NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2, JCOP 7.3 R1.07.0.2

CSV information

Status active
Valid from 19.08.2025
Valid until 19.08.2030
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Netherlands N.V.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4, AVA_VAN.5, ALC_DVS.2, ALC_FLR.2
Protection profiles

Heuristics summary

Certificate ID: NSCIB-CC-3110-2025-08-2500052-01-CR

Certificate

Extracted keywords

Operating System name
JCOP 7
Vendor
NXP, NXP Semiconductors

Security level
EAL2, EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_DVS.2, ALC_FLR.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0099-V3-2024, BSI-CCPP-0100-V2-2025
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 18045:2022

File metadata

Author V T
Creation date D:20250821112025+01'00'
Modification date D:20250821112025+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, SEED, HMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Block cipher modes
ECB, CBC, CTR, CFB, GCM

JavaCard versions
Java Card 3.1, GlobalPlatform 2.3.1
Operating System name
JCOP 7
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
A.PROCESS-SEC-IC, A.USE_DIAG, A.USE_KEYS, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.TRUSTED-GUESTOS, A.APPSPROVIDER
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_COMP.1, ADV_IMP, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, ALC_DVS, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.5, AVA_VAN, AVA_COMP.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ
Protection profiles
BSI-CC-PP- 0100-V2-2025, BSI-CC-PP-0099-V3-2024, BSI-CCPP-0100-V2-2025
Certificates
NSCIB-CC-2300122-02-CR
Evaluation facilities
SGS, SGS Brightsight, Brightsight, TÜV Informationstechnik, Deutsche Telekom Security

Side-channel analysis
JIL-AAPS, JIL, JIL-COMP
Certification process
out of scope, algorithms, protocols and implementations: ECDAA, Korean SEED, MIFARE and FeliCa, which are out of scope as there are no security claims relating to these, which are out of scope as there are no security

Standards
AIS20, ISO/IEC 17065, ISO/IEC 17025

File metadata

Title Certification Report - EUCC
Author sjon
Creation date D:20250821114708+01'00'
Modification date D:20250821114708+01'00'
Pages 23
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID EUCC-3110-2025-08-2500052-01-CR
Certified item NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2, JCOP 7.3 R1.07.0.2
Certification lab SGS Brightsight
Developer NXP Semiconductors Netherlands N.V

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDES, TripleDES, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
RSA 1024, RSA-CRT, ECDH, ECDSA, EdDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Randomness
TRNG, RND, RNG
Libraries
Crypto Library ..................................................11
Elliptic Curves
P-256, NIST P-256, brainpoolP256r1, Curve25519, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, CFB, GCM, CCM, XTS

