KOMSCO JK11
CSV information ?
Status | archived |
---|---|
Valid from | 12.10.2010 |
Valid until | 01.06.2019 |
Scheme | 🇰🇷 KR |
Manufacturer | KOMSCO |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4+, AVA_VAN.4, ATE_DPT.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
TDES, ARIA, SEEDAsymmetric Algorithms
ECDH, ECCHash functions
SHA-1, SHA-256Vendor
SamsungSecurity level
EAL4+Claims
A.TOE, A.TSFSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.4, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1Certificates
KECS-ISIS-0272-2010Evaluation facilities
KISAStandards
SCP02File metadata
Title | KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp |
---|---|
Author | ITSCC |
Creation date | D:20110729144857+09'00' |
Modification date | D:20110729144857+09'00' |
Pages | 25 |
Creator | PDFCreator Version 1.2.0 |
Producer | GPL Ghostscript 9.0 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, TDES, ARIA, SEEDAsymmetric Algorithms
RSA 1024, ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1Schemes
MAC, Key agreement, Key AgreementEngines
TORNADOJavaCard versions
GlobalPlatform 2.1.1JavaCard API constants
TYPE_ACCESSVendor
SamsungSecurity level
EAL4+, EAL5+, EAL 4+, EAL4Claims
D.APP_CODE, D.APP_DATA, D.PIN, D.TS_CODE, D.TS_DATA, D.SEC_DATA, D.CRYPTO, O.IDENTIFICATI, O.JAVAOBJECT, A.TOE, A.TSF, OP.LOAD, OP.INSTALL, OP.DELETE, OP.ARRAY_ACCESS, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.THROW, OP.TYPE_ACCESS, OP.JAVA, OP.CREATE, OE.TSFSecurity Assurance Requirements (SAR)
ADV_IMP.2, ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_FSP.1, ADV_TDS.1, ADV_FSP.2, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_CMS.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ATE_DPT.1, AVA_VAN.4, AVA_MSU.2, AVA_VLA.4, AVA_VAN.3, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.2, ASE_TSS.1, ASE_REQ.1Security Functional Requirements (SFR)
FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FAU_GEN.1, FAU_SAA.1.1, FAU_SAA.1.2, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_CKM.2, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FDP_ACC.2, FDP_ACF.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_RIP.1.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FIA_AFL.1, FIA_SOS.1, FIA_UAU.4, FIA_UAU.6, FIA_UID.1, FIA_ATD.1, FIA_UAU.1, FIA_USB.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_ATD.1.1, FIA_SOS.1.1, FIA_UAU.1.2, FIA_UAU.1.1, FIA_UAU.4.1, FIA_UAU.6.1, FIA_UID.1.1, FIA_UID.1.2, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FMT_MOF.1, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1, FMT_MSA.3.1, FMT_MSA.1.1, FMT_MOF.1.1, FMT_SMR.1.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_SMF.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_RCV.3, FPT_TST.1, FPT_RCV.4, FPT_FLS.1.1, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_RCV.4.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1Certificates
BSI-DSZ-CC-0438-2007, BSI-DSZ-CC-0501-2008-MA-04, BSI-DSZ-CC-0624-2010-MA-04Side-channel analysis
DPA, SPA, timing attack, Physical tampering, Malfunction, malfunction, DFACertification process
out of scope, the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis ofStandards
PKCS#2, AIS20, SCP02, SCP 02, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003File metadata
Title | [????] Security Target Lite_e |
---|---|
Author | ITSCC |
Creation date | D:20110729101020+09'00' |
Modification date | D:20110729101020+09'00' |
Pages | 90 |
Creator | PDFCreator Version 1.2.0 |
Producer | GPL Ghostscript 9.0 |
References
Outgoing- BSI-DSZ-CC-0438-2007 - archived - S3CC9GC 16-Bit RISC Microcontroller for Smart Card, Version 11
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.2, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_VAN.4, AVA_VLA.4Scheme data ?
