jp/en/security/c0134_est.pdf | |
Description | PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user's PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server |
References ?
No references are available for this certificate.
Updates ?
-
05.02.2025 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The st property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data. - The cert property was updated, with the
{'_type': 'sec_certs.sample.document_state.DocumentState'}
data.
The computed heuristics were updated.
- The following values were inserted:
{'protection_profiles': None, 'eal': 'EAL1+'}
. - The prev_certificates property was set to
None
. - The next_certificates property was set to
None
.
- The report property was updated, with the
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was updated, with the
{'cert_id': 'JISEC-CC-CRP-C0134', 'expiration_date': '2013-10-01', 'claim': 'EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'certification_date': '2007-12-01', 'toe_japan_name': 'NEC Group Information Leakage Prevention System 1.0', 'enhanced': {'__update__': {'description': "PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user's PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server"}, '__delete__': ['certification_date']}}
data.
- The scheme_data property was updated, with the
-
14.10.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'cert_id': 'C0134', 'supplier': 'NEC Corporation', 'toe_overseas_name': '-----', 'expiration_date': '2013-10', 'claim': 'EAL1+\n ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'certification_date': '2007-12', 'toe_overseas_link': None, 'toe_japan_name': 'NEC Group Information Leakage\n Prevention System\n 1.0', 'toe_japan_link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html', 'enhanced': {'product': 'NEC Group Information Leakage Prevention System', 'toe_version': '1.0', 'product_type': 'Information Leakage Prevention System', 'certification_date': '2007-12-26', 'cc_version': '3.1', 'assurance_level': 'EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1', 'vendor': 'NEC Corporation', 'evaluation_facility': 'Electronic Commerce Security Technology Laboratory Inc.', 'report_link': 'https://www.ipa.go.jp/en/security/c0134_erpt.pdf', 'target_link': 'https://www.ipa.go.jp/en/security/c0134_est.pdf', 'description': "PRODUCT DESCRIPTION \n This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user's PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. \n The main security features of the TOE include identification and authentication, access control, cryptography and auditing. \n \n [Identification and Authentication] \n \n - A function to identify and authenticate a user \n \n [Access Control] \n \n - A function to control the input/output PC operations from or to its I/O port or a printer \n - A function to control the execution of a user program \n - A function to control the output of a file to the authorized external media \n - A function to control the output of a file to the authorized USB device \n - A function to control the creation and modification of the client control information \n \n [Cryptography] \n \n - A function to encrypt and decrypt a file \n - A function to create an encryption/decryption key \n - A function to encrypt/decrypt a file when inputting or outputting it from or to the \n authorized externa media or the authorized USB device \n \n [Auditing] \n \n - A function to create logs and transfer them to a log server \n - A function to view and search logs recorded in a log server"}}
.
- The scheme_data property was set to
-
30.09.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
None