JavaCard versions
Java Card 3.1, JC3.1, GlobalPlatform 2.3.1
JavaCard API constants
ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_CBC_PKCS5, ALG_DES_ECB_PKCS5, ALG_DES_CBC_PKCS7, ALG_DES_ECB_PKCS7, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_NOPAD, ALG_DES_MAC4_PKCS5, ALG_DES_MAC8_PKCS5, ALG_DES_CMAC8, ALG_RSA_NOPAD, ALG_RSA_PKCS1, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_ISO9797_M2_STANDARD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_ECB_PKCS5, ALG_AES_CBC_PKCS7, ALG_AES_ECB_PKCS7, ALG_AES_CBC_ISO9797_STANDARD, ALG_AES_CFB, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC8, ALG_AES_CMAC16, ALG_AES_CMAC16_STANDARD, ALG_AES_CMAC_128, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA_224, ALG_XDH, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_AES_CMAC8, SIG_CIPHER_AES_CMAC16, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_DES_CMAC8, PAD_PKCS1_OAEP, TYPE_ACCESS, LENGTH_DES3_2KEY, LENGTH_DES3_3KEY, LENGTH_AES_128, LENGTH_AES_192, LENGTH_AES_256, LENGTH_EC_FP_128, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_528, LENGTH_EC_FP_384, LENGTH_SHA, LENGTH_SHA_224, LENGTH_SHA_256, LENGTH_SHA_384, LENGTH_SHA_512, LENGTH_RSA_1024, FRP256V1
Operating System name
JCOP 7, JCOP7
Trusted Execution Environments
SE
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4 augmented
Claims
D.UPDATE_IMAGE, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.PIN, D.APSD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.CARD_MNGT_, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG_ITEM, D.RESTRICTED_, D.TOE_IDENTIFIER, D.APP_C_, D.CARD_, D.CARD_MNGT_DATA, D.APP_, D.JCS_, D.RESTRICTED_MODE_STATE, D.TOE_IDENTIFICATION, D.PROFILE_NAA_PARAMS, O.REMOTE, O.BIO-MNGT, O.EXT-MEM, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.LOAD, O.INSTALL, O.DELETION, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.APPLET_LOADED, O.APPLET_CURRENT, O.CODE_CAP_, T.RND, T.CONFID-UPDATE-IMAGE, T.INTEG-UPDATE-IMAGE, T.UNAUTH-LOAD-UPDATE-IMAGE, T.INTERRUPT-OSU, T.CONFIG, T.COM_EXPLOIT, T.LIFE_CYCLE, T.UNAUTHORIZED_CARD_MNGT, T.INTEG-APPLI-DATA, T.RESTRICTED-MODE, T.CONFID-CONT, T.INTEG-CONT, T.EXE-CONT, T.CONT-DOS, T.CONT-SID, T.INTEG-CODE, T.INSTALL, T.DELETION, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.INTEG-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-JCS-DATA, T.INTEG-APPLI-CODE, T.EXE-CODE, T.NATIVE, T.SID, T.CONFID-APPLI-DA, T.INTEG-APPLI-COD, T.RESOURCES, T.UNAUTHORIZED_, T.OBJ-DELETION, T.PHYSICAL, T.CONFID-UPDATE-I, T.UNAUTH-LOAD-UP, T.INTEG-UPDATE-IM, T.RESTRICTED-MOD, T.CONFID-, T.INTEG-APPLI-, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-IC, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.TRUSTED-GUESTOS, A.APPS-, A.DELETION, A.CAP_FILE, A.VERIFICATION, A.TRUSTED-GUESTO, A.VERIFICATION-AU, R.JAVA, OT.IDENTIFICATION, OT.CONFID-UPDATE-IMAGE, OT.AUTH-LOAD-UPDATE-IMAGE, OT.SECURE_LOAD_ACODE, OT.SECURE_AC_ACTIVATION, OT.TOE_IDENTIFICATION, OT.CARD-CONFIGURATION, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