Product | KOMSCO JK11 | |
---|---|---|
Cert Id | KECS-ISIS-0272-2010 | |
Product Link | https://itscc.kr/certprod/view.do?product_id=272&product_class=4 | |
Vendor | KOMSCO Co., Ltd. | |
Level | EAL4+ | |
Category | SmartCard Operating System | |
Certification Date | 12.10.2010 | |
Enhanced | ||
Product | KOMSCO JK11 | |
Cc Version | CC V3.1 R3 | |
Assurance Level | EAL4+ | |
Certification Date | 12.10.2010 | |
Expiration Date | 01.06.2019 | |
Product Type | SmartCard Operating System | |
Cert Id | KECS-ISIS-0272-2010 | |
Report Link | https://itscc.kr/file/download.do?file=KPR100000001200 | |
Target Link | https://itscc.kr/file/download.do?file=KPR100000001202 | |
Cert Link | https://itscc.kr/file/download.do?file=KPR100000001201 | |
Protection Profile | Smart Card Open Platform Protection Profile V2.1 | |
Developer | KOMSCO Co., Ltd. | |
Holder | KOMSCO Co., Ltd. |
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'KOMSCO JK11', 'cert_id': 'KECS-ISIS-0272-2010', 'product_link': 'https://itscc.kr/certprod/view.do?product_id=272&product_class=4', 'vendor': 'KOMSCO Co., Ltd.', 'level': 'EAL4+', 'category': 'SmartCard Operating System', 'certification_date': '2010-10-12', 'enhanced': {'product': 'KOMSCO JK11', 'cc_version': 'CC V3.1 R3', 'assurance_level': 'EAL4+', 'certification_date': '2010-10-12', 'expiration_date': '2019-06-01', 'product_type': 'SmartCard Operating System', 'cert_id': 'KECS-ISIS-0272-2010', 'report_link': 'https://itscc.kr/file/download.do?file=KPR100000001200', 'target_link': 'https://itscc.kr/file/download.do?file=KPR100000001202', 'cert_link': 'https://itscc.kr/file/download.do?file=KPR100000001201', 'protection_profile': 'Smart Card Open Platform Protection Profile V2.1', 'developer': 'KOMSCO Co., Ltd.', 'holder': 'KOMSCO Co., Ltd.'}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ab59294fa0998b0c8f235974085aa38914f67cc96fa4287a47035cb96eb4c397', 'txt_hash': '7e4d2b3496132c30e3628a7f6a76e188ca72414f1d8d9cd42ff9fd1705c50a28'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '8d54ef21e6a713964de8d940cd07a4830ce50843c6e995ceb2b20b6f97a59935', 'txt_hash': '4d8fa92cd3448838189c54fbd5b7760e8ff978d372a421184857d12feef9759d'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 306165, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 25, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20110729144857+09'00'", '/ModDate': "D:20110729144857+09'00'", '/Title': 'KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'ITSCC', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1626173, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 90, '/Producer': 'GPL Ghostscript 9.0', '/CreationDate': "D:20110729101020+09'00'", '/ModDate': "D:20110729101020+09'00'", '/Title': '[????] Security Target Lite_e', '/Creator': 'PDFCreator Version 1.2.0', '/Author': 'ITSCC', '/Keywords': '', '/Subject': '', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'KR': {'KECS-ISIS-0272-2010': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.4': 2}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD': 1, 'ASE_ECD.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.TOE': 1, 'A.TSF': 1}}, 'vendor': {'Samsung': {'Samsung': 6}}, 'eval_facility': {'KISA': {'KISA': 2}}, 'symmetric_crypto': {'DES': {'3DES': {'TDES': 1}}, 'miscellaneous': {'ARIA': {'ARIA': 3}, 'SEED': {'SEED': 4}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 1}, 'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-256': 1}}}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'SCP': {'SCP02': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0438-2007': 1, 'BSI-DSZ-CC-0501-2008-MA-04': 1, 'BSI-DSZ-CC-0624-2010-MA-04': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 6, 'EAL5+': 1, 'EAL 4+': 1, 'EAL4': 12}}, 'cc_sar': {'ADV': {'ADV_IMP.2': 1, 'ADV_ARC.1': 16, 'ADV_FSP.4': 15, 'ADV_IMP.1': 11, 'ADV_TDS.3': 21, 'ADV_FSP.1': 3, 'ADV_TDS.1': 2, 'ADV_FSP.2': 2}, 