Xsmart e-Passport V1.0
CSV information ?
Status | archived |
---|---|
Valid from | 24.09.2008 |
Valid until | 01.06.2019 |
Scheme | 🇰🇷 KR |
Manufacturer | LG CNS |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_VLA.3, EAL4+, ADV_IMP.2, ATE_DPT.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DESAsymmetric Algorithms
RSA 2048, ECDSA, ECC, DHSchemes
MACRandomness
RNGJavaCard versions
Global Platform 2.1.1IC data groups
EF.DG15, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
InfineonSecurity level
EAL4+, EAL4, EAL5+Security Assurance Requirements (SAR)
ACM_CAP.4, ACM_SCP.2, ACM_AUT.1, ADO_DEL.1, ADO_IGS.1, ADV_IMP.2, ADV_FSP.2, ADV_SPM.1, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV, ATE_DPT, ATE_COV.1, ATE_FUN.1, ATE_IND.2, ATE_SOF.1, ATE_VLA.3, AVA_VLA.3, AVA_MSU.2, ASE_INT.1, ASE_DES.1, ASE_ENV.1, ASE_OBJ.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ASE_PPC.1Security Functional Requirements (SFR)
FMT_SMR.1, FMT_MOF.1, FMT_MTD.1Certificates
KECS‐ISIS‐0119‐2008Evaluation facilities
KISASide-channel analysis
DPA, SPA, malfunction, DFA, reverse engineeringStandards
PKCS#3, ICAO, SCP02File metadata
Title | Microsoft Word - XSmart_e-passport_V1.0_KECS-ISIS-0119-2008_영문.docx |
---|---|
Author | Administrator |
Creation date | D:20101026094402+09'00' |
Modification date | D:20101026094421+09'00' |
Pages | 37 |
Creator | PScript5.dll Version 5.2 |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Security target ?
Extracted keywords
Symmetric Algorithms
DES, TDESAsymmetric Algorithms
RSA 2048, ECDH, ECDSA, ECC, Diffie-Hellman, DHHash functions
SHA-1, SHA-224Schemes
MACBlock cipher modes
CBCJavaCard versions
Java Card 2.2.1, GlobalPlatform 2.1.1, Global Platform 2.1.1IC data groups
EF.DG1, EF.DG2, EF.DG16, EF.DG3, EF.DG4, EF.DG14, EF.DG15, EF.COM, EF.SODTrusted Execution Environments
SSCVendor
Infineon, Infineon Technologies AG, PhilipsSecurity level
EAL4+, EAL5+, EAL4, EAL4 augmentedClaims
O.AA, O.BAC, O.CERTIFACATE, O.DELETING, O.EAC, O.MANAGEMENT, O.REPLAY, O.SELF-PROTECTION, O.SECURE, O.SESSION, T.APPLICATION, T.TSF, T.BAC, T.FORGERY, T.EAC-CA, T.IS, T.SESSION, T.MALFUNCTION, T.EAC-, A.CERTIFICATE, A.IC, A.INSPECTION, A.MRZ, OE.APPLICATION, OE.CERTIFACATE, OE.IC, OE.INSPECTION, OE.MRZ, OE.PASSPORT, OE.PERSONALIZATION, OE.PKI, OE.PROCEDURES, OE.RANGESecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_IMP.2, ADV_SPM.1, ADV_FSP.2, ADV_HLD.2, ADV_LLD.1, ADV_RCR.1, ADV_FSP.1, ADV_IMP.1, ADV_HLD.1, ADV_FUN.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ALC_VLA.3, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.3, AVA_MSU.3, AVA_VLA.4, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FCS_CKM.1, FCS_COP.1, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_ACC.1, FCS_ACF.1, FDP_ACC.1, FDP_ACF.1, FDP_DAU.1, FDP_RIP.1, FDP_UCT.1, FDP_UIT.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_DAU.1.1, FDP_DAU.1.2, FDP_RIP.1.1, FDP_IFC.1, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ICF.1, FIA_UAU.4, FIA_AFL.1, FIA_UAU.1, FIA_UAU.5, FIA_UID.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.1.1, FIA_UID.1.2, FMT_MTD.3, FMT_MOF.1, FMT_MSA.1, FMT_MSA.3, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1, FMT_MSA.2, FMT_MOF.1.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MTD.1.1, FMT_MTD.3.1, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_ITI.1, FPT_RVM.1, FPT_SEP.1, FPT_TST.1, FPT_FLS.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RVM.1.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_AMT.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC.1, FTP_TRP.1, FTP_ICT.1Protection profiles
BSI-PP-0002, BSI-PP-0017, BSI-PP-0026, KECS-PP-0084-2008Side-channel analysis
DPA, SPA, malfunction, Malfunction, reverse engineering, Reverse EngineeringStandards
PKCS#3, ISO/IEC 14443-4, ISO/IEC 11770-2, ISO/IEC 10118-3, ISO/IEC 15946-3, ISO/IEC 18033-3, ISO/IEC 10116, ISO/IEC 9797-1, ISO/IEC 15946-2, ISO/IEC 11770-, ISO/IEC 9796-2, ISO/IEC 14443, ICAO, SCP02, CCMB-2005-08-002, CCMB-2005-08-003File metadata
Title | 보안목표명세서 |
---|---|
Author | LG CNS |
Creation date | D:20081205165427+09'00' |
Modification date | D:20081205165717+09'00' |
Pages | 97 |
Creator | Acrobat PDFMaker 7.0.5 for Word |
Producer | Acrobat Elements 7.0.5 (Windows) |
Heuristics ?
