NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2

CSV information ?

Status active
Valid from 14.12.2023
Valid until 14.12.2028
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, AVA_VAN.5, EAL4+
Protection profiles

Heuristics summary ?

Certificate ID: NSCIB-CC-2300100-01-CR

Certificate ?

Extracted keywords

Operating System name
JCOP 8
Vendor
NXP Semiconductors, NXP

Security level
EAL4, EAL2, EAL7, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5
Protection profiles
BSI-CC-PP-0099-V2-2020
Certificates
NSCIB-CC-2300100-01, NSCIB-2300100-01
Evaluation facilities
TÜV Informationstechnik

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Haak
Creation date D:20231218225328+00'00'
Modification date D:20231218225328+00'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, HMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512
Schemes
MAC
Block cipher modes
ECB, CBC, CTR, CFB, GCM

JavaCard versions
Java Card 3.1, GlobalPlatform 2.3.1
Operating System name
JCOP 8
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, AVA_VAN.5, AVA_VAN
Protection profiles
BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0100-2018
Certificates
NSCIB-CC-2300100-01-CR, NSCIB-2300100-01, NSCIB-2300083-01-CR, NSCIB-2300083-01
Evaluation facilities
TÜV Informationstechnik

Side-channel analysis
side-channel, JIL, JIL-AAPS

Standards
AIS20

File metadata

Title Certification Report
Author sjon
Creation date D:20231215215207+00'00'
Modification date D:20231215215207+00'00'
Pages 13
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2300100-01-CR
Certified item NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2
Certification lab TÜV Informationstechnik GmbH
Developer NXP Semiconductors Germany GmbH

References

Outgoing

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-, DES, Triple-DES, 3DES, TDES, TripleDES, TDEA, SM4, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
RSA 1024, RSA-CRT, ECDH, ECDSA, EdDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Randomness
TRNG, RND, RNG
Libraries
Crypto Library ..................................................12
Elliptic Curves
P-256, NIST P-256, brainpoolP256r1, Curve25519, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, CFB, GCM, CCM, XTS

JavaCard versions
Java Card 3.1, JC3.1, GlobalPlatform 2.3.1
JavaCard API constants
ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_CBC_PKCS5, ALG_DES_ECB_PKCS5, ALG_DES_CBC_PKCS7, ALG_DES_ECB_PKCS7, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_NOPAD, ALG_DES_MAC4_PKCS5, ALG_DES_MAC8_PKCS5, ALG_DES_CMAC8, ALG_RSA_NOPAD, ALG_RSA_PKCS1, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_PKCS1, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_ISO9797_M2_STANDARD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_ECB_PKCS5, ALG_AES_CBC_PKCS7, ALG_AES_ECB_PKCS7, ALG_AES_CBC_ISO9797_STANDARD, ALG_AES_CFB, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC8, ALG_AES_CMAC16, ALG_AES_CMAC16_STANDARD, ALG_AES_CMAC_128, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA_224, ALG_SHA3_224, ALG_SHA3_256, ALG_SHA3_384, ALG_SHA3_512, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_EDDSA, SIG_CIPHER_EDDSAPH, SIG_CIPHER_AES_CMAC8, SIG_CIPHER_AES_CMAC16, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_DES_CMAC8, PAD_PKCS1_OAEP, TYPE_ACCESS, LENGTH_DES3_2KEY, LENGTH_DES3_3KEY, LENGTH_AES_128, LENGTH_AES_192, LENGTH_AES_256, LENGTH_EC_FP_128, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_528, LENGTH_EC_FP_384, LENGTH_SHA, LENGTH_SHA_224, LENGTH_SHA_256, LENGTH_SHA_384, LENGTH_SHA_512, LENGTH_SHA3_224, LENGTH_SHA3_256, LENGTH_SHA3_384, LENGTH_SHA3_512, LENGTH_RSA_1024, FRP256V1, SM2
Operating System name
JCOP 8, JCOP8
Trusted Execution Environments
SE
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4 augmented
Claims
D.UPDATE_IMAGE, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.PIN, D.APSD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.CARD_MNGT_, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG_ITEM, D.RESTRICTED_, D.TOE_IDENTIFIER, D.APP_C_, D.CARD_, D.CARD_MNGT_DATA, D.APP_, D.JCS_, D.RESTRICTED_MODE_STATE, D.TOE_IDENTIFICATION, D.SECRETS, D.SK, D.MNO_KEYS, D.PROFILE_NAA_PRAMS, D.PROFILE_NAA_PARAMS, O.REMOTE, O.BIO-MNGT, O.EXT-MEM, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.LOAD, O.INSTALL, O.DELETION, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.APPLET_LOADED, O.APPLET_CURRENT, O.CODE_CAP_, T.RND, T.CONFID-UPDATE-IMAGE, T.INTEG-UPDATE-IMAGE, T.UNAUTH-LOAD-UPDATE-IMAGE, T.INTERRUPT-OSU, T.CONFIG, T.COM_EXPLOIT, T.LIFE_CYCLE, T.UNAUTHORIZED_CARD_MNGT, T.INTEG-APPLI-DATA, T.RESTRICTED-MODE, T.CONFID-CONT, T.INTEG-CONT, T.EXE-CONT, T.CONT-DOS, T.CONT-SID, T.INTEG-CODE, T.INSTALL, T.DELETION, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.INTEG-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-JCS-DATA, T.INTEG-APPLI-CODE, T.EXE-CODE, T.NATIVE, T.SID, T.CONFID-APPLI-DA, T.INTEG-APPLI-COD, T.RESOURCES, T.UNAUTHORIZED_, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-UPDATE-I, T.UNAUTH-LOAD-UP, T.INTEG-UPDATE-IM, T.RESTRICTED-MOD, T.CONFID-, T.INTEG-APPLI-, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-IC, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.TRUSTED-GUESTOS, A.APPS-, A.DELETION, A.CAP_FILE, A.VERIFICATION, A.TRUSTED-GUESTO, A.VERIFICATION-AU, R.JAVA, OT.IDENTIFICATION, OT.CONFID-UPDATE-IMAGE, OT.AUTH-LOAD-UPDATE-IMAGE, OT.SECURE_LOAD_ACODE, OT.SECURE_AC_ACTIVATION, OT.TOE_IDENTIFICATION, OT.CARD-CONFIGURATION, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OT.DOMAIN-RIGHTS, OT.APPLI-AUTH, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.CONT_SEP, OT.CONT_PRIV, OT.CONT_DOS, OT.RND, OT.SCP, OT.CARD-MANAGEMENT, OT.CARD-, OT.INSTALL, OT.LOAD, OT.DELETION, OT.SENSITIVE_RESULTS_INTEG, OT.FIREWALL, OT.SID, OT.GLOBAL_, OT.ARRAY_VIEWS_, OT.SENSITIVE_, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.ALARM, OT.CIPHER, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.COMM_, OT.CARD-MANAGEM, OT.CONFID-UPDATE-, OT.AUTH-LOAD-UPD, OT.SECURE_LOAD_, OT.SECURE_AC_, OT.TOE_, OT.CARD-CONFIGUR, OT.ATTACK-COUNT, OT.RESTRICTED-MO, OT.ATTACK-COUNTE, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.ARRAY_VIEWS_CONFID, OT.ARRAY_VIEWS_INTEG, OT.CONT-SEP, OT.CONT-PRIV, OT.CONT-DOS, OT.SECURE-CHANNELS, OT.INTERNALSECURE-CHANNELS, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.READ_CONFIG_, OP.MODIFY_, OP.USE_CONFIG_, OP.TRIGGER_, OP.CONT_ACCESS, OP.ARRAY_T_ASTORE, OP.PUTFIELD, OP.PUTSTATIC, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.TRIGGER_UPDATE, OE.USE_DIAG, OE.USE_KEYS, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.PROCESS_SEC_IC, OE.CONFID-UPDATE-IMAGE, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.TRUSTED-GUESTOS, OE.SECURITY-, OE.IC, OE.RE, OE.CARD-, OE.TRUSTED-GUEST, OE.VERIFICATION-A, OE.SECURITY-DOMA, OE.PROCESS_SEC_, OE.CONFID-UPDATE-, OE.TRUSTED-GUES, SA.CONFID-UPDATE, SA.CONFID-APPLI-D, SA.CONFID-JCS-CO, SA.CONFID-JCS-DAT, SA.INTEG-UPDATE-I, SA.INTEG-APPLI-CO, SA.INTEG-APPLI-DA, SA.INTEG-JCS-CODE, SA.EXE-APPLI-CODE, SA.EXE-JCS-CODE, SA.NATIVE, SA.FIREWALL, SA.VERIFICATION, SA.CARD-MANAGEM, SA.INSTALL, SA.SID, SA.OBJ-DELETION, SA.DELETION, SA.ALARM, SA.OPERATE, SA.RESOURCES, SA.CIPHER, SA.KEY-MNGT, SA.PIN-MNGT, SA.SCP, SA.TRANSACTION, SA.CONFIG-APPLET, SA.OSU, SA.RM, SA.CONTEXT-SEPAR, SA.CONFID-APPLI-DATA, SA.CONFID-JCS-CODE, SA.CONFID-JCS-DATA, SA.INTEG-APPLI-CODE, SA.INTEG-APPLI-DATA, SA.INTEG-JCS-DATA, SA.CONFID-UPDATE-IMAGE, SA.INTEG-UPDATE-IMAGE, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.VERIFICATION, OSP.SECURITY-DOM
Security Assurance Requirements (SAR)
AGD_OPE.1, ALC_DVS.2, AVA_VAN.5, AVA_VAN, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FCO_NRO, FCO_NRO.2, FCO_NRO.1, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.1, FCS_COP.1, FCS_RNG.1, FCS_CKM.5, FCS_RNG, FCS_CKM.2, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_RNG.2, FDP_ACF.1, FDP_IFC, FDP_IFF, FDP_ACC, FDP_ACF, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1, FDP_UIT, FDP_UIT.1, FDP_ROL.1, FDP_ACC.1, FDP_ACC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ROL.1.2, FDP_ROL.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ACC.1.1, FDP_IFC.2.1, FDP_IFC.2.2, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_API, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_SMF, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_PHP.3, FPT_EMS, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0100-2018, BSI-CC-PP-0084-2014
Certificates
NSCIB-2300100-01, NSCIB-2300083-01