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd1e3a10c80fd0d511e4ccaabdf41797e0b4b59967231dcb639175a947240c21a', 'txt_hash': 'a495930d6d1a93de2ccfa482258fab0bc2ee92526c4bc29c70e7bfdd3c64107d'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '3171b3ee9657cf2797b708ca305a8757658818d6ef10c63db1a869d27215cac8', 'txt_hash': 'ec64c8e21b07fd0334bb4bb92d1a3399ef130fb93447d0935c53e6fc3c221e47'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 156801, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 20, '/ModDate': "D:20080227110226+09'00'", '/CreationDate': "D:20080227110226+09'00'", '/Title': 'untitled', '/Producer': 'Acrobat Distiller 6.0 (Windows)', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 618504, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/CreationDate': "D:20080226213013+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/Producer': 'Acrobat Distiller 8.1.0 (Windows)', '/ModDate': "D:20080226213216+09'00'", '/Title': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'JP': {'CRP-C0134-01': 1, 'Certification No. C0134': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 4, 'EAL1 augmented': 2}}, 'cc_sar': {'ASE': {'ASE_OBJ.2': 3, 'ASE_REQ.2': 3, 'ASE_SPD.1': 3}}, 'cc_sfr': {}, 'cc_claims': {'T': {'T.INJUSTICE_LOGON': 1, 'T.UNAUTHORIZED_ACCESS': 1, 'T.INJUSTICE_CONNECT': 1}, 'A': {'A.MANAGE_SAFE_PLACE': 1, 'A.FACILITIES_IN_SECURE_ROOM': 1, 'A.UNJUST_SOFTWARE': 1, 'A.PASSWORD_MANAGEMENT': 1, 'A.NETWORK': 1, 'A.OPERATOR_MANAGEMENT': 1, 'A.LOG_BACKUP': 1, 'A.PC_STARTUP_SET': 1}}, 'vendor': {'Microsoft': {'Microsoft': 19}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 2}}, 'cc_sar': {'ADV': {'ADV_FSP': 1}, 'AGD': {'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_IND': 1}, 'AVA': {'AVA_VAN': 1}, 'ASE': {'ASE_OBJ.2': 3, 'ASE_REQ.2': 5, 'ASE_SPD.1': 5, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_REQ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {'FAU': {'FAU_GEN.1': 13, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2': 7, 'FAU_GEN.2.1': 1, 'FAU_SAR.1': 11, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.2': 7, 'FAU_SAR.2.1': 1, 'FAU_SAR.3': 7, 'FAU_SAR.3.1': 1, 'FAU_STG.1': 11, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_STG.3': 8, 'FAU_STG.3.1': 1, 'FAU_STG.4': 6, 'FAU_STG.4.1': 1, 'FAU_STG': 1}, 'FCS': {'FCS_CKM.1': 15, 'FCS_CKM.2': 3, 'FCS_COP.1': 14, 'FCS_CKM.4': 12, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 1}, 'FDP': {'FDP_ACF': 25, 'FDP_ITC.1': 3, 'FDP_ITC.2': 12, 'FDP_ACC': 32, 'FDP_ACF.1': 18, 'FDP_ACC.1': 19, 'FDP_ETC.2': 7, 'FDP_IFC.1': 10, 'FDP_ETC.2.1': 1, 'FDP_ETC.2.2': 1, 'FDP_ETC.2.3': 1, 'FDP_ETC.2.4': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 1}, 'FIA': {'FIA_AFL.1': 7, 'FIA_UAU.2': 9, 'FIA_UAU.6': 8, 'FIA_UID.2': 9, 'FIA_UID.1': 5, 'FIA_AFL': 1, 'FIA_UAU.1': 5, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1': 13, 'FIA_ATD.1.1': 1, 'FIA_SOS.1': 7, 'FIA_SOS.1.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UAU.7': 9, 'FIA_UAU': 1, 'FIA_UID.2.1': 1, 'FIA_USB.1': 11, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MTD.1': 10, 'FMT_MSA.2': 10, 'FMT_MSA.3': 12, 'FMT_MSA': 49, 'FMT_SMR.1': 27, 'FMT_SMF.1': 21, 'FMT_MSA.1': 9, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPT': {'FPT_STM.1': 9, 'FPT_TDC.1': 4, 'FPT_ITT.1': 7, 'FPT_ITT.1.1': 1, 'FPT_STM.1.1': 1}, 'FTP': {'FTP_ITC.1': 3, 'FTP_TRP': 1, 'FTP_TRP.1': 3}}, 'cc_claims': {'O': {'O.RE_AUTH': 8, 'O.ACCESS_CONTROL': 8, 'O.AUDIT': 6, 'O.ACCESS_CONTROL_MEDIA': 5, 'O.CRYPTOGRAPHY': 9, 'O.LOG_COLLECT': 7, 'O.ACCESS': 1, 'O.CRYPTO': 1, 'O.ACCESS_CONTROL_': 1}, 'T': {'T.INJUSTICE_LOGON': 5, 'T.UNAUTHORISED_ACCESS': 4, 'T.INJUSTICE_CONNECT': 5}, 'A': {'A.MANAGE_SAFE_PLACE': 3, 'A.FACILITIES_IN_SECURE_ROOM': 4, 'A.UNJUST_SOFTWARE': 5, 'A.PASSWORD_MANAGEMENT': 4, 'A.NETWORK': 5, 'A.OPERATOR_MANAGEMENT': 4, 'A.LOG_BACKUP': 5, 'A.PC_STARTUP_SET': 4}, 'OE': {'OE.SECURITY_PARAMETER': 4, 'OE.MANAGE_PC_PLACE': 5, 'OE.FACILITIES_IN_SECURE_ROOM': 4, 'OE.UNJUST_SOFTWARE': 5, 'OE.PASSWORD_MANAGEMENT': 5, 