Extracted SARs
ADV_FSP.2, ADV_FUN.1, ADV_HLD.2, ADV_IMP.2, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ALC_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, ATE_SOF.1, ATE_VLA.3, AVA_MSU.3, AVA_SOF.1, AVA_VLA.3Scheme data ?
Product | XSmart e-Passport V1.0 | |
---|---|---|
Cert Id | KECS-ISIS-0119-2008 | |
Product Link | https://itscc.kr/certprod/view.do?product_id=119&product_class=4 | |
Vendor | LG CNS | |
Level | EAL4+ | |
Category | e-Passport | |
Certification Date | 24.09.2008 | |
Enhanced | ||
Product | XSmart e-Passport V1.0 | |
Cc Version | CC V2.3 | |
Assurance Level | EAL4+ | |
Certification Date | 24.09.2008 | |
Expiration Date | 01.06.2019 | |
Product Type | e-Passport | |
Cert Id | KECS-ISIS-0119-2008 | |
Report Link | https://itscc.kr/file/download.do?file=KPR100000001261 | |
Target Link | https://itscc.kr/file/download.do?file=KPR100000001263 | |
Cert Link | https://itscc.kr/file/download.do?file=KPR100000001262 | |
Protection Profile | ePassport Protection Profile V1.0 | |
Developer | LG CNS | |
Holder | LG CNS | |
Maintenance Update | [frozendict({'name': 'XSmart e-Passport V1.0 Assurance maintenance1', 'certification_date': datetime.date(2010, 5, 7), 'cert_id': 'KECS-ISIS-0119b-2008', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001168'})] |
References ?
No references are available for this certificate.
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'XSmart e-Passport V1.0', 'cert_id': 'KECS-ISIS-0119-2008', 'product_link': 'https://itscc.kr/certprod/view.do?product_id=119&product_class=4', 'vendor': 'LG CNS', 'level': 'EAL4+', 'category': 'e-Passport', 'certification_date': '2008-09-24', 'enhanced': {'product': 'XSmart e-Passport V1.0', 'cc_version': 'CC V2.3', 'assurance_level': 'EAL4+', 'certification_date': '2008-09-24', 'expiration_date': '2019-06-01', 'product_type': 'e-Passport', 'cert_id': 'KECS-ISIS-0119-2008', 'report_link': 'https://itscc.kr/file/download.do?file=KPR100000001261', 'target_link': 'https://itscc.kr/file/download.do?file=KPR100000001263', 'cert_link': 'https://itscc.kr/file/download.do?file=KPR100000001262', 'protection_profile': 'ePassport Protection Profile V1.0', 'developer': 'LG CNS', 'holder': 'LG CNS', 'maintenance_update': [{'name': 'XSmart e-Passport V1.0 Assurance maintenance1', 'certification_date': '2010-05-07', 'cert_id': 'KECS-ISIS-0119b-2008', 'maintenance_link': 'https://itscc.kr/file/download.do?file=KPR200000001168'}]}}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'cb3b5d89d7268808c8887167aad6ae93e7c5c76bf5557440b2e5f389487c8639', 'txt_hash': 'b6e98b2c4ce783b1899f3009b4237ff8d735c2a81fd55b6d2984f086b7700921'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'd9c3d5582b938353adcbdcc88716c0484f06d9259bd459abbfc38d0ecd854da4', 'txt_hash': 'a533c03ec7dab1b4ae34aaf5c32841aa5e13c904b6ff723d166496ac4ce35601'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 830818, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 37, '/Author': 'Administrator', '/CreationDate': "D:20101026094402+09'00'", '/Creator': 'PScript5.dll Version 5.2', '/ModDate': "D:20101026094421+09'00'", '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/Title': 'Microsoft Word - XSmart_e-passport_V1.0_KECS-ISIS-0119-2008_영문.docx', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1148106, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 97, '/CreationDate': "D:20081205165427+09'00'", '/Author': 'LG CNS', '/IC': 'SLE66CLX800PE', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/TOE': 'XSmart e-Passport', '/PROD_V': 'V2.0', '/ModDate': "D:20081205165717+09'00'", '/PRODUCT': 'XSmart', '/ST_V': 'V1.0', '/Company': 'SICC', '/Title': '보안목표명세서', '/TOE_V': 'V1.0', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'KR': {'KECS‐ISIS‐0119‐2008': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 2, 'EAL4': 1, 'EAL5+': 3}}, 'cc_sar': {'ACM': {'ACM_CAP.4': 1, 'ACM_SCP.2': 1, 'ACM_AUT.1': 1}, 'ADO': {'ADO_DEL.1': 1, 'ADO_IGS.1': 1}, 'ADV': {'ADV_IMP.2': 2, 'ADV_FSP.2': 1, 'ADV_SPM.1': 1, 'ADV_HLD.2': 1, 'ADV_LLD.1': 1, 'ADV_RCR.1': 1}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 2}, 'ALC': {'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 2, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_COV.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_SOF.1': 1, 'ATE_VLA.3': 1}, 'AVA': {'AVA_VLA.3': 1, 'AVA_MSU.2': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1, 'ASE_PPC.1': 1}}, 'cc_sfr': {'FMT': {'FMT_SMR.1': 1, 'FMT_MOF.1': 1, 'FMT_MTD.1': 1}}, 'cc_claims': {}, 'vendor': {'Infineon': {'Infineon': 2}}, 'eval_facility': {'KISA': {'KISA': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 1}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}, 'ECC': {'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 1}}, 'FF': {'DH': {'DH': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 1}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 1, 'SPA': 1}, 'FI': {'malfunction': 1, 'DFA': 1}, 'other': {'reverse engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG15': 1, 'EF.COM': 1, 'EF.SOD': 1}}, 'standard_id': {'PKCS': {'PKCS#3': 1}, 'ICAO': {'ICAO': 8}, 'SCP': {'SCP02': 2}}, 'javacard_version': {'GlobalPlatform': {'Global Platform 2.1.1': 1}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002': 1, 'BSI-PP-0017': 1, 'BSI-PP-0026': 1}, 'KECS': {'KECS-PP-0084-2008': 5}}, 'cc_security_level': {'EAL': {'EAL4+': 7, 'EAL5+': 6, 'EAL4': 20, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 10, 'ACM_CAP.4': 20, 'ACM_SCP.2': 6, 'ACM_CAP.3': 3}, 'ADO': {'ADO_DEL.2': 9, 'ADO_IGS.1': 8}, 'ADV': {'ADV_IMP.2': 21, 'ADV_SPM.1': 14, 'ADV_FSP.2': 12, 'ADV_HLD.2': 20, 'ADV_LLD.1': 22, 'ADV_RCR.1': 10, 'ADV_FSP.1': 12, 'ADV_IMP.1': 5, 'ADV_HLD.1': 1, 'ADV_FUN.1': 1}, 'AGD': {'AGD_ADM.1': 17, 'AGD_USR.1': 14}, 'ALC': {'ALC_DVS.2': 1, 'ALC_DVS.1': 9, 'ALC_LCD.1': 8, 'ALC_TAT.1': 11, 'ALC_VLA.3': 1}, 'ATE': {'ATE_DPT.2': 17, 'ATE_COV.2': 7, 'ATE_FUN.1': 14, 'ATE_IND.2': 9}, 'AVA': {'AVA_VLA.3': 27, 'AVA_MSU.3': 1, 'AVA_VLA.4': 1, 'AVA_MSU.2': 14, 'AVA_SOF.1': 8, 'AVA_VLA.2': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM.1': 34, 'FCS_COP.1': 47, 'FCS_CKM.2': 20, 'FCS_CKM.4': 24, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 2, 'FCS_CKM.4.1': 1, 'FCS_COP.1.1': 5, 'FCS_ACC.1': 1, 'FCS_ACF.1': 1}, 'FDP': {'FDP_ACC.1': 27, 'FDP_ACF.1': 24, 'FDP_DAU.1': 6, 'FDP_RIP.1': 8, 'FDP_UCT.1': 8, 'FDP_UIT.1': 10, 'FDP_ITC.1': 11, 'FDP_ITC.2': 11, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 3, 'FDP_DAU.1.1': 1, 'FDP_DAU.1.2': 1, 'FDP_RIP.1.1': 1, 'FDP_IFC.1': 5, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ICF.1': 1}, 'FIA': {'FIA_UAU.4': 11, 'FIA_AFL.1': 18, 'FIA_UAU.1': 38, 'FIA_UAU.5': 8, 'FIA_UID.1': 18, 'FIA_AFL.1.1': 2, 'FIA_AFL.1.2': 2, 'FIA_UAU.1.1': 7, 'FIA_UAU.1.2': 3, 'FIA_UAU.4.