Samsung SDS SPass V1.0

CSV information

Status archived
Valid from 24.09.2008
Valid until 01.06.2019
Scheme 🇰🇷 KR
Manufacturer Samsung SDS
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4+, ATE_DPT.2, AVA_VLA.3, ADV_IMP.2, ALC_DVS.2

Heuristics summary

Certificate ID: KECS-ISIS-0120-2008

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Asymmetric Algorithms
DH
Schemes
MAC

JavaCard versions
Global Platform 2.1.1
JavaCard API constants
SM2
IC data groups
EF.COM, EF.SOD
Trusted Execution Environments
SSC
Vendor
Samsung

Security level
EAL4+, EAL4, EAL 4+
Security Assurance Requirements (SAR)
ACM_CAP.4, ACM_SCP.2, ACM_AUT.1, ADO_DEL.1, ADO_IGS.1, ADV_IMP.2, ADV_FSP.2, ADV_SPM.1, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ATE_DVS.2, ATE_DPT, ATE_COV, ATE_COV.1, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_SOF.1, ATE_VLA.4, AVA_VLA.4, AVA_MSU.2, ASE_INT.1, ASE_DES.1, ASE_ENV.1, ASE_OBJ.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ASE_PPC.1
Certificates
KECS‐ISIS‐0120‐2008
Evaluation facilities
KISA

Side-channel analysis
DPA, SPA, malfunction, DFA, reverse engineering

Standards
PKCS#3, ICAO, SCP02

File metadata

Title Microsoft Word - 삼성SDS_SPass_V1.0_KECS-ISIS-0120-2008_영문.docx
Author Administrator
Creation date D:20101026094746+09'00'
Modification date D:20101026094805+09'00'
Pages 36
Creator PScript5.dll Version 5.2
Producer Acrobat Distiller 7.0.5 (Windows)

Security target

Extracted keywords

Symmetric Algorithms
DES, SEED
Hash functions
SHA-1
Randomness
RNG

Vendor
Samsung

Security level
EAL4+, EAL 4, EAL4, EAL3
Claims
O.DAT_PROT, O.AUTH_ISS, O.AUTH_USR, O.APP_SEP, O.AUTH_RPR, O.ACC_AUTH, O.ROLLBACK, O.REM_RES, O.CNR_LEAK, T.LOGI_ATK, T.ISS_ABU, T.UNAU_IFD, T.UNAU_APP, T.SES_TEAR, T.REP_AUTH, T.ABN_END, T.RES_COL, T.RES_REU, T.LEAK_INF, T.TAMPER, A.ATK_LEV, A.SEC_CNL, A.APP_INS, A.UNDER_HW, A.TOE_HNDL, A.TSF_DAT, OE.ATK_LEV, OE.SEC_CNL, OE.TSF_DAT, OE.TRAINING, OE.C_TAMPER, OE.UNDER_HW, OE.APP_INS, OE.OPN_PLAT
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ACM_SCP.1, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_IMP.1, ADV_HLD.1, ADV_DVS.2, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1
Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_SAA.1.1, FAU_SAA.1.2, FAU_GEN.1, FCS_CKM.1, FCS_COP.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.4.1, FCS_COP, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_RIP.1, FDP_ITC.1, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_IFC.1, FDP_RIP, FIA_AFL.1, FIA_ATD.1, FIA_SOS.1, FIA_UAU.1, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMR.1, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMR.1.1, FMT_SMR.1.2, FPT_AMT.1, FPT_FLS.1, FPT_PHP.3, FPT_RCV.3, FPT_RCV.4, FPT_SEP.1, FPT_TST.1, FPT_AMT.1.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_RCV.4.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FPT_ACC.2, FPT_PHP