Side-channel analysis
physical probing, side channel, side-channel, DPA, SPA, timing attacks, timing attack, Physical Tampering, physical tampering, malfunction, DFA, Fault Injection, JIL

Standards
FIPS 140-3, FIPS 197, FIPS PUB 186-3, AIS20, AIS31, AIS 20, RFC 5639, RFC 8032, RFC 7748, ISO/IEC 7816, SCP80, SCP81, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004
Technical reports
BSI TR-03111

File metadata

Title Security Target Lite
Subject NXP JCOP 8.9 with eUICC extension on SN300 Secure Element
Keywords NXP, ASE, JCOP 8.9 with eUICC extension on SN300 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented
Author NXP B.V.
Creation date D:20231130133951Z
Modification date D:20231130134109-00'00'
Pages 183
Creator DITA Open Toolkit 3.3.1
Producer Apache FOP Version 2.3

References

Outgoing

Heuristics ?

Certificate ID: NSCIB-CC-2300100-01-CR

Extracted SARs

ALC_DVS.2, AGD_OPE.1, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP JCOP 8.x with eUICC extension on SN300 B2 Secure Element, version JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2 NSCIB-CC-2200043-04-CR Compare
NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1 NSCIB-CC-2300099-01-CR Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
NXP JCOP 7.x on SN300 Secure Element, version JCOP 7.0 R1.62.0.1 and JCOP 7.1 R1.04.0.1 NSCIB-CC-2300065-01-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, version JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0324 Compare
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 NSCIB-CC-0428888-CR2 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imagio MP C4001 SPF Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0301 Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lanier MP C4501/C5501, nashuatec MP C4501/C5501, Rex-Rotary MP C4501/C5501, Gestetner MP C4501/C5501, infotec MP C4501/C5501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0302 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0326 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
NXP JCOP 8.x on SN300 B2 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
NXP JCOP 7.0 with eUICC extension on SN300 Secure Element, JCOP 7.0 R1.64.0.2 NSCIB-CC-0441505-CR2 Compare
Ricoh Aficio MP C6501 SP/C7501 SP, Savin C9065/C9075, Lanier LD365C/LD375C, Lanier MP C6501 SP/C7501 SP, nashuatec MP C6501 SP/C7501 SP, Rex-Rotary MP C6501 SP/C7501 SP, Gestetner MP C6501 SP/C7501 SP, infotec MP C6501 SP/C7501 SP all of above with Fax Option Type C7501, DataOverwriteSecurity Unit Type H, and HDD Encryption Unit Type A Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.08, OptionPCLFont 1.02, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0321 Compare
RICOH MP 1601/1301 all of the above with Fax function and HDD unit Version: - Software: system/Copy 1.01, Network Support 12.38, Fax 01.00.00, RemoteFax 01.00.00, NetworkDocBox 1.00, Web Support 1.00.2, Web Uapl 1.00, animation 1.00, Scanner 01.02, Printer 1.00, RPCS 3.12.28, RPCS Font 1.00, Data Erase Onb 1.03m, GWFCU3.8-3(WW) 01.00.00, Engine 1.03:08, OpePanel 1.02, - Hardware: Ic Key 01020714, Ic Hdd 3330 JISEC-CC-CRP-C0389 Compare
Ricoh MP 2001/2501, Savin MP 2501, Lanier MP 2001/2501, nashuatec MP 2001/2501, Rex-Rotary MP 2001/2501, Gestetner MP 2001/2501, infotec MP 2001/2501 all of the above with Fax function and HDD unit Version: - Software: System/Copy 1.01, Network Support 12.38, Fax 01.00.00, RemoteFax 01.00.00, NetworkDocBox 1.00, Web Support 1.00.2, Web Uapl 1.00, animation 1.00, Scanner 01.02, Printer 1.00, PCL 1.01, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.8-3(WW) 01.00.00, Engine 1.03:08, OpePanel 1.02, - Hardware: Ic Key 01020714, Ic Hdd 3330 JISEC-CC-CRP-C0390 Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0346 Compare
Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 301 all of the above with Facsimile Function / Hard Disk Drive Version: - Software: System/Copy 1.08, Network Support 12.25.3, Fax 03.00.00, RemoteFax 01.03.00, NetworkDocBox 1.00, Web Support 1.04, Web Uapl 1.02, animation 2.00, Scanner 01.05, Printer 1.05, PCL 1.06, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-7(WW) 03.00.00, Engine 1.02:05, OpePanel 1.16 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0382 Compare
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, PCL 1.04, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0347 Compare
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit, MFP: Ricoh Aficio MP 6001, Ricoh Aficio MP 7001, Ricoh Aficio MP 8001, Ricoh Aficio MP 9001, Gestetner MP 6001, Gestetner MP 7001, Gestetner MP 8001, Gestetner MP 9001, infotec MP 6001, infotec MP 7001, infotec MP 8001, infotec MP 9001, Lanier LD360, Lanier LD370, Lanier LD380, Lanier LD390, Lanier MP 6001, Lanier MP 7001, Lanier MP 8001, Lanier MP 9001, nashuatec MP 6001, nashuatec MP 7001, nashuatec MP 8001, nashuatec MP 9001, Rex-Rotary MP 6001, Rex-Rotary MP 7001, Rex-Rotary MP 8001, Rex-Rotary MP 9001, Savin 9060, Savin 9070, Savin 9080, Savin 9090 Or Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 6001 SP, Ricoh Aficio MP 7001 SP, Ricoh Aficio MP 8001 SP, Ricoh Aficio MP 9001 SP, Gestetner MP 6001 SP, Gestetner MP 7001 SP, Gestetner MP 8001 SP, Gestetner MP 9001 SP, infotec MP 6001 SP, infotec MP 7001 SP, infotec MP 8001 SP, infotec MP 9001 SP, Lanier LD360sp, Lanier LD370sp, Lanier LD380sp, Lanier LD390sp, nashuatec MP 6001 SP, nashuatec MP 7001 SP, nashuatec MP 8001 SP, nashuatec MP 9001 SP, Rex-Rotary MP 6001 SP, Rex-Rotary MP 7001 SP, Rex-Rotary MP 8001 SP, Rex-Rotary MP 9001 SP, Savin 9060sp, Savin 9070sp, Savin 9080sp, Savin 9090sp FCU: Fax Option Type 9001 DataOverwriteSecurity Unit: DataOverwriteSecurity Unit Type H HDD Encryption Unit: HDD Encryption Unit Type A Printer/Scanner Unit : Printer/Scanner Unit Type 9001 Version: - Software version: System/Copy 1.18 Network Support 8.69.1 Scanner 01.20 Printer 1.16e Fax 03.00.00 RemoteFax 03.00.00 Web Support 1.13.1 Web Uapl 1.05 Network DocBox 1.04 animation 1.2.1 Option PCL 1.02 OptionPCLFont 1.02 Engine 1.61:04 OpePanel 1.04 LANG0 1.03 LANG1 1.03 - Hardware version: Ic Key 1100 Ic Ctlr 03 - Options version: GWFCU3-16(WW) 04.00.00 Data Erase Opt 1.01x JISEC-CC-CRP-C0289 Compare
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m JISEC-CC-CRP-C0246 Compare
NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11 NSCIB-CC-2300172-01-CR Compare
NXP JCOP8.x on SE310 A0 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200042-01-CR Compare
Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, Rex-Rotary MP 6002/7502/9002, infotec MP 6002/7502/9002, Savin MP 6002/7502/#x2f;9002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.3, Network Support 11.90, Fax 01.00.01, RemoteFax 01.00.00, NetworkDocBox 1.00.1, Web Support 1.00, Web Uapl 1.00, animation 1.00, Scanner 01.02, Printer 1.00, PCL 1.01, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-3(WW) 01.00.00, Engine 1.00:01, OpePanel 1.01, LANG0 1.01, LANG1 1.01 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0373 Compare
Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/5210SF/5210SR, Rex-Rotary SP 5200S/5210SF/5210SR, Gestetner SP 5200S/5210SF/5210SR all of above with Facsimile Function Version: - Software: System/Copy 2.02, Network Support 10.63, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.02, animation 1.01, Scanner 01.03, Printer 1.02.1, PCL 1.02, PCL Font 1.05, Data Erase Std 1.01m, GWFCU3-24(WW) 02.00.00, Engine A2.0:20, Engine(Scanner) 1.01:00, OpePanel 1.02, LANG0 1.02, LANG1 1.02 Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0366 Compare
Ricoh imagio MP C3301 SP / imagio MP C2801 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C3301 SPF / imagio MP C2801 SPF Version: -Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.01, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0299 Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01d, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, RPCS 3.10.17, RPCS Font 1.00, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0323 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551, Rex-Rotary MP C2051/C2551, Gestetner MP C2051/C2551, infotec MP C2051/C2551 all of above with Fax Option Type C2551 Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01e, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, PCL 1.01, OptionPCLFont 1.02, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0325 Compare
Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanier MP C300/C300SR/C400/C400SR, nashuatec MP C300/C300SR/C400/C400SR, Rex-Rotary MP C300/C300SR/C400/C400SR, Gestetner MP C300/C300SR/C400/C400SR, infotec MP C300/C300SR/C400/C400SR all of above with Facsimile Function Version: - Software: System/Copy 2.05, Network Support 10.57, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.01, animation 1.00, Scanner 01.04, Printer 1.01, PCL 1.07, OptionPCLFont 1.02, Data Erase Std 1.01x, GWFCU3-23(WW) 03.00.00, Engine 1.02:02, OpePanel 1.03, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0367 Compare
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lanier MP C3001/C3501, nashuatec MP C3001/C3501, Rex-Rotary MP C3001/C3501, Gestetner MP C3001/C3501, infotec MP C3001/C3501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.02, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0300 Compare
NXP JCOP 7.0 on SN300 Secure Element, JCOP 7.0 R1.62.0.1 NSCIB-CC-0441502-CR Compare
Showing 5 out of 31.