'AGD': {'AGD_OPE.1': 17, 'AGD_PRE.1': 10}, 'ALC': {'ALC_DVS.2': 1, 'ALC_CMC.4': 17, 'ALC_CMS.4': 8, 'ALC_DEL.1': 7, 'ALC_DVS.1': 8, 'ALC_LCD.1': 9, 'ALC_TAT.1': 10, 'ALC_CMS.1': 1}, 'ATE': {'ATE_DPT.2': 14, 'ATE_COV.2': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 9, 'ATE_COV.1': 2, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.4': 15, 'AVA_MSU.2': 1, 'AVA_VLA.4': 1, 'AVA_VAN.3': 1}, 'ASE': {'ASE_INT.1': 16, 'ASE_CCL.1': 16, 'ASE_SPD.1': 10, 'ASE_OBJ.2': 13, 'ASE_ECD.1': 14, 'ASE_REQ.2': 15, 'ASE_TSS.1': 7, 'ASE_REQ.1': 2}}, 'cc_sfr': {'FAU': {'FAU_ARP.1': 7, 'FAU_SAA.1': 10, 'FAU_ARP.1.1': 1, 'FAU_GEN.1': 3, 'FAU_SAA.1.1': 1, 'FAU_SAA.1.2': 1}, 'FCS': {'FCS_CKM.1': 13, 'FCS_CKM.4': 13, 'FCS_COP.1': 18, 'FCS_CKM.2': 2, 'FCS_CKM.1.1': 1, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 3}, 'FDP': {'FDP_ACC.2': 15, 'FDP_ACF.1': 20, 'FDP_RIP.1': 6, 'FDP_SDI.2': 6, 'FDP_UCT.1': 9, 'FDP_UIT.1': 8, 'FDP_ITC.1': 6, 'FDP_ITC.2': 6, 'FDP_ACC.1': 15, 'FDP_ACC.2.1': 2, 'FDP_ACC.2.2': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_RIP.1.1': 1, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_IFC.1': 8, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 2}, 'FIA': {'FIA_AFL.1': 7, 'FIA_SOS.1': 7, 'FIA_UAU.4': 7, 'FIA_UAU.6': 6, 'FIA_UID.1': 13, 'FIA_ATD.1': 13, 'FIA_UAU.1': 22, 'FIA_USB.1': 6, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1, 'FIA_ATD.1.1': 2, 'FIA_SOS.1.1': 1, 'FIA_UAU.1.2': 3, 'FIA_UAU.1.1': 7, 'FIA_UAU.4.1': 1, 'FIA_UAU.6.1': 1, 'FIA_UID.1.1': 2, 'FIA_UID.1.2': 1, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1}, 'FMT': {'FMT_MOF.1': 7, 'FMT_MSA.3': 10, 'FMT_MTD.1': 7, 'FMT_MTD.2': 7, 'FMT_SMF.1': 11, 'FMT_SMR.1': 18, 'FMT_MSA.1': 15, 'FMT_MSA.3.1': 2, 'FMT_MSA.1.1': 3, 'FMT_MOF.1.1': 1, 'FMT_SMR.1.1': 5, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 6, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 6, 'FPT_RCV.3': 6, 'FPT_TST.1': 6, 'FPT_RCV.4': 5, 'FPT_FLS.1.1': 1, 'FPT_RCV.2': 1, 'FPT_RCV.3.1': 1, 'FPT_RCV.3.2': 1, 'FPT_RCV.3.3': 1, 'FPT_RCV.3.4': 1, 'FPT_RCV.4.1': 1, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 6, 'FTP_TRP.1': 5}}, 'cc_claims': {'D': {'D.APP_CODE': 1, 'D.APP_DATA': 1, 'D.PIN': 1, 'D.TS_CODE': 1, 'D.TS_DATA': 1, 'D.SEC_DATA': 1, 'D.CRYPTO': 1}, 'O': {'O.IDENTIFICATI': 1, 'O.JAVAOBJECT': 2}, 'A': {'A.TOE': 2, 'A.TSF': 2}, 'OP': {'OP.LOAD': 10, 'OP.INSTALL': 10, 'OP.DELETE': 10, 'OP.ARRAY_ACCESS': 5, 'OP.INSTANCE_FIELD': 5, 'OP.INVK_VIRTUAL': 5, 'OP.INVK_INTERFACE': 7, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 7, 'OP.JAVA': 3, 'OP.CREATE': 3}, 'OE': {'OE.TSF': 3}}, 'vendor': {'Samsung': {'Samsung': 12}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 3}}, 'DES': {'DES': {'DES': 1}, '3DES': {'TDES': 8}}, 'miscellaneous': {'ARIA': {'ARIA': 4}, 'SEED': {'SEED': 5}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1}, 'ECC': {'ECDH': {'ECDH': 2}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 6}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 1}, 'KA': {'Key agreement': 1, 'Key Agreement': 1}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'TORNADO': {'TORNADO': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1, 'timing attack': 1}, 'FI': {'Physical tampering': 2, 'Malfunction': 7, 'malfunction': 2, 'DFA': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'PKCS': {'PKCS#2': 1}, 'BSI': {'AIS20': 1}, 'SCP': {'SCP02': 20, 'SCP 02': 1}, 'CC': {'CCMB-2009-07-001': 2, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2}}, 'javacard_version': {'GlobalPlatform': {'GlobalPlatform 2.1.1': 3}}, 'javacard_api_const': {'misc': {'TYPE_ACCESS': 8}}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of': 1}}}
. - The report_filename property was set to
KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf
. - The st_filename property was set to
KOMSCO JK11 Security Target Lite_e.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