Side-channel analysis
physical tampering, Physical tampering, malfunction

Standards
FIPS PUB 46-3, FIPS PUB 81, PKCS#1, PKCS#2, ISO/IEC 14443, ISO/IEC 7810, ISO/IEC 7816, ISO/IEC 10536

File metadata

Title (Microsoft Word - [KC067-SP-0101]MULTOS - Security Target1.2_Public__\271\256\261\270\274\366\301\244clear.doc)
Author <C0CCC1D8C8A3>
Creation date D:20090322235351
Modification date D:20090322235351
Pages 74
Creator PScript5.dll Version 5.2.2
Producer ePapyrus PSI 8.53

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

KECS-ISIS-0120-2008

Extracted SARs

ADV_DVS.2, ADV_FSP.2, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_DVS.2, ATE_FUN.1, ATE_IND.2, ATE_SOF.1, ATE_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_VLA.3

Scheme data

Product 삼성 SDS SPass V1.0
Cert Id KECS-ISIS-0120-2008
Product Link https://itscc.kr/certprod/view.do?product_id=120&product_class=4
Vendor Samsung SDS
Level EAL4+
Category e-Passport
Certification Date 24.09.2008
Enhanced
Product 삼성 SDS SPass V1.0
Cc Version CC V2.3
Assurance Level EAL4+
Certification Date 24.09.2008
Expiration Date 01.06.2019
Product Type e-Passport
Cert Id KECS-ISIS-0120-2008
Report Link https://itscc.kr/file/download.do?file=KPR100000001259
Target Link https://itscc.kr/file/download.do?file=KPR100000001260
Protection Profile ePassport Protection Profile V1.0
Developer Samsung SDS
Holder Samsung SDS