References ?

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Embedded UICC for Consumer Devices Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0100b_pdf.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['UICC_CD']}}, {'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card System - Open Configuration Protection Profile', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2b_pdf.pdf', 'pp_ids': None}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '978ce29914920008382b554f515cea7be7b20af3dd6dbd1b70849799668f2144', 'txt_hash': 'dce0fe0d0a01335e8060bcb8029a8ceb6e009f8a7c64713c072a7c89e9f1ec8b'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2e51d3b780d02b4f7c6a2113878a3b00a2f0b0611fca7a8e8f4f32b76d74fbfe', 'txt_hash': 'c80e7978fbeab20819fd3bdca57e81da00606a24708dbd44bf8dd8fe6c593bdb'} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 1316128, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 183, '/Title': 'Security Target Lite', '/Author': 'NXP B.V.', '/Subject': 'NXP JCOP 8.9 with eUICC extension on SN300 Secure Element', '/Keywords': 'NXP, ASE, JCOP 8.9 with eUICC extension on SN300 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented', '/Creator': 'DITA Open Toolkit 3.3.1', '/Producer': 'Apache FOP Version 2.3', '/CreationDate': 'D:20231130133951Z', '/ModDate': "D:20231130134109-00'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]']}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 93017, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Title': 'NSCIB Certificate', '/Author': 'Haak', '/Creator': 'Microsoft® Word 2021', '/CreationDate': "D:20231218225328+00'00'", '/ModDate': "D:20231218225328+00'00'", '/Producer': 'Microsoft® Word 2021', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-2300100-01': 1, 'NSCIB-2300083-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0084': 1, 'BSI-CC-PP-0099-V2-2020': 2, 'BSI-CC-PP-0100-2018': 1, 'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL4': 5, 'EAL4 augmented': 3}}, 'cc_sar': {'AGD': {'AGD_OPE.1': 2}, 'ALC': {'ALC_DVS.2': 3}, 'AVA': {'AVA_VAN.5': 3, 'AVA_VAN': 1}, 'ASE': {'ASE_INT': 2, 'ASE_CCL': 2, 'ASE_SPD': 2, 'ASE_ECD': 1, 'ASE_REQ': 2, 'ASE_TSS': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 8, 'FAU_SAS': 4, 'FAU_GEN': 1, 'FAU_SAS.1.1': 2, 'FAU_ARP.1': 14, 'FAU_SAA.1': 3, 'FAU_ARP.1.1': 1}, 'FCO': {'FCO_NRO': 1, 'FCO_NRO.2': 6, 'FCO_NRO.1': 1, 'FCO_NRO.2.1': 2, 'FCO_NRO.2.2': 1, 'FCO_NRO.2.3': 2}, 'FCS': {'FCS_CKM.1': 16, 'FCS_COP.1': 13, 'FCS_RNG.1': 17, 'FCS_CKM.5': 1, 'FCS_RNG': 1, 'FCS_CKM.2': 7, 'FCS_CKM.4': 12, 'FCS_CKM.1.1': 5, 'FCS_CKM.4.1': 4, 'FCS_COP.1.1': 17, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 2, 'FCS_CKM.2.1': 2, 'FCS_CKM.3': 4, 'FCS_CKM.3.1': 1, 'FCS_RNG.2': 1}, 'FDP': {'FDP_ACF.1': 31, 'FDP_IFC': 2, 'FDP_IFF': 2, 'FDP_ACC': 1, 'FDP_ACF': 1, 'FDP_ITC': 1, 'FDP_ITC.2': 17, 'FDP_IFC.2': 24, 'FDP_IFF.1': 37, 'FDP_UIT': 1, 'FDP_UIT.1': 4, 'FDP_ROL.1': 10, 'FDP_ACC.1': 53, 'FDP_ACC.2': 16, 'FDP_ACC.2.1': 5, 'FDP_ACC.2.2': 4, 'FDP_ACF.1.1': 5, 'FDP_ACF.1.2': 7, 'FDP_ACF.1.3': 7, 'FDP_ACF.1.4': 9, 'FDP_IFC.1': 46, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 4, 'FDP_IFF.1.2': 6, 'FDP_IFF.1.3': 7, 'FDP_IFF.1.4': 8, 'FDP_IFF.1.5': 6, 'FDP_RIP.1': 56, 'FDP_RIP.1.1': 9, 'FDP_ITC.1': 8, 'FDP_ROL.1.2': 3, 'FDP_ROL.1.1': 2, 'FDP_SDI.2': 6, 'FDP_SDI.1': 2, 'FDP_SDI.2.1': 2, 'FDP_SDI.2.2': 2, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_ITC.2.1': 1, 'FDP_ITC.2.2': 1, 'FDP_ITC.2.3': 1, 'FDP_ITC.2.4': 1, 'FDP_ITC.2.5': 2, 'FDP_ACC.1.1': 3, 'FDP_IFC.2.1': 3, 'FDP_IFC.2.2': 3}, 'FIA': {'FIA_UID': 1, 'FIA_UID.1': 61, 'FIA_UAU.1': 19, 'FIA_UAU.4': 9, 'FIA_AFL.1': 8, 'FIA_API': 1, 'FIA_ATD.1': 6, 'FIA_ATD.1.1': 1, 'FIA_UID.2': 3, 'FIA_UID.2.1': 1, 'FIA_USB.1': 4, 'FIA_USB.1.1': 1, 'FIA_USB.1.2': 1, 'FIA_USB.1.3': 1, 'FIA_UID.1.1': 7, 'FIA_UID.1.2': 5, 'FIA_UAU.1.1': 4, 'FIA_UAU.1.2': 3, 'FIA_UAU.4.1': 2, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_MSA': 7, 'FMT_SMF': 3, 'FMT_REV': 1, 'FMT_SMR': 2, 'FMT_MSA.1': 72, 'FMT_MSA.3': 66, 'FMT_SMF.1': 72, 'FMT_SMR.1': 90, 'FMT_MSA.1.1': 9, 'FMT_MSA.2': 2, 'FMT_MSA.2.1': 2, 'FMT_MSA.3.1': 11, 'FMT_MSA.3.2': 10, 'FMT_SMF.1.1': 8, 'FMT_SMR.1.1': 7, 'FMT_SMR.1.2': 7, 'FMT_MTD.1': 7, 'FMT_MTD.1.1': 1, 'FMT_MTD.3': 5, 'FMT_MTD.3.1': 1}, 'FPR': {'FPR_UNO.1': 7, 'FPR_UNO.1.1': 1}, 'FPT': {'FPT_FLS.1': 30, 'FPT_PHP.3': 4, 'FPT_EMS': 1, 'FPT_FLS.1.1': 8, 'FPT_TDC.1': 5, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 2, 'FPT_RCV.3': 2, 'FPT_RCV.2': 1, 'FPT_RCV.3.1': 2, 'FPT_RCV.3.2': 2, 'FPT_RCV.3.3': 2, 'FPT_RCV.3.4': 1, 'FPT_PHP.3.1': 1}, 'FTP': {'FTP_ITC': 1, 'FTP_ITC.1': 15, 'FTP_TRP.1': 4, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 2}}, 'cc_claims': {'D': {'D.UPDATE_IMAGE': 26, 'D.APP_CODE': 6, 'D.APP_C_DATA': 4, 'D.APP_I_DATA': 7, 'D.APP_KEYS': 9, 'D.PIN': 10, 'D.APSD_KEYS': 5, 'D.ISD_KEYS': 4, 'D.VASD_KEYS': 3, 'D.CARD_MNGT_': 1, 'D.API_DATA': 3, 'D.CRYPTO': 6, 'D.JCS_CODE': 7, 'D.JCS_DATA': 8, 'D.SEC_DATA': 6, 'D.CONFIG_ITEM': 7, 'D.RESTRICTED_': 1, 'D.TOE_IDENTIFIER': 3, 'D.APP_C_': 1, 'D.CARD_': 1, 'D.CARD_MNGT_DATA': 1, 'D.APP_': 1, 'D.JCS_': 1, 'D.RESTRICTED_MODE_STATE': 1, 'D.TOE_IDENTIFICATION': 2, 'D.SECRETS': 2, 'D.SK': 2, 'D.MNO_KEYS': 2, 'D.PROFILE_NAA_PRAMS': 1, 'D.PROFILE_NAA_PARAMS': 2}, 'O': {'O.REMOTE': 1, 'O.BIO-MNGT': 1, 'O.EXT-MEM': 1, 'O.SENSITIVE_ARRAYS_INTEG': 1, 'O.SENSITIVE_RESULTS_INTEG': 1, 'O.LOAD': 3, 'O.INSTALL': 2, 'O.DELETION': 3, 'O.APPLET': 15, 'O.CODE_CAP_FILE': 11, 'O.JAVAOBJECT': 