'OE.NETWORK': 5, 'OE.OPERATOR_MANAGEMENT': 5, 'OE.LOG_BACKUP': 4, 'OE.LOG_COLLECT': 4, 'OE.USERDATA_CRYPTOGRAPHY': 4, 'OE.PC_STARTUP_SET': 3, 'OE.LOG_': 1, 'OE.SECURITY_': 1, 'OE.PC_STARTUP': 1}}, 'vendor': {'Microsoft': {'Microsoft': 12}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}, 'DES': {'3DES': {'3DES': 4}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 7}}, 'crypto_protocol': {'TLS': {'SSL': {'SSL': 1}}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 197': 8, 'FIPS PUB 46-3': 4}, 'CC': {'CCMB-2006-09-001': 2, 'CCMB-2006-09-002': 2, 'CCMB-2006-09-003': 2, 'CCMB-2006-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
20080306_c0134_erpt.pdf
. - The st_filename property was set to
20080306_c0134_st.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
JISEC-CC-CRP-C0134
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_erpt.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NEC Groups Information Leakage Prevention System Version: 1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "85e3322e0f4f0162",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "JISEC-CC-CRP-C0134",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL1+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"cert_id": "JISEC-CC-CRP-C0134",
"certification_date": "2007-12-01",
"claim": "EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"enhanced": {
"assurance_level": "EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1",
"cc_version": "3.1",
"description": "PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user\u0027s PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server",
"evaluation_facility": "Electronic Commerce Security Technology Laboratory Inc.",
"product": "NEC Group Information Leakage Prevention System",
"product_type": "Information Leakage Prevention System",
"report_link": "https://www.ipa.go.jp/en/security/c0134_erpt.pdf",
"target_link": "https://www.ipa.go.jp/en/security/c0134_est.pdf",
"toe_version": "1.0",
"vendor": "NEC Corporation"
},
"expiration_date": "2013-10-01",
"supplier": "NEC Corporation",
"toe_japan_link": "https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html",
"toe_japan_name": "NEC Group Information Leakage Prevention System 1.0",
"toe_overseas_link": null,
"toe_overseas_name": "-----"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NEC Corporation",
"manufacturer_web": "https://www.nec.com/",
"name": "NEC Groups Information Leakage Prevention System Version: 1.0",
"not_valid_after": "2013-10-07",
"not_valid_before": "2007-12-26",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20080306_c0134_erpt.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"JP": {
"CRP-C0134-01": 1,
"Certification No. C0134": 1
}
},
"cc_claims": {
"A": {
"A.FACILITIES_IN_SECURE_ROOM": 1,
"A.LOG_BACKUP": 1,
"A.MANAGE_SAFE_PLACE": 1,
"A.NETWORK": 1,
"A.OPERATOR_MANAGEMENT": 1,
"A.PASSWORD_MANAGEMENT": 1,
"A.PC_STARTUP_SET": 1,
"A.UNJUST_SOFTWARE": 1
},
"T": {
"T.INJUSTICE_CONNECT": 1,
"T.INJUSTICE_LOGON": 1,
"T.UNAUTHORIZED_ACCESS": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ASE": {
"ASE_OBJ.2": 3,
"ASE_REQ.2": 3,
"ASE_SPD.1": 3
}
},
"cc_security_level": {
"EAL": {
"EAL1": 4,
"EAL1 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20080227110226+09\u002700\u0027",
"/ModDate": "D:20080227110226+09\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/Title": "untitled",
"pdf_file_size_bytes": 156801,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 20
},
"st_filename": "20080306_c0134_st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.FACILITIES_IN_SECURE_ROOM": 4,
"A.LOG_BACKUP": 5,
"A.MANAGE_SAFE_PLACE": 3,
"A.NETWORK": 5,
"A.OPERATOR_MANAGEMENT": 4,
"A.PASSWORD_MANAGEMENT": 4,
"A.PC_STARTUP_SET": 4,
"A.UNJUST_SOFTWARE": 5
},
"O": {
"O.ACCESS": 1,
"O.ACCESS_CONTROL": 8,
"O.ACCESS_CONTROL_": 1,
"O.ACCESS_CONTROL_MEDIA": 5,