KECS-ISIS-0272-2010
. - The st_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0438-2007']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0438-2007']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name KOMSCO JK11 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "794dbdddfa49f688",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "KECS-ISIS-0272-2010",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "SmartCard Operating System",
"cert_id": "KECS-ISIS-0272-2010",
"certification_date": "2010-10-12",
"enhanced": {
"assurance_level": "EAL4+",
"cc_version": "CC V3.1 R3",
"cert_id": "KECS-ISIS-0272-2010",
"cert_link": "https://itscc.kr/file/download.do?file=KPR100000001201",
"certification_date": "2010-10-12",
"developer": "KOMSCO Co., Ltd.",
"expiration_date": "2019-06-01",
"holder": "KOMSCO Co., Ltd.",
"product": "KOMSCO JK11",
"product_type": "SmartCard Operating System",
"protection_profile": "Smart Card Open Platform Protection Profile V2.1",
"report_link": "https://itscc.kr/file/download.do?file=KPR100000001200",
"target_link": "https://itscc.kr/file/download.do?file=KPR100000001202"
},
"level": "EAL4+",
"product": "KOMSCO JK11",
"product_link": "https://itscc.kr/certprod/view.do?product_id=272\u0026product_class=4",
"vendor": "KOMSCO Co., Ltd."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0438-2007"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0438-2007"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "KOMSCO",
"manufacturer_web": "https://www.komsco.com",
"name": "KOMSCO JK11",
"not_valid_after": "2019-06-01",
"not_valid_before": "2010-10-12",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
}
}
},
"cc_cert_id": {
"KR": {
"KECS-ISIS-0272-2010": 1
}
},
"cc_claims": {
"A": {
"A.TOE": 1,
"A.TSF": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.2": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.4": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4+": 2
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"KISA": {
"KISA": 2
}
},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 3
},
"SHA2": {
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"SCP": {
"SCP02": 4
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 1
}
},
"miscellaneous": {
"ARIA": {
"ARIA": 3
},
"SEED": {
"SEED": 4
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 6
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110729144857+09\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20110729144857+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp",
"pdf_file_size_bytes": 306165,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 25
},
"st_filename": "KOMSCO JK11 Security Target Lite_e.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDH": {
"ECDH": 2
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
},
"RSA": {
"RSA 1024": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0438-2007": 1,
"BSI-DSZ-CC-0501-2008-MA-04": 1,
"BSI-DSZ-CC-0624-2010-MA-04": 1
}
},
"cc_claims": {
"A": {
"A.TOE": 2,
"A.TSF": 2
},
"D": {
"D.APP_CODE": 1,
"D.APP_DATA": 1,
"D.CRYPTO": 1,
"D.PIN": 1,
"D.SEC_DATA": 1,
"D.TS_CODE": 1,
"D.TS_DATA": 1
},
"O": {
"O.IDENTIFICATI": 1,
"O.JAVAOBJECT": 2
},
"OE": {
"OE.TSF": 3
},
"OP": {
"OP.ARRAY_ACCESS": 5,
"OP.CREATE": 3,
"OP.DELETE": 10,
"OP.INSTALL": 10,
"OP.INSTANCE_FIELD": 5,
"OP.INVK_INTERFACE": 7,
"OP.INVK_VIRTUAL": 5,
"OP.JAVA": 3,
"OP.LOAD": 10,
"OP.THROW": 5,
"OP.TYPE_ACCESS": 7
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 16,
"ADV_FSP.1": 3,
"ADV_FSP.2": 2,
"ADV_FSP.4": 15,
"ADV_IMP.1": 11,
"ADV_IMP.2": 1,
"ADV_TDS.1": 2,
"ADV_TDS.3": 21
},
"AGD": {
"AGD_OPE.1": 17,
"AGD_PRE.1": 10
},
"ALC": {
"ALC_CMC.4": 17,
"ALC_CMS.1": 1,
"ALC_CMS.4": 8,
"ALC_DEL.1": 7,
"ALC_DVS.1": 8,
"ALC_DVS.2": 1,
"ALC_LCD.1": 9,
"ALC_TAT.1": 10
},
"ASE": {
"ASE_CCL.1": 16,
"ASE_ECD.1": 14,
"ASE_INT.1": 16,
"ASE_OBJ.2": 13,
"ASE_REQ.1": 2,
"ASE_REQ.2": 15,
"ASE_SPD.1": 10,
"ASE_TSS.1": 7
},