67, 'O.APPLET_LOADED': 2, 'O.APPLET_CURRENT': 2, 'O.CODE_CAP_': 2}, 'T': {'T.RND': 5, 'T.CONFID-UPDATE-IMAGE': 3, 'T.INTEG-UPDATE-IMAGE': 3, 'T.UNAUTH-LOAD-UPDATE-IMAGE': 3, 'T.INTERRUPT-OSU': 4, 'T.CONFIG': 4, 'T.COM_EXPLOIT': 4, 'T.LIFE_CYCLE': 4, 'T.UNAUTHORIZED_CARD_MNGT': 3, 'T.INTEG-APPLI-DATA': 13, 'T.RESTRICTED-MODE': 3, 'T.CONFID-CONT': 4, 'T.INTEG-CONT': 3, 'T.EXE-CONT': 4, 'T.CONT-DOS': 4, 'T.CONT-SID': 4, 'T.INTEG-CODE': 1, 'T.INSTALL': 3, 'T.DELETION': 3, 'T.EXE-CODE-REMOTE': 1, 'T.CONFID-APPLI-DATA': 3, 'T.CONFID-JCS-CODE': 4, 'T.INTEG-JCS-CODE': 4, 'T.CONFID-JCS-DATA': 4, 'T.INTEG-JCS-DATA': 4, 'T.INTEG-APPLI-CODE': 5, 'T.EXE-CODE': 8, 'T.NATIVE': 4, 'T.SID': 8, 'T.CONFID-APPLI-DA': 1, 'T.INTEG-APPLI-COD': 2, 'T.RESOURCES': 3, 'T.UNAUTHORIZED_': 1, 'T.OBJ-DELETION': 2, 'T.PHYSICAL': 2, 'T.CONFID-UPDATE-I': 1, 'T.UNAUTH-LOAD-UP': 1, 'T.INTEG-UPDATE-IM': 1, 'T.RESTRICTED-MOD': 1, 'T.CONFID-': 1, 'T.INTEG-APPLI-': 1}, 'A': {'A.USE_DIAG': 5, 'A.USE_KEYS': 5, 'A.PROCESS-SEC-IC': 4, 'A.APPS-PROVIDER': 4, 'A.VERIFICATION-AUTHORITY': 4, 'A.TRUSTED-GUESTOS': 3, 'A.APPS-': 1, 'A.DELETION': 1, 'A.CAP_FILE': 3, 'A.VERIFICATION': 2, 'A.TRUSTED-GUESTO': 1, 'A.VERIFICATION-AU': 1}, 'R': {'R.JAVA': 12}, 'OT': {'OT.IDENTIFICATION': 5, 'OT.CONFID-UPDATE-IMAGE': 3, 'OT.AUTH-LOAD-UPDATE-IMAGE': 3, 'OT.SECURE_LOAD_ACODE': 3, 'OT.SECURE_AC_ACTIVATION': 3, 'OT.TOE_IDENTIFICATION': 3, 'OT.CARD-CONFIGURATION': 3, 'OT.ATTACK-COUNTER': 3, 'OT.RESTRICTED-MODE': 3, 'OT.DOMAIN-RIGHTS': 7, 'OT.APPLI-AUTH': 8, 'OT.COMM_AUTH': 6, 'OT.COMM_INTEGRITY': 3, 'OT.COMM_CONFIDENTIALITY': 3, 'OT.CONT_SEP': 8, 'OT.CONT_PRIV': 6, 'OT.CONT_DOS': 4, 'OT.RND': 5, 'OT.SCP': 34, 'OT.CARD-MANAGEMENT': 3, 'OT.CARD-': 3, 'OT.INSTALL': 1, 'OT.LOAD': 1, 'OT.DELETION': 1, 'OT.SENSITIVE_RESULTS_INTEG': 3, 'OT.FIREWALL': 10, 'OT.SID': 8, 'OT.GLOBAL_': 6, 'OT.ARRAY_VIEWS_': 4, 'OT.SENSITIVE_': 2, 'OT.NATIVE': 6, 'OT.OPERATE': 20, 'OT.REALLOCATION': 4, 'OT.RESOURCES': 5, 'OT.ALARM': 14, 'OT.CIPHER': 4, 'OT.KEY-MNGT': 4, 'OT.PIN-MNGT': 4, 'OT.TRANSACTION': 4, 'OT.OBJ-DELETION': 3, 'OT.COMM_': 5, 'OT.CARD-MANAGEM': 16, 'OT.CONFID-UPDATE-': 2, 'OT.AUTH-LOAD-UPD': 2, 'OT.SECURE_LOAD_': 4, 'OT.SECURE_AC_': 2, 'OT.TOE_': 2, 'OT.CARD-CONFIGUR': 2, 'OT.ATTACK-COUNT': 1, 'OT.RESTRICTED-MO': 3, 'OT.ATTACK-COUNTE': 1, 'OT.GLOBAL_ARRAYS_CONFID': 1, 'OT.GLOBAL_ARRAYS_INTEG': 1, 'OT.ARRAY_VIEWS_CONFID': 1, 'OT.ARRAY_VIEWS_INTEG': 1, 'OT.CONT-SEP': 1, 'OT.CONT-PRIV': 1, 'OT.CONT-DOS': 1, 'OT.SECURE-CHANNELS': 1, 'OT.INTERNALSECURE-CHANNELS': 1}, 'OP': {'OP.ARRAY_ACCESS': 4, 'OP.ARRAY_LENGTH': 3, 'OP.ARRAY_T_ALOAD': 3, 'OP.ARRAY_': 1, 'OP.ARRAY_AASTORE': 3, 'OP.CREATE': 7, 'OP.DELETE_APPLET': 4, 'OP.DELETE_CAP_': 2, 'OP.INSTANCE_FIELD': 3, 'OP.INVK_VIRTUAL': 6, 'OP.INVK_INTERFACE': 7, 'OP.JAVA': 5, 'OP.THROW': 5, 'OP.TYPE_ACCESS': 5, 'OP.PUT': 6, 'OP.READ_CONFIG_': 1, 'OP.MODIFY_': 1, 'OP.USE_CONFIG_': 1, 'OP.TRIGGER_': 1, 'OP.CONT_ACCESS': 7, 'OP.ARRAY_T_ASTORE': 2, 'OP.PUTFIELD': 1, 'OP.PUTSTATIC': 1, 'OP.DELETE_CAP_FILE': 2, 'OP.DELETE_CAP_FILE_APPLET': 2, 'OP.TRIGGER_UPDATE': 3}, 'OE': {'OE.USE_DIAG': 5, 'OE.USE_KEYS': 5, 'OE.CAP_FILE': 5, 'OE.VERIFICATION': 17, 'OE.CODE-EVIDENCE': 13, 'OE.SCP': 16, 'OE.CARD-MANAGEMENT': 1, 'OE.PROCESS_SEC_IC': 2, 'OE.CONFID-UPDATE-IMAGE': 2, 'OE.APPS-PROVIDER': 4, 'OE.VERIFICATION-AUTHORITY': 2, 'OE.KEY-CHANGE': 5, 'OE.SECURITY-DOMAINS': 1, 'OE.TRUSTED-GUESTOS': 2, 'OE.SECURITY-': 1, 'OE.IC': 3, 'OE.RE': 7, 'OE.CARD-': 2, 'OE.TRUSTED-GUEST': 1, 'OE.VERIFICATION-A': 2, 'OE.SECURITY-DOMA': 2, 'OE.PROCESS_SEC_': 2, 'OE.CONFID-UPDATE-': 2, 'OE.TRUSTED-GUES': 1}, 'SA': {'SA.CONFID-UPDATE': 1, 'SA.CONFID-APPLI-D': 1, 'SA.CONFID-JCS-CO': 1, 'SA.CONFID-JCS-DAT': 1, 'SA.INTEG-UPDATE-I': 1, 'SA.INTEG-APPLI-CO': 1, 'SA.INTEG-APPLI-DA': 1, 'SA.INTEG-JCS-CODE': 3, 'SA.EXE-APPLI-CODE': 3, 'SA.EXE-JCS-CODE': 3, 'SA.NATIVE': 4, 'SA.FIREWALL': 2, 'SA.VERIFICATION': 3, 'SA.CARD-MANAGEM': 1, 'SA.INSTALL': 2, 'SA.SID': 3, 'SA.OBJ-DELETION': 3, 'SA.DELETION': 1, 'SA.ALARM': 2, 'SA.OPERATE': 2, 'SA.RESOURCES': 3, 'SA.CIPHER': 2, 'SA.KEY-MNGT': 2, 'SA.PIN-MNGT': 2, 'SA.SCP': 5, 'SA.TRANSACTION': 2, 'SA.CONFIG-APPLET': 1, 'SA.OSU': 1, 'SA.RM': 1, 'SA.CONTEXT-SEPAR': 1, 'SA.CONFID-APPLI-DATA': 1, 'SA.CONFID-JCS-CODE': 1, 'SA.CONFID-JCS-DATA': 1, 'SA.INTEG-APPLI-CODE': 2, 'SA.INTEG-APPLI-DATA': 2, 'SA.INTEG-JCS-DATA': 1, 'SA.CONFID-UPDATE-IMAGE': 1, 'SA.INTEG-UPDATE-IMAGE': 1}, 'OSP': {'OSP.PROCESS-TOE': 4, 'OSP.KEY-CHANGE': 4, 'OSP.SECURITY-DOMAINS': 3, 'OSP.VERIFICATION': 2, 'OSP.SECURITY-DOM': 1}}, 'vendor': {'NXP': {'NXP': 457, 'NXP Semiconductors': 24}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 22, 'AES-': 1}}, 'DES': {'DES': {'DES': 5}, '3DES': {'Triple-DES': 4, '3DES': 1, 'TDES': 2, 'TripleDES': 1, 'TDEA': 4}}, 'miscellaneous': {'SM4': {'SM4': 1}}, 'constructions': {'MAC': {'HMAC': 10, 'CBC-MAC': 2, 'CMAC': 3}}}, 'asymmetric_crypto': {'RSA': {'RSA 1024': 1, 'RSA-CRT': 3}, 'ECC': {'ECDH': {'ECDH': 6}, 'ECDSA': {'ECDSA': 8}, 'EdDSA': {'EdDSA': 10}, 'ECC': {'ECC': 13}}, 'FF': {'DH': {'DH': 1, 'Diffie-Hellman': 2}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 3}, 'SHA2': {'SHA-224': 3, 'SHA-256': 4, 'SHA-384': 3, 'SHA-512': 3}}}, 'crypto_scheme': {'MAC': {'MAC': 3}, 'KA': {'Key Agreement': 2}}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 2}, 'RNG': {'RND': 10, 'RNG': 17}}, 'cipher_mode': {'ECB': {'ECB': 3}, 'CBC': {'CBC': 6}, 'CTR': {'CTR': 5}, 'CFB': {'CFB': 5}, 'GCM': {'GCM': 7}, 'CCM': {'CCM': 36}, 'XTS': {'XTS': 1}}, 