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1}, 'FMT': {'FMT_MTD.3': 10, 'FMT_MOF.1': 13, 'FMT_MSA.1': 12, 'FMT_MSA.3': 12, 'FMT_MTD.1': 24, 'FMT_SMF.1': 22, 'FMT_SMR.1': 20, 'FMT_MSA.2': 17, 'FMT_MOF.1.1': 2, 'FMT_MSA.1.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_MTD.1.1': 3, 'FMT_MTD.3.1': 1, 'FMT_SMF.1.1': 1, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1}, 'FPR': {'FPR_UNO.1': 6, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_ITI.1': 10, 'FPT_RVM.1': 6, 'FPT_SEP.1': 7, 'FPT_TST.1': 11, 'FPT_FLS.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_RVM.1.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_AMT.1': 3, 'FPT_TST.1.1': 1, 'FPT_TST.1.2': 1, 'FPT_TST.1.3': 1}, 'FTP': {'FTP_ITC.1': 5, 'FTP_TRP.1': 5, 'FTP_ICT.1': 1}}, 'cc_claims': {'O': {'O.AA': 8, 'O.BAC': 10, 'O.CERTIFACATE': 4, 'O.DELETING': 2, 'O.EAC': 14, 'O.MANAGEMENT': 2, 'O.REPLAY': 4, 'O.SELF-PROTECTION': 4, 'O.SECURE': 4, 'O.SESSION': 2}, 'T': {'T.APPLICATION': 3, 'T.TSF': 3, 'T.BAC': 7, 'T.FORGERY': 2, 'T.EAC-CA': 4, 'T.IS': 3, 'T.SESSION': 3, 'T.MALFUNCTION': 3, 'T.EAC-': 1}, 'A': {'A.CERTIFICATE': 3, 'A.IC': 3, 'A.INSPECTION': 4, 'A.MRZ': 3}, 'OE': {'OE.APPLICATION': 2, 'OE.CERTIFACATE': 3, 'OE.IC': 13, 'OE.INSPECTION': 3, 'OE.MRZ': 3, 'OE.PASSPORT': 3, 'OE.PERSONALIZATION': 3, 'OE.PKI': 3, 'OE.PROCEDURES': 3, 'OE.RANGE': 2}}, 'vendor': {'Infineon': {'Infineon': 2, 'Infineon Technologies AG': 2}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 7}, '3DES': {'TDES': 9}}}, 'asymmetric_crypto': {'RSA': {'RSA 2048': 1}, 'ECC': {'ECDH': {'ECDH': 5}, 'ECDSA': {'ECDSA': 1}, 'ECC': {'ECC': 8}}, 'FF': {'DH': {'Diffie-Hellman': 2, 'DH': 4}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 6}, 'SHA2': {'SHA-224': 1}}}, 'crypto_scheme': {'MAC': {'MAC': 46}}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'DPA': 3, 'SPA': 3}, 'FI': {'malfunction': 9, 'Malfunction': 2}, 'other': {'reverse engineering': 2, 'Reverse Engineering': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'IBM': {'SSC': 9}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {'EF': {'EF.DG1': 2, 'EF.DG2': 2, 'EF.DG16': 2, 'EF.DG3': 2, 'EF.DG4': 2, 'EF.DG14': 2, 'EF.DG15': 4, 'EF.COM': 5, 'EF.SOD': 2}}, 'standard_id': {'PKCS': {'PKCS#3': 1}, 'ISO': {'ISO/IEC 14443-4': 2, 'ISO/IEC 11770-2': 1, 'ISO/IEC 10118-3': 2, 'ISO/IEC 15946-3': 2, 'ISO/IEC 18033-3': 2, 'ISO/IEC 10116': 2, 'ISO/IEC 9797-1': 3, 'ISO/IEC 15946-2': 3, 'ISO/IEC 11770-': 1, 'ISO/IEC 9796-2': 1, 'ISO/IEC 14443': 2}, 'ICAO': {'ICAO': 21}, 'SCP': {'SCP02': 77}, 'CC': {'CCMB-2005-08-002': 1, 'CCMB-2005-08-003': 1}}, 'javacard_version': {'JavaCard': {'Java Card 2.2.1': 3}, 'GlobalPlatform': {'GlobalPlatform 2.1.1': 1, 'Global Platform 2.1.1': 2}}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
20101026101955.pdf
. - The st_filename property was set to
20100817112501.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
KECS-ISIS-0119-2008