OT.DOMAIN-RIGHTS, OT.APPLI-AUTH, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.CONT_SEP, OT.CONT_PRIV, OT.CONT_DOS, OT.RND, OT.SCP, OT.CARD-MANAGEMENT, OT.CARD-, OT.INSTALL, OT.LOAD, OT.DELETION, OT.SENSITIVE_RESULTS_INTEG, OT.FIREWALL, OT.SID, OT.GLOBAL_, OT.ARRAY_VIEW_, OT.SENSITIVE_, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.ALARM, OT.CIPHER, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.COMM_, OT.CARD-MANAGEM, OT.CONFID-UPDATE-, OT.AUTH-LOAD-UPD, OT.SECURE_LOAD_, OT.SECURE_AC_, OT.TOE_, OT.CARD-CONFIGUR, OT.ATTACK-COUNT, OT.RESTRICTED-MO, OT.ARRAY_VIEWS_, OT.ATTACK-COUNTE, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.ARRAY_VIEWS_CONFID, OT.ARRAY_VIEWS_INTEG, OT.CONT-SEP, OT.CONT-PRIV, OT.CONT-DOS, OT.SECURE-CHANNELS, OT.INTERNALSECURE-CHANNELS, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.READ_CONFIG_, OP.MODIFY_, OP.USE_CONFIG_, OP.TRIGGER_, OP.CONT_ACCESS, OP.ARRAY_T_ASTORE, OP.PUTFIELD, OP.PUTSTATIC, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_APPLET, OP.TRIGGER_UPDATE, OE.USE_DIAG, OE.USE_KEYS, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.PROCESS_SEC_IC, OE.CONFID-UPDATE-IMAGE, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.TRUSTED-GUESTOS, OE.SECURITY-, OE.IC, OE.RE, OE.CARD-, OE.TRUSTED-GUEST, OE.VERIFICATION-A, OE.SECURITY-DOMA, OE.PROCESS_SEC_, OE.CONFID-UPDATE-, OE.TRUSTED-GUES, SA.CONFID-UPDATE, SA.CONFID-APPLI-D, SA.CONFID-JCS-CO, SA.CONFID-JCS-DAT, SA.INTEG-UPDATE-I, SA.INTEG-APPLI-CO, SA.INTEG-APPLI-DA, SA.INTEG-JCS-CODE, SA.EXE-APPLI-CODE, SA.EXE-JCS-CODE, SA.NATIVE, SA.FIREWALL, SA.VERIFICATION, SA.CARD-MANAGEM, SA.INSTALL, SA.SID, SA.OBJ-DELETION, SA.DELETION, SA.ALARM, SA.OPERATE, SA.RESOURCES, SA.CIPHER, SA.KEY-MNGT, SA.PIN-MNGT, SA.SCP, SA.TRANSACTION, SA.CONFIG-APPLET, SA.OSU, SA.RM, SA.CONTEXT-SEPAR, SA.CONFID-APPLI-DATA, SA.CONFID-JCS-CODE, SA.CONFID-JCS-DATA, SA.INTEG-APPLI-CODE, SA.INTEG-APPLI-DATA, SA.INTEG-JCS-DATA, SA.CONFID-UPDATE-IMAGE, SA.INTEG-UPDATE-IMAGE, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.VERIFICATION, OSP.SECURITY-DOM
Security Assurance Requirements (SAR)
AGD_OPE.1, ALC_DVS.2, ALC_FLR.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FCO_NRO, FCO_NRO.2, FCO_NRO.1, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.1, FCS_COP.1, FCS_RNG.1, FCS_CKM.2, FCS_CKM.5, FCS_RBG.1, FCS_CKM.6, FCS_CKM.1.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_RNG.2, FDP_ACF.1, FDP_IFC, FDP_IFF, FDP_ACC, FDP_ACF, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1, FDP_UIT, FDP_UIT.1, FDP_ROL.1, FDP_ACC.1, FDP_ACC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ROL.1.2, FDP_ROL.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ACC.1.1, FDP_IFC.2.1, FDP_IFC.2.2, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_SMF, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_EMS.1, FPT_EMS.1.1, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V3-2024, BSI-CC-PP-0100-V2-2025, BSI-CC-PP-0084-2014
Certificates
NSCIB-CC-2300122-02