'ecc_curve': {'NIST': {'P-256': 1, 'NIST P-256': 1}, 'Brainpool': {'brainpoolP256r1': 1}, 'Curve': {'Curve25519': 1}, 'Edwards': {'Ed25519': 1, 'Ed448': 1}}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {'Generic': {'Crypto Library ..................................................12': 1}}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 3, 'side channel': 2, 'side-channel': 1, 'DPA': 2, 'SPA': 1, 'timing attacks': 2, 'timing attack': 1}, 'FI': {'Physical Tampering': 2, 'physical tampering': 2, 'malfunction': 2, 'DFA': 2, 'Fault Injection': 1}, 'other': {'JIL': 2}}, 'technical_report_id': {'BSI': {'BSI TR-03111': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 6}}, 'os_name': {'JCOP': {'JCOP 8': 194, 'JCOP8': 30}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-3': 2, 'FIPS 197': 1, 'FIPS PUB 186-3': 1}, 'BSI': {'AIS20': 2, 'AIS31': 1, 'AIS 20': 2}, 'RFC': {'RFC 5639': 1, 'RFC 8032': 1, 'RFC 7748': 1}, 'ISO': {'ISO/IEC 7816': 4}, 'SCP': {'SCP80': 1, 'SCP81': 1}, 'CC': {'CCMB-2017-04-001': 2, 'CCMB-2017-04-002': 2, 'CCMB-2017-04-003': 2, 'CCMB-2017-04-004': 2}}, 'javacard_version': {'JavaCard': {'Java Card 3.1': 2, 'JC3.1': 1}, 'GlobalPlatform': {'GlobalPlatform 2.3.1': 2}}, 'javacard_api_const': {'ALG': {'DES': {'ALG_DES_CBC_ISO9797_M1': 1, 'ALG_DES_CBC_ISO9797_M2': 1, 'ALG_DES_CBC_NOPAD': 1, 'ALG_DES_ECB_ISO9797_M1': 1, 'ALG_DES_ECB_ISO9797_M2': 2, 'ALG_DES_ECB_NOPAD': 1, 'ALG_DES_CBC_PKCS5': 1, 'ALG_DES_ECB_PKCS5': 1, 'ALG_DES_CBC_PKCS7': 1, 'ALG_DES_ECB_PKCS7': 1, 'ALG_DES_MAC4_ISO9797_1_M1_ALG3': 1, 'ALG_DES_MAC4_ISO9797_1_M2_ALG3': 1, 'ALG_DES_MAC4_ISO9797_M1': 1, 'ALG_DES_MAC4_ISO9797_M2': 1, 'ALG_DES_MAC8_ISO9797_1_M1_ALG3': 1, 'ALG_DES_MAC8_ISO9797_1_M2_ALG3': 1, 'ALG_DES_MAC8_ISO9797_M1': 1, 'ALG_DES_MAC8_ISO9797_M2': 1, 'ALG_DES_MAC8_NOPAD': 1, 'ALG_DES_MAC4_PKCS5': 1, 'ALG_DES_MAC8_PKCS5': 1, 'ALG_DES_CMAC8': 1}, 'RSA': {'ALG_RSA_NOPAD': 1, 'ALG_RSA_PKCS1': 1, 'ALG_RSA_PKCS1_OAEP': 1, 'ALG_RSA_SHA_224_PKCS1': 1, 'ALG_RSA_SHA_224_PKCS1_PSS': 1, 'ALG_RSA_SHA_256_PKCS1': 1, 'ALG_RSA_SHA_256_PKCS1_PSS': 1, 'ALG_RSA_SHA_384_PKCS1': 1, 'ALG_RSA_SHA_384_PKCS1_PSS': 1, 'ALG_RSA_SHA_512_PKCS1': 1, 'ALG_RSA_SHA_512_PKCS1_PSS': 1, 'ALG_RSA_SHA_PKCS1': 1}, 'ECDSA': {'ALG_ECDSA_SHA_224': 1, 'ALG_ECDSA_SHA_256': 2, 'ALG_ECDSA_SHA_384': 1, 'ALG_ECDSA_SHA_512': 1}, 'AES': {'ALG_AES_BLOCK_128_CBC_NOPAD': 1, 'ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD': 2, 'ALG_AES_BLOCK_128_ECB_NOPAD': 1, 'ALG_AES_CBC_ISO9797_M1': 1, 'ALG_AES_CBC_ISO9797_M2': 1, 'ALG_AES_CBC_ISO9797_M2_STANDARD': 1, 'ALG_AES_ECB_ISO9797_M1': 1, 'ALG_AES_ECB_ISO9797_M2': 1, 'ALG_AES_CBC_PKCS5': 1, 'ALG_AES_ECB_PKCS5': 1, 'ALG_AES_CBC_PKCS7': 2, 'ALG_AES_ECB_PKCS7': 2, 'ALG_AES_CBC_ISO9797_STANDARD': 1, 'ALG_AES_CFB': 1, 'ALG_AES_MAC_128_NOPAD': 1, 'ALG_AES_CMAC8': 1, 'ALG_AES_CMAC16': 1, 'ALG_AES_CMAC16_STANDARD': 1, 'ALG_AES_CMAC_128': 1}, 'HMAC': {'ALG_HMAC_SHA_256': 1, 'ALG_HMAC_SHA_384': 1, 'ALG_HMAC_SHA_512': 1}, 'EC': {'ALG_EC_SVDP_DH': 1, 'ALG_EC_SVDP_DH_KDF': 1, 'ALG_EC_SVDP_DH_PLAIN': 1, 'ALG_EC_SVDP_DHC': 1, 'ALG_EC_SVDP_DHC_KDF': 1, 'ALG_EC_SVDP_DHC_PLAIN': 1, 'ALG_EC_SVDP_DH_PLAIN_XY': 2}, 'SHA': {'ALG_SHA_256': 3, 'ALG_SHA_384': 3, 'ALG_SHA_512': 3, 'ALG_SHA_224': 1}, 'SHA3': {'ALG_SHA3_224': 1, 'ALG_SHA3_256': 1, 'ALG_SHA3_384': 1, 'ALG_SHA3_512': 1}}, 'misc': {'SIG_CIPHER_RSA': 1, 'SIG_CIPHER_ECDSA': 1, 'SIG_CIPHER_EDDSA': 1, 'SIG_CIPHER_EDDSAPH': 1, 'SIG_CIPHER_AES_CMAC8': 1, 'SIG_CIPHER_AES_CMAC16': 1, 'SIG_CIPHER_AES_CMAC128': 1, 'SIG_CIPHER_DES_CMAC8': 1, 'PAD_PKCS1_OAEP': 1, 'TYPE_ACCESS': 5, 'LENGTH_DES3_2KEY': 4, 'LENGTH_DES3_3KEY': 4, 'LENGTH_AES_128': 4, 'LENGTH_AES_192': 4, 'LENGTH_AES_256': 4, 'LENGTH_EC_FP_128': 2, 'LENGTH_EC_FP_160': 1, 'LENGTH_EC_FP_192': 2, 'LENGTH_EC_FP_224': 2, 'LENGTH_EC_FP_256': 3, 'LENGTH_EC_FP_528': 2, 'LENGTH_EC_FP_384': 1, 'LENGTH_SHA': 1, 'LENGTH_SHA_224': 1, 'LENGTH_SHA_256': 2, 'LENGTH_SHA_384': 1, 'LENGTH_SHA_512': 2, 'LENGTH_SHA3_224': 1, 'LENGTH_SHA3_256': 1, 'LENGTH_SHA3_384': 1, 'LENGTH_SHA3_512': 1, 'LENGTH_RSA_1024': 1}, 'curves': {'FRP256V1': 2, 'SM2': 1}}, 'javacard_packages': {'java': {'java.rmi': 1}, 'javacard': {'javacard.security': 3, 'javacard.framework': 2}, 'javacardx': {'javacardx.crypto': 1, 'javacardx.security': 1}, 'org': {'org.globalplatform': 1}, 'com': {'com.nxp.id.jcopx.security': 1}}, 'certification_process': {}}.
    • The cert_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-2300100-01': 1, 'NSCIB-2300100-01': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0099-V2-2020': 1}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL2': 1, 'EAL7': 1, 'EAL4 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_DVS.2': 1, 'ALC_FLR.3': 1, 'ALC_FLR': 1}, 'AVA': {'AVA_VAN.5': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP Semiconductors': 1, 'NXP': 2}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {'JCOP': {'JCOP 8': 2}}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408-1': 2, 'ISO/IEC 18045': 4, 'ISO/IEC 18045:2008': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_filename property was set to NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf.
    • The cert_filename property was set to NSCIB-CC-2300100-01.1-Cert.pdf.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300083-01-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-2300083-01-CR']}} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values added.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-CR.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf.