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_VLA', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_VLA', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20101026101955.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100817112501.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_VLA', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_VLA', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Xsmart e-Passport V1.0 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "c7ce9a4dec3c80ce",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "KECS-ISIS-0119-2008",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_VLA",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_VLA",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "e-Passport",
"cert_id": "KECS-ISIS-0119-2008",
"certification_date": "2008-09-24",
"enhanced": {
"assurance_level": "EAL4+",
"cc_version": "CC V2.3",
"cert_id": "KECS-ISIS-0119-2008",
"cert_link": "https://itscc.kr/file/download.do?file=KPR100000001262",
"certification_date": "2008-09-24",
"developer": "LG CNS",
"expiration_date": "2019-06-01",
"holder": "LG CNS",
"maintenance_update": [
{
"cert_id": "KECS-ISIS-0119b-2008",
"certification_date": "2010-05-07",
"maintenance_link": "https://itscc.kr/file/download.do?file=KPR200000001168",
"name": "XSmart e-Passport V1.0 Assurance maintenance1"
}
],
"product": "XSmart e-Passport V1.0",
"product_type": "e-Passport",
"protection_profile": "ePassport Protection Profile V1.0",
"report_link": "https://itscc.kr/file/download.do?file=KPR100000001261",
"target_link": "https://itscc.kr/file/download.do?file=KPR100000001263"
},
"level": "EAL4+",
"product": "XSmart e-Passport V1.0",
"product_link": "https://itscc.kr/certprod/view.do?product_id=119\u0026product_class=4",
"vendor": "LG CNS"
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "LG CNS",
"manufacturer_web": "https://www.lgcns.com/",
"name": "Xsmart e-Passport V1.0",
"not_valid_after": "2019-06-01",
"not_valid_before": "2008-09-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "20101026101955.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 1
}
},
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {
"KR": {
"KECS\u2010ISIS\u20100119\u20102008": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 1,
"ACM_CAP.4": 1,
"ACM_SCP.2": 1
},
"ADO": {
"ADO_DEL.1": 1,
"ADO_IGS.1": 1
},
"ADV": {
"ADV_FSP.2": 1,
"ADV_HLD.2": 1,
"ADV_IMP.2": 2,
"ADV_LLD.1": 1,
"ADV_RCR.1": 1,
"ADV_SPM.1": 1
},
"AGD": {
"AGD_ADM.1": 1,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS.1": 1,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_DPT": 1,
"ATE_DPT.2": 2,
"ATE_FUN.1": 1,
"ATE_IND.2": 1,
"ATE_SOF.1": 1,
"ATE_VLA.3": 1
},
"AVA": {
"AVA_MSU.2": 1,
"AVA_VLA.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 1,
"EAL4+": 2,
"EAL5+": 3
}
},
"cc_sfr": {
"FMT": {
"FMT_MOF.1": 1,
"FMT_MTD.1": 1,
"FMT_SMR.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"KISA": {
"KISA": 1
}
},
"hash_function": {},
"ic_data_group": {
"EF": {
"EF.COM": 1,
"EF.DG15": 1,
"EF.SOD": 1
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 1
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 1
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"malfunction": 1
},
"SCA": {
"DPA": 1,