Side-channel analysis
physical probing, side channel, side-channel, DPA, SPA, timing attacks, timing attack, Physical Tampering, physical tampering, malfunction, DFA, JIL

Standards
FIPS 140-3, FIPS 197, FIPS PUB 186-3, AIS20, AIS31, AIS 20, RFC 5639, RFC 8032, RFC 7748, ISO/IEC 7816, SCP03, SCP80, SCP81, CCMB-2022-11-001, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004, CCMB-2022-11-005, CCMB-2022-11-006
Technical reports
BSI TR-03111

File metadata

Title Security Target Lite
Subject NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element
Keywords NXP, ASE, JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented
Author NXP B.V.
Creation date D:20250818165625+02'00'
Pages 184
Creator DITA Open Toolkit 3.3.1
Producer Apache FOP Version 2.3

References

Outgoing

Heuristics

Certificate ID: NSCIB-CC-3110-2025-08-2500052-01-CR

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2,JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2 NSCIB-CC-3110-2025-08-2500053-01-CR Compare
NXP JCOP 7.x on SN300 Secure Element, versions JCOP 7.0 R1.62.0.1, JCOP 7.1 R1.04.0.1 and JCOP 7.2 R1.09.0.1 NSCIB-CC-2300065-02-CR Compare
NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2 NSCIB-CC-2200043-05-CR Compare
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2 NSCIB-CC-2300100-01-CR Compare
NXP JCOP 8.x with eUICC extension on SN300 B2 Secure Element, version JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2 NSCIB-CC-2200043-04-CR Compare
NXP JCOP 7.x on SN300 Secure Element, version JCOP 7.0 R1.62.0.1 and JCOP 7.1 R1.04.0.1 NSCIB-CC-2300065-01-CR Compare
NXP JCOP 8.x/9.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1, JCOP 9.0 R1.07.0.1 NSCIB-CC-2200041-03-CR Compare
NXP JCOP 7.0 with eUICC extension on SN300 Secure Element, JCOP 7.0 R1.64.0.2 NSCIB-CC-0441505-CR2 Compare
NXP JCOP 8.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1 NSCIB-CC-2200041-02-CR Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210" NSCIB-CC-2300044-01-CR Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210" NSCIB-CC-2300044-02-CR Compare
NXP JCOP8.x on SE310 A0 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1 NSCIB-CC-2200042-02-CR Compare
NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1 NSCIB-CC-2300174-01-CR Compare
NXP JCOP 7.0 on SN300 Secure Element, JCOP 7.0 R1.62.0.1 NSCIB-CC-0441502-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, version JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 NSCIB-CC-0428888-CR2 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0356 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
NXP JCOP8.x on SE310 A0 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200042-01-CR Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, RPCS 3.12.23, RPCS Font 1.03, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0354 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
B1/EST-X Version 2.0.1 with AIX, Version 4.3.1 BSI-DSZ-CC-0143-1999 Compare
NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11 NSCIB-CC-2300172-01-CR Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, nashuatec MP C3002/C3502, Rex-Rotary MP C3002/C3502, Gestetner MP C3002/C3502, infotec MP C3002/C3502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0353 Compare
Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, nashuatec MP C4502/C5502, Rex-Rotary MP C4502/C5502, Gestetner MP C4502/C5502, infotec MP C4502/C5502 all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:04, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0357 Compare
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 System/Copy 1.11.1, Network Support 7.26, Network DocBox 1.10C, Web Support 1.59, Web Uapl 1.15, animation 1.3, Scanner 01.24, RPDL 7.33, Printer 1.11, MSIS 7.15.02, RPCS Font 1.01, Engine 1.04:05, OpePanel 1.01, LANG0 1.01, LANG1 1.01, ADF 15.000:15, - ASIC Ic Key 1100 - Option Data Erase Opt 1.01m JISEC-CC-CRP-C0246 Compare
NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1 NSCIB-CC-2300099-01-CR Compare
TMCOS 4.0 0.3 on THD89 1.0.3 Secure Element Java Card System Platform, version v4.0 0.3 NSCIB-CC-2400034-01-CR Compare
TMCOS 4.0 0.3 on THD89 1.0.3 Secure Element Java Card System Platform, version v4.0 0.3 NSCIB-CC-2400175-01-CR Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotary MP C4502A/C5502A, Gestetner MP C4502A/C5502A, infotec MP C4502A/C5502A all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Network Support 11.77, Fax 02.00.00, RemoteFax 02.00.00, NetworkDocBox 1.04, Web Support 1.07, Web Uapl 1.03, animation 1.00, Scanner 01.09, Printer 1.05.1, PCL 1.07, PCL Font 1.06, Data Erase Onb 1.01x, GWFCU3.5-4(WW) 01.00.04, Engine 0.16:02, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0355 Compare
Suite MISTRAL IP : version 7.0.2 pour TRC 7535, version 7.0.1 pour TRC 7539-11-A et leur centre de gestion CGM version 7.0.1 ANSSI-CC-2011/78 Compare
ZEMO VML-GK2, V.3.1.0 FW-Version 3.1.0, HW-Version 2.0.0 BSI-DSZ-CC-0623-V2-2018 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. None Compare
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.2.2) (ANSSI-CC-2024/09) ANSSI-CC-2024/09 Compare
Cryptek Inc. DiamondTEK (DiamondCentral (NSC Application S/W version 2.4.0.5, NSD-Prime F/W version 2.4.0.3) and NSD (DiamondLink, DiamondPak, DiamondVPN, DiamondSAT, DiamondUTC) F/W version 2.4.0.3) 04, CP 106), Diamond VPN (also sold as CV100); DiamondSAT CCEVS-VR-0054-2006 Compare
THD89 1.0.3 Secure Element version 1.0 2021-36-INF-4157 Compare
Tenable Security Center 3.2 (SC3) with 3D Tool 1.2 (3DT), Log Correlation Engine 2.0.2 (LCE), Passive Vulnerability Scanner 3.0 (PVS), and Nessus Scanner 3.0.4 (Nessus) CCEVS-VR-VID-10273-2010 Compare
IBM Internet Security Systems GX6116 Network IPS Security Appliance Version 2.2 and SiteProtector Version 2.0 Service Pack 7.0 CCEVS-VR-VID-10320-2011 Compare
Showing 5 out of 43.