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The st_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The st_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01.1-Cert.pdf",
  "dgst": "1cebdb71a0606a03",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300100-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.06.01.1.2",
        "1.06.00.1.2",
        "8.9"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300083-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300083-01-CR"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300083-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300083-01-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2",
  "not_valid_after": "2028-12-14",
  "not_valid_before": "2023-12-14",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2300100-01.1-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300100-01": 1,
          "NSCIB-CC-2300100-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-V2-2020": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 8": 2
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 2,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20231218225328+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20231218225328+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 93017,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2300100-01-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300100-01-CR",
        "cert_item": "NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2",
        "cert_lab": " T\u00dcV Informationstechnik GmbH",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 2
          },
          "EdDSA": {
            "EdDSA": 2
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300083-01": 1,
          "NSCIB-2300083-01-CR": 1,
          "NSCIB-2300100-01": 3,
          "NSCIB-CC-2300100-01-CR": 13
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-V2-2020": 1,
          "BSI-CC-PP-0100-2018": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 1,
          "EAL 4 augmented": 1,
          "EAL4": 2,
          "EAL4 augmented": 1,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 2
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          },
          "SHA3": {
            "SHA3-224": 1,
            "SHA3-256": 1,
            "SHA3-384": 1,
            "SHA3-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.3.1": 1
        },
        "JavaCard": {
          "Java Card 3.1": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 8": 27
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 29,
          "NXP Semiconductors": 4
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "sjon",
      "/CreationDate": "D:20231215215207+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20231215215207+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 303044,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://nscib.nl/",
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/",
          "mailto:[email protected]",
          "https://trustcb.com/common-criteria/nscib/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 13
    },
    "st_filename": "NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDH": {
            "ECDH": 6
          },
          "ECDSA": {
            "ECDSA": 8
          },
          "EdDSA": {
            "EdDSA": 10
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300083-01": 1,
          "NSCIB-2300100-01": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPS-": 1,
          "A.APPS-PROVIDER": 4,
          "A.CAP_FILE": 3,
          "A.DELETION": 1,
          "A.PROCESS-SEC-IC": 4,
          "A.TRUSTED-GUESTO": 1,
          "A.TRUSTED-GUESTOS": 3,
          "A.USE_DIAG": 5,
          "A.USE_KEYS": 5,
          "A.VERIFICATION": 2,
          "A.VERIFICATION-AU": 1,
          "A.VERIFICATION-AUTHORITY": 4
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_": 1,
          "D.APP_CODE": 6,
          "D.APP_C_": 1,
          "D.APP_C_DATA": 4,
          "D.APP_I_DATA": 7,
          "D.APP_KEYS": 9,
          "D.APSD_KEYS": 5,
          "D.CARD_": 1,
          "D.CARD_MNGT_": 1,
          "D.CARD_MNGT_DATA": 1,
          "D.CONFIG_ITEM": 7,
          "D.CRYPTO": 6,
          "D.ISD_KEYS": 4,
          "D.JCS_": 1,
          "D.JCS_CODE": 7,
          "D.JCS_DATA": 8,
          "D.MNO_KEYS": 2,
          "D.PIN": 10,
          "D.PROFILE_NAA_PARAMS": 2,
          "D.PROFILE_NAA_PRAMS": 1,
          "D.RESTRICTED_": 1,
          "D.RESTRICTED_MODE_STATE": 1,
          "D.SECRETS": 2,
          "D.SEC_DATA": 6,
          "D.SK": 2,
          "D.TOE_IDENTIFICATION": 2,
          "D.TOE_IDENTIFIER": 3,
          "D.UPDATE_IMAGE": 26,
          "D.VASD_KEYS": 3
        },
        "O": {
          "O.APPLET": 15,
          "O.APPLET_CURRENT": 2,
          "O.APPLET_LOADED": 2,
          "O.BIO-MNGT": 1,
          "O.CODE_CAP_": 2,
          "O.CODE_CAP_FILE": 11,
          "O.DELETION": 3,
          "O.EXT-MEM": 1,
          "O.INSTALL": 2,
          "O.JAVAOBJECT": 67,
          "O.LOAD": 3,
          "O.REMOTE": 1,
          "O.SENSITIVE_ARRAYS_INTEG": 1,
          "O.SENSITIVE_RESULTS_INTEG": 1
        },
        "OE": {
          "OE.APPS-PROVIDER": 4,
          "OE.CAP_FILE": 5,
          "OE.CARD-": 2,
          "OE.CARD-MANAGEMENT": 1,
          "OE.CODE-EVIDENCE": 13,
          "OE.CONFID-UPDATE-": 2,
          "OE.CONFID-UPDATE-IMAGE": 2,
          "OE.IC": 3,
          "OE.KEY-CHANGE": 5,
          "OE.PROCESS_SEC_": 2,
          "OE.PROCESS_SEC_IC": 2,
          "OE.RE": 7,
          "OE.SCP": 16,
          "OE.SECURITY-": 1,
          "OE.SECURITY-DOMA": 2,
          "OE.SECURITY-DOMAINS": 1,
          "OE.TRUSTED-GUES": 1,
          "OE.TRUSTED-GUEST": 1,
          "OE.TRUSTED-GUESTOS": 2,
          "OE.USE_DIAG": 5,
          "OE.USE_KEYS": 5,
          "OE.VERIFICATION": 17,
          "OE.VERIFICATION-A": 2,
          "OE.VERIFICATION-AUTHORITY": 2
        },
        "OP": {
          "OP.ARRAY_": 1,
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 3,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 2,
          "OP.CONT_ACCESS": 7,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_CAP_": 2,
          "OP.DELETE_CAP_FILE": 2,
          "OP.DELETE_CAP_FILE_APPLET": 2,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.MODIFY_": 1,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.READ_CONFIG_": 1,
          "OP.THROW": 5,
          "OP.TRIGGER_": 1,
          "OP.TRIGGER_UPDATE": 3,
          "OP.TYPE_ACCESS": 5,
          "OP.USE_CONFIG_": 1
        },
        "OSP": {
          "OSP.KEY-CHANGE": 4,
          "OSP.PROCESS-TOE": 4,
          "OSP.SECURITY-DOM": 1,
          "OSP.SECURITY-DOMAINS": 3,
          "OSP.VERIFICATION": 2
        },
        "OT": {
          "OT.ALARM": 14,
          "OT.APPLI-AUTH": 8,
          "OT.ARRAY_VIEWS_": 4,
          "OT.ARRAY_VIEWS_CONFID": 1,
          "OT.ARRAY_VIEWS_INTEG": 1,
          "OT.ATTACK-COUNT": 1,
          "OT.ATTACK-COUNTE": 1,
          "OT.ATTACK-COUNTER": 3,
          "OT.AUTH-LOAD-UPD": 2,
          "OT.AUTH-LOAD-UPDATE-IMAGE": 3,
          "OT.CARD-": 3,
          "OT.CARD-CONFIGUR": 2,
          "OT.CARD-CONFIGURATION": 3,
          "OT.CARD-MANAGEM": 16,
          "OT.CARD-MANAGEMENT": 3,
          "OT.CIPHER": 4,
          "OT.COMM_": 5,
          "OT.COMM_AUTH": 6,
          "OT.COMM_CONFIDENTIALITY": 3,
          "OT.COMM_INTEGRITY": 3,
          "OT.CONFID-UPDATE-": 2,
          "OT.CONFID-UPDATE-IMAGE": 3,
          "OT.CONT-DOS": 1,
          "OT.CONT-PRIV": 1,
          "OT.CONT-SEP": 1,
          "OT.CONT_DOS": 4,
          "OT.CONT_PRIV": 6,
          "OT.CONT_SEP": 8,
          "OT.DELETION": 1,