"ATE": {
"ATE_COV.1": 2,
"ATE_COV.2": 7,
"ATE_DPT.1": 1,
"ATE_DPT.2": 14,
"ATE_FUN.1": 14,
"ATE_IND.2": 9
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 15,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4+": 1,
"EAL4": 12,
"EAL4+": 6,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 7,
"FAU_ARP.1.1": 1,
"FAU_GEN.1": 3,
"FAU_SAA.1": 10,
"FAU_SAA.1.1": 1,
"FAU_SAA.1.2": 1
},
"FCS": {
"FCS_CKM.1": 13,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 2,
"FCS_CKM.4": 13,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 18,
"FCS_COP.1.1": 3
},
"FDP": {
"FDP_ACC.1": 15,
"FDP_ACC.2": 15,
"FDP_ACC.2.1": 2,
"FDP_ACC.2.2": 2,
"FDP_ACF.1": 20,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 8,
"FDP_ITC.1": 6,
"FDP_ITC.2": 6,
"FDP_RIP.1": 6,
"FDP_RIP.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 6,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 8,
"FDP_UIT.1.1": 2
},
"FIA": {
"FIA_AFL.1": 7,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_ATD.1": 13,
"FIA_ATD.1.1": 2,
"FIA_SOS.1": 7,
"FIA_SOS.1.1": 1,
"FIA_UAU.1": 22,
"FIA_UAU.1.1": 7,
"FIA_UAU.1.2": 3,
"FIA_UAU.4": 7,
"FIA_UAU.4.1": 1,
"FIA_UAU.6": 6,
"FIA_UAU.6.1": 1,
"FIA_UID.1": 13,
"FIA_UID.1.1": 2,
"FIA_UID.1.2": 1,
"FIA_USB.1": 6,
"FIA_USB.1.1": 1,
"FIA_USB.1.2": 1,
"FIA_USB.1.3": 1
},
"FMT": {
"FMT_MOF.1": 7,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 15,
"FMT_MSA.1.1": 3,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 7,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 7,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_SMF.1": 11,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 18,
"FMT_SMR.1.1": 5,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 6,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_RCV.2": 1,
"FPT_RCV.3": 6,
"FPT_RCV.3.1": 1,
"FPT_RCV.3.2": 1,
"FPT_RCV.3.3": 1,
"FPT_RCV.3.4": 1,
"FPT_RCV.4": 5,
"FPT_RCV.4.1": 1,
"FPT_TST.1": 6,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC.1": 6,
"FTP_TRP.1": 5
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"TORNADO": {
"TORNADO": 1
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KA": {
"Key Agreement": 1,
"Key agreement": 1
},
"MAC": {
"MAC": 1
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 8
}
},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"GlobalPlatform 2.1.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"Malfunction": 7,
"Physical tampering": 2,
"malfunction": 2
},
"SCA": {
"DPA": 1,
"SPA": 1,
"timing attack": 1
}
},
"standard_id": {
"BSI": {
"AIS20": 1
},
"CC": {
"CCMB-2009-07-001": 2,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2
},
"PKCS": {
"PKCS#2": 1
},
"SCP": {
"SCP 02": 1,
"SCP02": 20
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 3
}
},
"DES": {
"3DES": {
"TDES": 8
},
"DES": {
"DES": 1
}
},
"miscellaneous": {
"ARIA": {
"ARIA": 4
},
"SEED": {
"SEED": 5
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Samsung": {
"Samsung": 12
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "ITSCC",
"/CreationDate": "D:20110729101020+09\u002700\u0027",
"/Creator": "PDFCreator Version 1.2.0",
"/Keywords": "",
"/ModDate": "D:20110729101020+09\u002700\u0027",
"/Producer": "GPL Ghostscript 9.0",
"/Subject": "",
"/Title": "[????] Security Target Lite_e",
"pdf_file_size_bytes": 1626173,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 90
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf",
"scheme": "KR",
"security_level": {
"_type": "Set",
"elements": [
"ATE_DPT.2",
"EAL4+",
"AVA_VAN.4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ab59294fa0998b0c8f235974085aa38914f67cc96fa4287a47035cb96eb4c397",
"txt_hash": "7e4d2b3496132c30e3628a7f6a76e188ca72414f1d8d9cd42ff9fd1705c50a28"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "8d54ef21e6a713964de8d940cd07a4830ce50843c6e995ceb2b20b6f97a59935",
"txt_hash": "4d8fa92cd3448838189c54fbd5b7760e8ff978d372a421184857d12feef9759d"
}
},
"status": "archived"
}