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "2634f4726941d5b8",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "KECS-ISIS-0120-2008",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_PPC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_VLA",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_DES",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ENV",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": {
      "category": "e-Passport",
      "cert_id": "KECS-ISIS-0120-2008",
      "certification_date": "2008-09-24",
      "enhanced": {
        "assurance_level": "EAL4+",
        "cc_version": "CC V2.3",
        "cert_id": "KECS-ISIS-0120-2008",
        "certification_date": "2008-09-24",
        "developer": "Samsung SDS",
        "expiration_date": "2019-06-01",
        "holder": "Samsung SDS",
        "product": "\uc0bc\uc131 SDS SPass V1.0",
        "product_type": "e-Passport",
        "protection_profile": "ePassport Protection Profile V1.0",
        "report_link": "https://itscc.kr/file/download.do?file=KPR100000001259",
        "target_link": "https://itscc.kr/file/download.do?file=KPR100000001260"
      },
      "level": "EAL4+",
      "product": "\uc0bc\uc131 SDS SPass V1.0",
      "product_link": "https://itscc.kr/certprod/view.do?product_id=120\u0026product_class=4",
      "vendor": "Samsung SDS"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Samsung SDS",
  "manufacturer_web": "https://www.sds.samsung.co.kr",
  "name": "Samsung SDS SPass V1.0",
  "not_valid_after": "2019-06-01",
  "not_valid_before": "2008-09-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "20101026101942.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {
        "FF": {
          "DH": {
            "DH": 1
          }
        }
      },
      "cc_cert_id": {
        "KR": {
          "KECS\u2010ISIS\u20100120\u20102008": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 1,
          "ACM_CAP.4": 1,
          "ACM_SCP.2": 1
        },
        "ADO": {
          "ADO_DEL.1": 1,
          "ADO_IGS.1": 1
        },
        "ADV": {
          "ADV_FSP.2": 1,
          "ADV_HLD.2": 1,
          "ADV_IMP.2": 2,
          "ADV_LLD.1": 1,
          "ADV_RCR.1": 1,
          "ADV_SPM.1": 1
        },
        "AGD": {
          "AGD_ADM.1": 1
        },
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_DES.1": 1,
          "ASE_ENV.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_PPC.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SRE.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_DPT": 2,
          "ATE_DPT.2": 1,
          "ATE_DVS.2": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1,
          "ATE_SOF.1": 1,
          "ATE_VLA.4": 1
        },
        "AVA": {
          "AVA_MSU.2": 1,
          "AVA_VLA.4": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4+": 1,
          "EAL4": 1,
          "EAL4+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "KISA": {
          "KISA": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {
        "EF": {
          "EF.COM": 1,
          "EF.SOD": 1
        }
      },
      "javacard_api_const": {
        "curves": {
          "SM2": 2
        }
      },
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "Global Platform 2.1.1": 1
        }
      },
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "DFA": 1,
          "malfunction": 2
        },
        "SCA": {
          "DPA": 1,
          "SPA": 1
        },
        "other": {
          "reverse engineering": 1
        }
      },
      "standard_id": {
        "ICAO": {
          "ICAO": 8
        },
        "PKCS": {
          "PKCS#3": 1
        },
        "SCP": {
          "SCP02": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SSC": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 19
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Administrator",
      "/CreationDate": "D:20101026094746+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2",
      "/ModDate": "D:20101026094805+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 7.0.5 (Windows)",
      "/Title": "Microsoft Word - \uc0bc\uc131SDS_SPass_V1.0_KECS-ISIS-0120-2008_\uc601\ubb38.docx",
      "pdf_file_size_bytes": 717299,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 36
    },
    "st_filename": "20090325092515.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.APP_INS": 3,
          "A.ATK_LEV": 3,
          "A.SEC_CNL": 3,
          "A.TOE_HNDL": 3,
          "A.TSF_DAT": 2,
          "A.UNDER_HW": 4
        },
        "O": {
          "O.ACC_AUTH": 3,
          "O.APP_SEP": 2,
          "O.AUTH_ISS": 3,
          "O.AUTH_RPR": 5,
          "O.AUTH_USR": 5,
          "O.CNR_LEAK": 10,
          "O.DAT_PROT": 5,
          "O.REM_RES": 3,
          "O.ROLLBACK": 5
        },
        "OE": {
          "OE.APP_INS": 3,
          "OE.ATK_LEV": 2,
          "OE.C_TAMPER": 2,
          "OE.OPN_PLAT": 7,
          "OE.SEC_CNL": 2,
          "OE.TRAINING": 5,
          "OE.TSF_DAT": 3,
          "OE.UNDER_HW": 4
        },
        "T": {
          "T.ABN_END": 3,
          "T.ISS_ABU": 4,
          "T.LEAK_INF": 3,
          "T.LOGI_ATK": 7,