          "OT.DOMAIN-RIGHTS": 7,
          "OT.FIREWALL": 10,
          "OT.GLOBAL_": 6,
          "OT.GLOBAL_ARRAYS_CONFID": 1,
          "OT.GLOBAL_ARRAYS_INTEG": 1,
          "OT.IDENTIFICATION": 5,
          "OT.INSTALL": 1,
          "OT.INTERNALSECURE-CHANNELS": 1,
          "OT.KEY-MNGT": 4,
          "OT.LOAD": 1,
          "OT.NATIVE": 6,
          "OT.OBJ-DELETION": 3,
          "OT.OPERATE": 20,
          "OT.PIN-MNGT": 4,
          "OT.REALLOCATION": 4,
          "OT.RESOURCES": 5,
          "OT.RESTRICTED-MO": 3,
          "OT.RESTRICTED-MODE": 3,
          "OT.RND": 5,
          "OT.SCP": 34,
          "OT.SECURE-CHANNELS": 1,
          "OT.SECURE_AC_": 2,
          "OT.SECURE_AC_ACTIVATION": 3,
          "OT.SECURE_LOAD_": 4,
          "OT.SECURE_LOAD_ACODE": 3,
          "OT.SENSITIVE_": 2,
          "OT.SENSITIVE_RESULTS_INTEG": 3,
          "OT.SID": 8,
          "OT.TOE_": 2,
          "OT.TOE_IDENTIFICATION": 3,
          "OT.TRANSACTION": 4
        },
        "R": {
          "R.JAVA": 12
        },
        "SA": {
          "SA.ALARM": 2,
          "SA.CARD-MANAGEM": 1,
          "SA.CIPHER": 2,
          "SA.CONFID-APPLI-D": 1,
          "SA.CONFID-APPLI-DATA": 1,
          "SA.CONFID-JCS-CO": 1,
          "SA.CONFID-JCS-CODE": 1,
          "SA.CONFID-JCS-DAT": 1,
          "SA.CONFID-JCS-DATA": 1,
          "SA.CONFID-UPDATE": 1,
          "SA.CONFID-UPDATE-IMAGE": 1,
          "SA.CONFIG-APPLET": 1,
          "SA.CONTEXT-SEPAR": 1,
          "SA.DELETION": 1,
          "SA.EXE-APPLI-CODE": 3,
          "SA.EXE-JCS-CODE": 3,
          "SA.FIREWALL": 2,
          "SA.INSTALL": 2,
          "SA.INTEG-APPLI-CO": 1,
          "SA.INTEG-APPLI-CODE": 2,
          "SA.INTEG-APPLI-DA": 1,
          "SA.INTEG-APPLI-DATA": 2,
          "SA.INTEG-JCS-CODE": 3,
          "SA.INTEG-JCS-DATA": 1,
          "SA.INTEG-UPDATE-I": 1,
          "SA.INTEG-UPDATE-IMAGE": 1,
          "SA.KEY-MNGT": 2,
          "SA.NATIVE": 4,
          "SA.OBJ-DELETION": 3,
          "SA.OPERATE": 2,
          "SA.OSU": 1,
          "SA.PIN-MNGT": 2,
          "SA.RESOURCES": 3,
          "SA.RM": 1,
          "SA.SCP": 5,
          "SA.SID": 3,
          "SA.TRANSACTION": 2,
          "SA.VERIFICATION": 3
        },
        "T": {
          "T.COM_EXPLOIT": 4,
          "T.CONFID-": 1,
          "T.CONFID-APPLI-DA": 1,
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-CONT": 4,
          "T.CONFID-JCS-CODE": 4,
          "T.CONFID-JCS-DATA": 4,
          "T.CONFID-UPDATE-I": 1,
          "T.CONFID-UPDATE-IMAGE": 3,
          "T.CONFIG": 4,
          "T.CONT-DOS": 4,
          "T.CONT-SID": 4,
          "T.DELETION": 3,
          "T.EXE-CODE": 8,
          "T.EXE-CODE-REMOTE": 1,
          "T.EXE-CONT": 4,
          "T.INSTALL": 3,
          "T.INTEG-APPLI-": 1,
          "T.INTEG-APPLI-COD": 2,
          "T.INTEG-APPLI-CODE": 5,
          "T.INTEG-APPLI-DATA": 13,
          "T.INTEG-CODE": 1,
          "T.INTEG-CONT": 3,
          "T.INTEG-JCS-CODE": 4,
          "T.INTEG-JCS-DATA": 4,
          "T.INTEG-UPDATE-IM": 1,
          "T.INTEG-UPDATE-IMAGE": 3,
          "T.INTERRUPT-OSU": 4,
          "T.LIFE_CYCLE": 4,
          "T.NATIVE": 4,
          "T.OBJ-DELETION": 2,
          "T.PHYSICAL": 2,
          "T.RESOURCES": 3,
          "T.RESTRICTED-MOD": 1,
          "T.RESTRICTED-MODE": 3,
          "T.RND": 5,
          "T.SID": 8,
          "T.UNAUTH-LOAD-UP": 1,
          "T.UNAUTH-LOAD-UPDATE-IMAGE": 3,
          "T.UNAUTHORIZED_": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V2-2020": 2,
          "BSI-CC-PP-0100-2018": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE.1": 2
        },
        "ALC": {
          "ALC_DVS.2": 3
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_ECD": 1,
          "ASE_INT": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2,
          "ASE_TSS": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 3
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 5,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 14,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS": 4,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 2
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 6,
          "FCO_NRO.2.1": 2,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 2
        },
        "FCS": {
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 5,
          "FCS_CKM.2": 7,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.3": 4,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 12,
          "FCS_CKM.4.1": 4,
          "FCS_CKM.5": 1,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 17,
          "FCS_RNG": 1,
          "FCS_RNG.1": 17,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2,
          "FCS_RNG.2": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 53,
          "FDP_ACC.1.1": 3,
          "FDP_ACC.2": 16,
          "FDP_ACC.2.1": 5,
          "FDP_ACC.2.2": 4,
          "FDP_ACF": 1,
          "FDP_ACF.1": 31,
          "FDP_ACF.1.1": 5,
          "FDP_ACF.1.2": 7,
          "FDP_ACF.1.3": 7,
          "FDP_ACF.1.4": 9,
          "FDP_IFC": 2,
          "FDP_IFC.1": 46,
          "FDP_IFC.1.1": 1,
          "FDP_IFC.2": 24,
          "FDP_IFC.2.1": 3,
          "FDP_IFC.2.2": 3,
          "FDP_IFF": 2,
          "FDP_IFF.1": 37,
          "FDP_IFF.1.1": 4,
          "FDP_IFF.1.2": 6,
          "FDP_IFF.1.3": 7,
          "FDP_IFF.1.4": 8,
          "FDP_IFF.1.5": 6,
          "FDP_ITC": 1,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 17,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 2,
          "FDP_RIP.1": 56,
          "FDP_RIP.1.1": 9,
          "FDP_ROL.1": 10,
          "FDP_ROL.1.1": 2,
          "FDP_ROL.1.2": 3,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2,
          "FDP_UIT": 1,
          "FDP_UIT.1": 4,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_API": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 1,
          "FIA_UAU.1": 19,
          "FIA_UAU.1.1": 4,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 2,
          "FIA_UID": 1,
          "FIA_UID.1": 61,
          "FIA_UID.1.1": 7,
          "FIA_UID.1.2": 5,
          "FIA_UID.2": 3,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 1,
          "FIA_USB.1.2": 1,
          "FIA_USB.1.3": 1
        },
        "FMT": {
          "FMT_MSA": 7,
          "FMT_MSA.1": 72,
          "FMT_MSA.1.1": 9,
          "FMT_MSA.2": 2,
          "FMT_MSA.2.1": 2,
          "FMT_MSA.3": 66,
          "FMT_MSA.3.1": 11,
          "FMT_MSA.3.2": 10,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 5,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 72,
          "FMT_SMF.1.1": 8,
          "FMT_SMR": 2,
          "FMT_SMR.1": 90,
          "FMT_SMR.1.1": 7,
          "FMT_SMR.1.2": 7
        },
        "FPR": {
          "FPR_UNO.1": 7,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 1,
          "FPT_FLS.1": 30,
          "FPT_FLS.1.1": 8,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 2,
          "FPT_RCV.3.1": 2,
          "FPT_RCV.3.2": 2,
          "FPT_RCV.3.3": 2,
          "FPT_RCV.3.4": 1,
          "FPT_TDC.1": 5,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 36
        },
        "CFB": {
          "CFB": 5
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 7
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library ..................................................12": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1
        },
        "Curve": {
          "Curve25519": 1
        },
        "Edwards": {
          "Ed25519": 1,
          "Ed448": 1
        },
        "NIST": {
          "NIST P-256": 1,