"SPA": 1
},
"other": {
"reverse engineering": 1
}
},
"standard_id": {
"ICAO": {
"ICAO": 8
},
"PKCS": {
"PKCS#3": 1
},
"SCP": {
"SCP02": 2
}
},
"symmetric_crypto": {
"DES": {
"DES": {
"DES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 2
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Administrator",
"/CreationDate": "D:20101026094402+09\u002700\u0027",
"/Creator": "PScript5.dll Version 5.2",
"/ModDate": "D:20101026094421+09\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/Title": "Microsoft Word - XSmart_e-passport_V1.0_KECS-ISIS-0119-2008_\uc601\ubb38.docx",
"pdf_file_size_bytes": 830818,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 37
},
"st_filename": "20100817112501.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 8
},
"ECDH": {
"ECDH": 5
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"DH": 4,
"Diffie-Hellman": 2
}
},
"RSA": {
"RSA 2048": 1
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CERTIFICATE": 3,
"A.IC": 3,
"A.INSPECTION": 4,
"A.MRZ": 3
},
"O": {
"O.AA": 8,
"O.BAC": 10,
"O.CERTIFACATE": 4,
"O.DELETING": 2,
"O.EAC": 14,
"O.MANAGEMENT": 2,
"O.REPLAY": 4,
"O.SECURE": 4,
"O.SELF-PROTECTION": 4,
"O.SESSION": 2
},
"OE": {
"OE.APPLICATION": 2,
"OE.CERTIFACATE": 3,
"OE.IC": 13,
"OE.INSPECTION": 3,
"OE.MRZ": 3,
"OE.PASSPORT": 3,
"OE.PERSONALIZATION": 3,
"OE.PKI": 3,
"OE.PROCEDURES": 3,
"OE.RANGE": 2
},
"T": {
"T.APPLICATION": 3,
"T.BAC": 7,
"T.EAC-": 1,
"T.EAC-CA": 4,
"T.FORGERY": 2,
"T.IS": 3,
"T.MALFUNCTION": 3,
"T.SESSION": 3,
"T.TSF": 3
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002": 1,
"BSI-PP-0017": 1,
"BSI-PP-0026": 1
},
"KECS": {
"KECS-PP-0084-2008": 5
}
},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 10,
"ACM_CAP.3": 3,
"ACM_CAP.4": 20,
"ACM_SCP.2": 6
},
"ADO": {
"ADO_DEL.2": 9,
"ADO_IGS.1": 8
},
"ADV": {
"ADV_FSP.1": 12,
"ADV_FSP.2": 12,
"ADV_FUN.1": 1,
"ADV_HLD.1": 1,
"ADV_HLD.2": 20,
"ADV_IMP.1": 5,
"ADV_IMP.2": 21,
"ADV_LLD.1": 22,
"ADV_RCR.1": 10,
"ADV_SPM.1": 14
},
"AGD": {
"AGD_ADM.1": 17,
"AGD_USR.1": 14
},
"ALC": {
"ALC_DVS.1": 9,
"ALC_DVS.2": 1,
"ALC_LCD.1": 8,
"ALC_TAT.1": 11,
"ALC_VLA.3": 1
},
"ATE": {
"ATE_COV.2": 7,
"ATE_DPT.2": 17,
"ATE_FUN.1": 14,
"ATE_IND.2": 9
},
"AVA": {
"AVA_MSU.2": 14,
"AVA_MSU.3": 1,
"AVA_SOF.1": 8,
"AVA_VLA.2": 1,
"AVA_VLA.3": 27,
"AVA_VLA.4": 1
}
},
"cc_security_level": {
"EAL": {
"EAL4": 20,
"EAL4 augmented": 1,
"EAL4+": 7,
"EAL5+": 6
}
},
"cc_sfr": {
"FCS": {
"FCS_ACC.1": 1,
"FCS_ACF.1": 1,
"FCS_CKM.1": 34,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 20,
"FCS_CKM.2.1": 2,
"FCS_CKM.4": 24,
"FCS_CKM.4.1": 1,
"FCS_COP.1": 47,
"FCS_COP.1.1": 5
},
"FDP": {
"FDP_ACC.1": 27,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 24,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 3,
"FDP_DAU.1": 6,
"FDP_DAU.1.1": 1,
"FDP_DAU.1.2": 1,
"FDP_ICF.1": 1,
"FDP_IFC.1": 5,
"FDP_ITC.1": 11,
"FDP_ITC.2": 11,
"FDP_RIP.1": 8,
"FDP_RIP.1.1": 1,
"FDP_UCT.1": 8,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 10,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 18,
"FIA_AFL.1.1": 2,
"FIA_AFL.1.2": 2,
"FIA_UAU.1": 38,
"FIA_UAU.1.1": 7,
"FIA_UAU.1.2": 3,
"FIA_UAU.4": 11,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 8,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 18,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 13,
