Single Card Access Maximum Security (SCAMS) 1.0 includes Ohanae Connect 2.1.2.0

 
PROJECT ID
C044
ASSURANCE LEVEL
EAL2
Security Target (ST)
 
Certification Report (CR)
 
PRODUCT NAME AND VERSION
Single Card Access Maximum Security (SCAMS) 1.0 includes Ohanae Connect 2.1.2.0
PRODUCT TYPE
Access control solution that provides random password generator, centralised user password management, data protection, data sanitisation and synchronisation capabilities.
PRODUCT SPONSOR / DEVELOPER

Reisetech (M) Sdn Bhd

PRODUCT SPONSOR / DEVELOPER CONTACT DETAILS

Mohamed Ridzwan Hussain

Reisetech (M) Sdn Bhd
8-2, Jalan Harimau,
Taman Century,
80250 Johor Baru, Johor
MALAYSIA

URL: http://www.reisetech.com.my
Email: This email address is being protected from spambots. You need JavaScript enabled to view it. / This email address is being protected from spambots. You need JavaScript enabled to view it.
Phone: +601 6718 9682 / +607 331 1971
Fax: +607 335 1668

The Target of Evaluation (TOE) is Single Card Acces Maximum Security (SCAMS) 1.0 includes Ohanae Connect 2.1.2.0 or SCAMS. The TOE is an access control solution that consists of an access card that equipped with USB mass storage drive, and pre-installed with Ohanae software. However, the door access card and Ohanae registration module are not part of the evaluation scope. Ohanae provides random password generator, centralised user password management, data protection using encrypted drive/partition, data sanitisation that cleans user track when using USB mass storage drive outside of the secure operational environment and synchronisation capabilities.

The TOE comprises of multiple security components as follows:

  • Door Access Card - The hardware component of the SCAMS is a RFID hardware wiring with plastic casing that provides access door security features. However this is not part of the TOE.
  • Ohanae Secure Sign-On - Provides users with capabilities of generating random password for any forms of web application that require identification and authentication process. It is also applicable to be use on messaging clients such as MSN Messenger, Yahoo Messenger and others.
  • Ohanae Securworkplace - It provides data sanitisation while working with MS Windows 64 bit host operating system. Once this feature is activated, any user activities will be monitored by Ohanae Securworkplace module. Whereas, as the users completed his tasks or activities and plug-off Ohanae, any save data/files within the host operating system will be permanently deleted without any traces.
  • Ohanae Securdrive - It provides encrypted drive services for user to store their data/files inside the USB mass storage drive equipped with the SCAMS Access Card. User will be able to store any data by mounting the encrypted drive on the host OS under the partition name of “INVICTA”. “INVICTA” partition is enforcing with AES 256 bit encryption within limited storage of 4GB formatted in FAT/FAT32 and unlimited storage for NTFS format.
  • Ohanae Registration - To activate or deactivate devices that using Ohanae, which allows the user to have more than one device to be installed with Ohanae. However, this module is not part of the TOE.

Users must enable Ohanae Secure Sign-On, Ohanae Securworkplace and Ohanae Securdrive for evaluated and secure configuration of the TOE. This process perform by Reisetech staffs during pre-installation process is described in Operational Guidance and Administrative Guidance.

In order to perform these functions securely a number of security functions and capabilities have been implemented, including the following:

  • Secure password management – provide users with secure password management via mobile storage i.e. USB Mass Storage,
  • Secure operational environment – provide secure operational environment for users while operating/working inside unidentified or unprotected desktop operating system. The secure features include: secure data management, monitoring and storage, and
  • Security management - centralised management system in TOE server that allows users to synchronise with Ohanae synchronisation databases. However, only Ohanae request to the TOE server is included in the evaluation scope.