Scheme data ?

Cert Id NSCIB-CC-23-2200029-01-CR
Certification Date 27.01.2023
Status Issued
Product NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2
Developer NXP Semiconductors N.V.
Evaluation Facility SGS Brightsight
Level EAL4+ AVA_VAN.5 and ALC_DVS.2
Cert Link https://trustcb.com/download/?wpdmdl=3117
Report Link https://trustcb.com/download/?wpdmdl=2694
Target Link https://trustcb.com/download/?wpdmdl=2695

References

Loading...

Updates

  • 25.08.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2, JCOP 7.3 R1.07.0.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500052-01_Cert.pdf",
  "dgst": "2769d350e77ec65a",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-3110-2025-08-2500052-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.04.0.2",
        "1.1",
        "7.0",
        "2.04.0.2",
        "1.64.0.2",
        "7.2",
        "7.1",
        "1.07.0.2",
        "1.09.0.2",
        "7.3"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "fdb8a517d5d22602",
        "5a8556c83f510b57"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300122-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300122-02-CR"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-23-2200029-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=3117",
      "certification_date": "2023-01-27",
      "developer": "NXP Semiconductors N.V.",
      "evaluation_facility": "SGS Brightsight",
      "level": "EAL4+ AVA_VAN.5 and ALC_DVS.2",
      "product": "NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2",
      "report_link": "https://trustcb.com/download/?wpdmdl=2694",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=2695"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300122-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300122-02-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Netherlands N.V.",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2, JCOP 7.3 R1.07.0.2",
  "not_valid_after": "2030-08-19",
  "not_valid_before": "2025-08-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "EUCC-3110-2025-08-2500052-01_Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-V3-2024": 1,
          "BSI-CCPP-0100-V2-2025": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 7": 6
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 18045:2022": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "V T",
      "/CreationDate": "D:20250821112025+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20250821112025+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "pdf_file_size_bytes": 285410,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nxp.com%2Fproducts%2Fwireless-connectivity%2Fnfc-hf%2Fnfc-enabled-digital-wallet%3ANFC-ENABLED-DIGITAL-WALLET\u0026data=05%7C02%7Czhazira.toleukhanova%40nxp.com%7Cbedab5c552f74771e93208ddda45e748%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C638906715942707209%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C\u0026sdata=s4Wgh%2FL%2BsESD3XkxuCqKRGHwsNIm22eBcGtqPbmSmsw%3D\u0026reserved=0",
          "file:///G:/Shared%20drives/Certifications/Certifications/EUCC/2500052%20NXP%20JCOP%207.x_eUICC_SN300%20B1.1/Cert%20docs/superceded/www.trustcb.com",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "EUCC-3110-2025-08-2500052-01_CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "EUCC-3110-2025-08-2500052-01-CR",
        "cert_item": "NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2, JCOP 7.3 R1.07.0.2",
        "cert_lab": " SGS Brightsight",
        "developer": "NXP Semiconductors Netherlands N.V"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 2
          },
          "EdDSA": {
            "EdDSA": 3
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-2300122-02-CR": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPS-PROVIDER": 2,
          "A.APPSPROVIDER": 1,
          "A.PROCESS-SEC-IC": 2,
          "A.TRUSTED-GUESTOS": 2,
          "A.USE_DIAG": 2,
          "A.USE_KEYS": 2,
          "A.VERIFICATION-AUTHORITY": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0100-V2-2025": 1,
          "BSI-CC-PP-0099-V3-2024": 1,
          "BSI-CCPP-0100-V2-2025": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 13,
          "ALC_FLR.2": 12,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ": 1,
          "ASE_SPD.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN": 1,
          "AVA_VAN.5": 17
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL4": 11,
          "EAL4 augmented": 11,
          "EAL4+": 2
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "algorithms, protocols and implementations: ECDAA, Korean SEED, MIFARE and FeliCa, which are out of scope as there are no security claims relating to these, which are out of scope as there are no security": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        },
        "DeutscheTelekom": {
          "Deutsche Telekom Security": 1
        },
        "SGS": {
          "SGS": 3,
          "SGS Brightsight": 3
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.3.1": 1
        },
        "JavaCard": {
          "Java Card 3.1": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 7": 147