"FMT_MOF.1.1": 2,
"FMT_MSA.1": 12,
"FMT_MSA.1.1": 1,
"FMT_MSA.2": 17,
"FMT_MSA.3": 12,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 24,
"FMT_MTD.1.1": 3,
"FMT_MTD.3": 10,
"FMT_MTD.3.1": 1,
"FMT_SMF.1": 22,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 20,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 6,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_AMT.1": 3,
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITI.1": 10,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_RVM.1": 6,
"FPT_RVM.1.1": 1,
"FPT_SEP.1": 7,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TST.1": 11,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ICT.1": 1,
"FTP_ITC.1": 5,
"FTP_TRP.1": 5
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"MAC": {
"MAC": 46
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 6
},
"SHA2": {
"SHA-224": 1
}
}
},
"ic_data_group": {
"EF": {
"EF.COM": 5,
"EF.DG1": 2,
"EF.DG14": 2,
"EF.DG15": 4,
"EF.DG16": 2,
"EF.DG2": 2,
"EF.DG3": 2,
"EF.DG4": 2,
"EF.SOD": 2
}
},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.1.1": 2,
"GlobalPlatform 2.1.1": 1
},
"JavaCard": {
"Java Card 2.2.1": 3
}
},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 2,
"malfunction": 9
},
"SCA": {
"DPA": 3,
"SPA": 3
},
"other": {
"Reverse Engineering": 1,
"reverse engineering": 2
}
},
"standard_id": {
"CC": {
"CCMB-2005-08-002": 1,
"CCMB-2005-08-003": 1
},
"ICAO": {
"ICAO": 21
},
"ISO": {
"ISO/IEC 10116": 2,
"ISO/IEC 10118-3": 2,
"ISO/IEC 11770-": 1,
"ISO/IEC 11770-2": 1,
"ISO/IEC 14443": 2,
"ISO/IEC 14443-4": 2,
"ISO/IEC 15946-2": 3,
"ISO/IEC 15946-3": 2,
"ISO/IEC 18033-3": 2,
"ISO/IEC 9796-2": 1,
"ISO/IEC 9797-1": 3
},
"PKCS": {
"PKCS#3": 1
},
"SCP": {
"SCP02": 77
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDES": 9
},
"DES": {
"DES": 7
}
}
},
"technical_report_id": {},
"tee_name": {
"IBM": {
"SSC": 9
}
},
"tls_cipher_suite": {},
"vendor": {
"Infineon": {
"Infineon": 2,
"Infineon Technologies AG": 2
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "LG CNS",
"/Company": "SICC",
"/CreationDate": "D:20081205165427+09\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.5 for Word",
"/IC": "SLE66CLX800PE",
"/ModDate": "D:20081205165717+09\u002700\u0027",
"/PRODUCT": "XSmart",
"/PROD_V": "V2.0",
"/Producer": "Acrobat Elements 7.0.5 (Windows)",
"/ST_V": "V1.0",
"/TOE": "XSmart e-Passport",
"/TOE_V": "V1.0",
"/Title": "\ubcf4\uc548\ubaa9\ud45c\uba85\uc138\uc11c",
"pdf_file_size_bytes": 1148106,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 97
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20101026101955.pdf",
"scheme": "KR",
"security_level": {
"_type": "Set",
"elements": [
"ADV_IMP.2",
"AVA_VLA.3",
"ATE_DPT.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100817112501.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "cb3b5d89d7268808c8887167aad6ae93e7c5c76bf5557440b2e5f389487c8639",
"txt_hash": "b6e98b2c4ce783b1899f3009b4237ff8d735c2a81fd55b6d2984f086b7700921"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d9c3d5582b938353adcbdcc88716c0484f06d9259bd459abbfc38d0ecd854da4",
"txt_hash": "a533c03ec7dab1b4ae34aaf5c32841aa5e13c904b6ff723d166496ac4ce35601"
}
},
"status": "archived"
}