"O.AUDIT": 6,
"O.CRYPTO": 1,
"O.CRYPTOGRAPHY": 9,
"O.LOG_COLLECT": 7,
"O.RE_AUTH": 8
},
"OE": {
"OE.FACILITIES_IN_SECURE_ROOM": 4,
"OE.LOG_": 1,
"OE.LOG_BACKUP": 4,
"OE.LOG_COLLECT": 4,
"OE.MANAGE_PC_PLACE": 5,
"OE.NETWORK": 5,
"OE.OPERATOR_MANAGEMENT": 5,
"OE.PASSWORD_MANAGEMENT": 5,
"OE.PC_STARTUP": 1,
"OE.PC_STARTUP_SET": 3,
"OE.SECURITY_": 1,
"OE.SECURITY_PARAMETER": 4,
"OE.UNJUST_SOFTWARE": 5,
"OE.USERDATA_CRYPTOGRAPHY": 4
},
"T": {
"T.INJUSTICE_CONNECT": 5,
"T.INJUSTICE_LOGON": 5,
"T.UNAUTHORISED_ACCESS": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_PRE": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMS": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_ECD": 1,
"ASE_INT": 1,
"ASE_OBJ": 1,
"ASE_OBJ.2": 3,
"ASE_REQ": 1,
"ASE_REQ.2": 5,
"ASE_SPD": 1,
"ASE_SPD.1": 5,
"ASE_TSS": 1
},
"ATE": {
"ATE_IND": 1
},
"AVA": {
"AVA_VAN": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 2
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN.1": 13,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 7,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.2": 7,
"FAU_SAR.2.1": 1,
"FAU_SAR.3": 7,
"FAU_SAR.3.1": 1,
"FAU_STG": 1,
"FAU_STG.1": 11,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_STG.3": 8,
"FAU_STG.3.1": 1,
"FAU_STG.4": 6,
"FAU_STG.4.1": 1
},
"FCS": {
"FCS_CKM.1": 15,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 3,
"FCS_CKM.4": 12,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 14,
"FCS_COP.1.1": 1
},
"FDP": {
"FDP_ACC": 32,
"FDP_ACC.1": 19,
"FDP_ACF": 25,
"FDP_ACF.1": 18,
"FDP_ETC.2": 7,
"FDP_ETC.2.1": 1,
"FDP_ETC.2.2": 1,
"FDP_ETC.2.3": 1,
"FDP_ETC.2.4": 1,
"FDP_IFC.1": 10,
"FDP_ITC.1": 3,
"FDP_ITC.2": 12,
"FDP_ITC.2.1": 1,
"FDP_ITC.2.2": 1,
"FDP_ITC.2.3": 1,
"FDP_ITC.2.4": 1,
"FDP_ITC.2.5": 1
},
"FIA": {
"FIA_AFL": 1,
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 1,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU": 1,
"FIA_UAU.1": 5,
"FIA_UAU.2": 9,
"FIA_UAU.6": 8,
"FIA_UAU.6.1": 1,
"FIA_UAU.7": 9,
"FIA_UID.1": 5,
"FIA_UID.2": 9,
"FIA_UID.2.1": 1,
"FIA_USB.1": 11,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MSA": 49,
"FMT_MSA.1": 9,
"FMT_MSA.2": 10,
"FMT_MSA.3": 12,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 21,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 27,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_ITT.1": 7,
"FPT_ITT.1.1": 1,
"FPT_STM.1": 9,
"FPT_STM.1.1": 1,
"FPT_TDC.1": 4
},
"FTP": {
"FTP_ITC.1": 3,
"FTP_TRP": 1,
"FTP_TRP.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"SSL": {
"SSL": 1
}
}
},
"crypto_scheme": {
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2006-09-001": 2,
"CCMB-2006-09-002": 2,
"CCMB-2006-09-003": 2,
"CCMB-2006-09-004": 2
},
"FIPS": {
"FIPS PUB 197": 8,
"FIPS PUB 46-3": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 8
}
},
"DES": {
"3DES": {
"3DES": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Microsoft": {
"Microsoft": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/CreationDate": "D:20080226213013+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2.2",
"/ModDate": "D:20080226213216+09\u002700\u0027",
"/Producer": "Acrobat Distiller 8.1.0 (Windows)",
"/Title": "",
"pdf_file_size_bytes": 618504,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 87
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_erpt.pdf",
"scheme": "JP",
"security_level": {
"_type": "Set",
"elements": [
"EAL1+",
"ASE_REQ.2",
"ASE_OBJ.2",
"ASE_SPD.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d1e3a10c80fd0d511e4ccaabdf41797e0b4b59967231dcb639175a947240c21a",
"txt_hash": "a495930d6d1a93de2ccfa482258fab0bc2ee92526c4bc29c70e7bfdd3c64107d"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3171b3ee9657cf2797b708ca305a8757658818d6ef10c63db1a869d27215cac8",
"txt_hash": "ec64c8e21b07fd0334bb4bb92d1a3399ef130fb93447d0935c53e6fc3c221e47"
}
},
"status": "archived"
}