          "T.REP_AUTH": 3,
          "T.RES_COL": 3,
          "T.RES_REU": 4,
          "T.SES_TEAR": 4,
          "T.TAMPER": 5,
          "T.UNAU_APP": 4,
          "T.UNAU_IFD": 7
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 11,
          "ACM_CAP.3": 3,
          "ACM_CAP.4": 21,
          "ACM_SCP.1": 1,
          "ACM_SCP.2": 8
        },
        "ADO": {
          "ADO_DEL.2": 10,
          "ADO_IGS.1": 9
        },
        "ADV": {
          "ADV_DVS.2": 1,
          "ADV_FSP.1": 10,
          "ADV_FSP.2": 12,
          "ADV_HLD.1": 1,
          "ADV_HLD.2": 20,
          "ADV_IMP.1": 5,
          "ADV_IMP.2": 18,
          "ADV_LLD.1": 21,
          "ADV_RCR.1": 11,
          "ADV_SPM.1": 19
        },
        "AGD": {
          "AGD_ADM.1": 21,
          "AGD_USR.1": 15
        },
        "ALC": {
          "ALC_DVS.1": 3,
          "ALC_DVS.2": 17,
          "ALC_LCD.1": 9,
          "ALC_TAT.1": 12
        },
        "ATE": {
          "ATE_COV.2": 8,
          "ATE_DPT.2": 14,
          "ATE_FUN.1": 16,
          "ATE_IND.2": 10
        },
        "AVA": {
          "AVA_MSU.2": 15,
          "AVA_SOF.1": 9,
          "AVA_VLA.4": 25
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL3": 1,
          "EAL4": 37,
          "EAL4+": 8
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 9,
          "FAU_ARP.1.1": 1,
          "FAU_GEN.1": 3,
          "FAU_SAA.1": 11,
          "FAU_SAA.1.1": 1,
          "FAU_SAA.1.2": 1
        },
        "FCS": {
          "FCS_CKM.1": 12,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 1,
          "FCS_CKM.4": 8,
          "FCS_CKM.4.1": 1,
          "FCS_COP": 5,
          "FCS_COP.1": 10,
          "FCS_COP.1.1": 5
        },
        "FDP": {
          "FDP_ACC.1": 6,
          "FDP_ACC.2": 7,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF.1": 8,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 4,
          "FDP_ITC.1": 4,
          "FDP_RIP": 1,
          "FDP_RIP.1": 7,
          "FDP_RIP.1.1": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 10,
          "FIA_ATD.1.1": 1,
          "FIA_SOS.1": 7,
          "FIA_SOS.1.1": 1,
          "FIA_UAU.1": 11,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 1,
          "FIA_UAU.6": 9,
          "FIA_UAU.6.1": 1,
          "FIA_UID.1": 14,
          "FIA_UID.1.1": 2,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 7,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 10,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.2": 13,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 9,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 8,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_SMR.1": 18,
          "FMT_SMR.1.1": 2,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_ACC.2": 1,
          "FPT_AMT.1": 8,
          "FPT_AMT.1.1": 1,
          "FPT_FLS.1": 8,
          "FPT_FLS.1.1": 1,
          "FPT_PHP": 1,
          "FPT_PHP.3": 10,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 8,
          "FPT_RCV.3.1": 1,
          "FPT_RCV.3.2": 1,
          "FPT_RCV.3.3": 1,
          "FPT_RCV.3.4": 1,
          "FPT_RCV.4": 8,
          "FPT_RCV.4.1": 1,
          "FPT_SEP.1": 8,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TST.1": 10,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Physical tampering": 1,
          "malfunction": 1,
          "physical tampering": 1
        }
      },
      "standard_id": {
        "FIPS": {
          "FIPS PUB 46-3": 1,
          "FIPS PUB 81": 1
        },
        "ISO": {
          "ISO/IEC 10536": 2,
          "ISO/IEC 14443": 2,
          "ISO/IEC 7810": 2,
          "ISO/IEC 7816": 2
        },
        "PKCS": {
          "PKCS#1": 1,
          "PKCS#2": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "DES": {
            "DES": 4
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 3
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "Samsung": {
          "Samsung": 79
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "\u003cC0CCC1D8C8A3\u003e",
      "/CreationDate": "D:20090322235351",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20090322235351",
      "/Producer": "ePapyrus PSI 8.53",
      "/Title": "(Microsoft Word - [KC067-SP-0101]MULTOS - Security Target1.2_Public__\\271\\256\\261\\270\\274\\366\\301\\244clear.doc)",
      "pdf_file_size_bytes": 580685,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 74
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20101026101942.pdf",
  "scheme": "KR",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ATE_DPT.2",
      "ALC_DVS.2",
      "ADV_IMP.2",
      "AVA_VLA.3",
      "EAL4+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20090325092515.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "bb78a5c9d78503d260ccf3694563578d43637620c9aa3754a025128baf6388d3",
      "txt_hash": "5347699cff6afa19eb2489e0ce29c57faf3d5b85a469f6250b4e861b9289c42f"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2c8c7d2087480ff04f5977b936ef9fcace5e2b79d2d417d1809c9cc66626bbc1",
      "txt_hash": "3250bdd2d41fef85d0675ffd72ebf76ddb5469ab1ad0a022bcf4ace9289ea200"
    }
  },
  "status": "archived"
}