          "P-256": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_CBC_NOPAD": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD": 2,
            "ALG_AES_BLOCK_128_ECB_NOPAD": 1,
            "ALG_AES_CBC_ISO9797_M1": 1,
            "ALG_AES_CBC_ISO9797_M2": 1,
            "ALG_AES_CBC_ISO9797_M2_STANDARD": 1,
            "ALG_AES_CBC_ISO9797_STANDARD": 1,
            "ALG_AES_CBC_PKCS5": 1,
            "ALG_AES_CBC_PKCS7": 2,
            "ALG_AES_CFB": 1,
            "ALG_AES_CMAC16": 1,
            "ALG_AES_CMAC16_STANDARD": 1,
            "ALG_AES_CMAC8": 1,
            "ALG_AES_CMAC_128": 1,
            "ALG_AES_ECB_ISO9797_M1": 1,
            "ALG_AES_ECB_ISO9797_M2": 1,
            "ALG_AES_ECB_PKCS5": 1,
            "ALG_AES_ECB_PKCS7": 2,
            "ALG_AES_MAC_128_NOPAD": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 1,
            "ALG_DES_CBC_ISO9797_M2": 1,
            "ALG_DES_CBC_NOPAD": 1,
            "ALG_DES_CBC_PKCS5": 1,
            "ALG_DES_CBC_PKCS7": 1,
            "ALG_DES_CMAC8": 1,
            "ALG_DES_ECB_ISO9797_M1": 1,
            "ALG_DES_ECB_ISO9797_M2": 2,
            "ALG_DES_ECB_NOPAD": 1,
            "ALG_DES_ECB_PKCS5": 1,
            "ALG_DES_ECB_PKCS7": 1,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_M1": 1,
            "ALG_DES_MAC4_ISO9797_M2": 1,
            "ALG_DES_MAC4_PKCS5": 1,
            "ALG_DES_MAC8_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_M1": 1,
            "ALG_DES_MAC8_ISO9797_M2": 1,
            "ALG_DES_MAC8_NOPAD": 1,
            "ALG_DES_MAC8_PKCS5": 1
          },
          "EC": {
            "ALG_EC_SVDP_DH": 1,
            "ALG_EC_SVDP_DHC": 1,
            "ALG_EC_SVDP_DHC_KDF": 1,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_KDF": 1,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 2
          },
          "ECDSA": {
            "ALG_ECDSA_SHA_224": 1,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 1,
            "ALG_ECDSA_SHA_512": 1
          },
          "HMAC": {
            "ALG_HMAC_SHA_256": 1,
            "ALG_HMAC_SHA_384": 1,
            "ALG_HMAC_SHA_512": 1
          },
          "RSA": {
            "ALG_RSA_NOPAD": 1,
            "ALG_RSA_PKCS1": 1,
            "ALG_RSA_PKCS1_OAEP": 1,
            "ALG_RSA_SHA_224_PKCS1": 1,
            "ALG_RSA_SHA_224_PKCS1_PSS": 1,
            "ALG_RSA_SHA_256_PKCS1": 1,
            "ALG_RSA_SHA_256_PKCS1_PSS": 1,
            "ALG_RSA_SHA_384_PKCS1": 1,
            "ALG_RSA_SHA_384_PKCS1_PSS": 1,
            "ALG_RSA_SHA_512_PKCS1": 1,
            "ALG_RSA_SHA_512_PKCS1_PSS": 1,
            "ALG_RSA_SHA_PKCS1": 1
          },
          "SHA": {
            "ALG_SHA_224": 1,
            "ALG_SHA_256": 3,
            "ALG_SHA_384": 3,
            "ALG_SHA_512": 3
          },
          "SHA3": {
            "ALG_SHA3_224": 1,
            "ALG_SHA3_256": 1,
            "ALG_SHA3_384": 1,
            "ALG_SHA3_512": 1
          }
        },
        "curves": {
          "FRP256V1": 2,
          "SM2": 1
        },
        "misc": {
          "LENGTH_AES_128": 4,
          "LENGTH_AES_192": 4,
          "LENGTH_AES_256": 4,
          "LENGTH_DES3_2KEY": 4,
          "LENGTH_DES3_3KEY": 4,
          "LENGTH_EC_FP_128": 2,
          "LENGTH_EC_FP_160": 1,
          "LENGTH_EC_FP_192": 2,
          "LENGTH_EC_FP_224": 2,
          "LENGTH_EC_FP_256": 3,
          "LENGTH_EC_FP_384": 1,
          "LENGTH_EC_FP_528": 2,
          "LENGTH_RSA_1024": 1,
          "LENGTH_SHA": 1,
          "LENGTH_SHA3_224": 1,
          "LENGTH_SHA3_256": 1,
          "LENGTH_SHA3_384": 1,
          "LENGTH_SHA3_512": 1,
          "LENGTH_SHA_224": 1,
          "LENGTH_SHA_256": 2,
          "LENGTH_SHA_384": 1,
          "LENGTH_SHA_512": 2,
          "PAD_PKCS1_OAEP": 1,
          "SIG_CIPHER_AES_CMAC128": 1,
          "SIG_CIPHER_AES_CMAC16": 1,
          "SIG_CIPHER_AES_CMAC8": 1,
          "SIG_CIPHER_DES_CMAC8": 1,
          "SIG_CIPHER_ECDSA": 1,
          "SIG_CIPHER_EDDSA": 1,
          "SIG_CIPHER_EDDSAPH": 1,
          "SIG_CIPHER_RSA": 1,
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.nxp.id.jcopx.security": 1
        },
        "java": {
          "java.rmi": 1
        },
        "javacard": {
          "javacard.framework": 2,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 1,
          "javacardx.security": 1
        },
        "org": {
          "org.globalplatform": 1
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.3.1": 2
        },
        "JavaCard": {
          "JC3.1": 1,
          "Java Card 3.1": 2
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 8": 194,
          "JCOP8": 30
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 10,
          "RNG": 17
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Fault Injection": 1,
          "Physical Tampering": 2,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 2,
          "side-channel": 1,
          "timing attack": 1,
          "timing attacks": 2
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS20": 2,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 140-3": 2,
          "FIPS 197": 1,
          "FIPS PUB 186-3": 1
        },
        "ISO": {
          "ISO/IEC 7816": 4
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC 7748": 1,
          "RFC 8032": 1
        },
        "SCP": {
          "SCP80": 1,
          "SCP81": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 22,
            "AES-": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDEA": 4,
            "TDES": 2,
            "Triple-DES": 4,
            "TripleDES": 1
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 3,
            "HMAC": 10
          }
        },
        "miscellaneous": {
          "SM4": {
            "SM4": 1
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 6
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 457,
          "NXP Semiconductors": 24
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20231130133951Z",
      "/Creator": "DITA Open Toolkit 3.3.1",
      "/Keywords": "NXP, ASE, JCOP 8.9 with eUICC extension on SN300 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented",
      "/ModDate": "D:20231130134109-00\u002700\u0027",
      "/Producer": "Apache FOP Version 2.3",
      "/Subject": "NXP JCOP 8.9 with eUICC extension on SN300 Secure Element",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1316128,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 183
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "UICC_CD"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0100b_pdf.pdf",
        "pp_name": "Embedded UICC for Consumer Devices Protection Profile"
      },
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": null,
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0099V2b_pdf.pdf",
        "pp_name": "Java Card System - Open Configuration Protection Profile"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "AVA_VAN.5",
      "EAL4+",
      "ALC_DVS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300100-01-ST-Lite_v1.2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2e51d3b780d02b4f7c6a2113878a3b00a2f0b0611fca7a8e8f4f32b76d74fbfe",
      "txt_hash": "c80e7978fbeab20819fd3bdca57e81da00606a24708dbd44bf8dd8fe6c593bdb"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a12531a543f222af422a146957919104ecbc9b44535a9ce45c102afd73717126",
      "txt_hash": "e9f5c26d50e032ec1349f52099261842f9007c58a8b8d1f9b98ef076cfe38db4"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "978ce29914920008382b554f515cea7be7b20af3dd6dbd1b70849799668f2144",
      "txt_hash": "dce0fe0d0a01335e8060bcb8029a8ceb6e009f8a7c64713c072a7c89e9f1ec8b"
    }
  },
  "status": "active"
}