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 2,
          "JIL-AAPS": 2,
          "JIL-COMP": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS20": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2,
          "ISO/IEC 17065": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "HMAC": 1
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 21,
          "NXP Semiconductors": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "sjon",
      "/CreationDate": "D:20250821114708+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20250821114708+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report - EUCC",
      "pdf_file_size_bytes": 548133,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nxp.com%2Fproducts%2Fwireless-connectivity%2Fnfc-hf%2Fnfc-enabled-digital-wallet%3ANFC-ENABLED-DIGITAL-WALLET\u0026data=05%7C02%7Czhazira.toleukhanova%40nxp.com%7Cbedab5c552f74771e93208ddda45e748%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C638906715942707209%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C\u0026sdata=s4Wgh%2FL%2BsESD3XkxuCqKRGHwsNIm22eBcGtqPbmSmsw%3D\u0026reserved=0",
          "https://trustcb.com/common-criteria/eucc/",
          "mailto:[email protected]",
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "mailto:[email protected]",
          "mailto:[email protected]",
          "[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 23
    },
    "st_filename": "EUCC-3110-2025-08-2500052-01_ST_lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDH": {
            "ECDH": 6
          },
          "ECDSA": {
            "ECDSA": 9
          },
          "EdDSA": {
            "EdDSA": 11
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-2300122-02": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPS-": 1,
          "A.APPS-PROVIDER": 4,
          "A.CAP_FILE": 3,
          "A.DELETION": 1,
          "A.PROCESS-SEC-IC": 4,
          "A.TRUSTED-GUESTO": 1,
          "A.TRUSTED-GUESTOS": 3,
          "A.USE_DIAG": 5,
          "A.USE_KEYS": 5,
          "A.VERIFICATION": 2,
          "A.VERIFICATION-AU": 1,
          "A.VERIFICATION-AUTHORITY": 4
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_": 1,
          "D.APP_CODE": 6,
          "D.APP_C_": 1,
          "D.APP_C_DATA": 4,
          "D.APP_I_DATA": 7,
          "D.APP_KEYS": 9,
          "D.APSD_KEYS": 5,
          "D.CARD_": 1,
          "D.CARD_MNGT_": 1,
          "D.CARD_MNGT_DATA": 1,
          "D.CONFIG_ITEM": 7,
          "D.CRYPTO": 5,
          "D.ISD_KEYS": 4,
          "D.JCS_": 1,
          "D.JCS_CODE": 7,
          "D.JCS_DATA": 8,
          "D.PIN": 9,
          "D.PROFILE_NAA_PARAMS": 1,
          "D.RESTRICTED_": 1,
          "D.RESTRICTED_MODE_STATE": 1,
          "D.SEC_DATA": 6,
          "D.TOE_IDENTIFICATION": 2,
          "D.TOE_IDENTIFIER": 3,
          "D.UPDATE_IMAGE": 26,
          "D.VASD_KEYS": 3
        },
        "O": {
          "O.APPLET": 15,
          "O.APPLET_CURRENT": 2,
          "O.APPLET_LOADED": 2,
          "O.BIO-MNGT": 1,
          "O.CODE_CAP_": 2,
          "O.CODE_CAP_FILE": 11,
          "O.DELETION": 3,
          "O.EXT-MEM": 1,
          "O.INSTALL": 2,
          "O.JAVAOBJECT": 67,
          "O.LOAD": 3,
          "O.REMOTE": 1,
          "O.SENSITIVE_ARRAYS_INTEG": 1,
          "O.SENSITIVE_RESULTS_INTEG": 1
        },
        "OE": {
          "OE.APPS-PROVIDER": 4,
          "OE.CAP_FILE": 5,
          "OE.CARD-": 2,
          "OE.CARD-MANAGEMENT": 1,
          "OE.CODE-EVIDENCE": 13,
          "OE.CONFID-UPDATE-": 2,
          "OE.CONFID-UPDATE-IMAGE": 2,
          "OE.IC": 3,
          "OE.KEY-CHANGE": 5,
          "OE.PROCESS_SEC_": 2,
          "OE.PROCESS_SEC_IC": 2,
          "OE.RE": 7,
          "OE.SCP": 16,
          "OE.SECURITY-": 1,
          "OE.SECURITY-DOMA": 2,
          "OE.SECURITY-DOMAINS": 1,
          "OE.TRUSTED-GUES": 1,
          "OE.TRUSTED-GUEST": 1,
          "OE.TRUSTED-GUESTOS": 2,
          "OE.USE_DIAG": 5,
          "OE.USE_KEYS": 5,
          "OE.VERIFICATION": 17,
          "OE.VERIFICATION-A": 2,
          "OE.VERIFICATION-AUTHORITY": 2
        },
        "OP": {
          "OP.ARRAY_": 1,
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 3,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 2,
          "OP.CONT_ACCESS": 7,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_CAP_": 2,
          "OP.DELETE_CAP_FILE": 2,
          "OP.DELETE_CAP_FILE_APPLET": 2,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.MODIFY_": 1,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.READ_CONFIG_": 1,
          "OP.THROW": 5,
          "OP.TRIGGER_": 1,
          "OP.TRIGGER_UPDATE": 3,
          "OP.TYPE_ACCESS": 5,
          "OP.USE_CONFIG_": 1
        },
        "OSP": {
          "OSP.KEY-CHANGE": 4,
          "OSP.PROCESS-TOE": 4,
          "OSP.SECURITY-DOM": 1,
          "OSP.SECURITY-DOMAINS": 3,
          "OSP.VERIFICATION": 2
        },
        "OT": {
          "OT.ALARM": 14,
          "OT.APPLI-AUTH": 8,
          "OT.ARRAY_VIEWS_": 2,
          "OT.ARRAY_VIEWS_CONFID": 1,
          "OT.ARRAY_VIEWS_INTEG": 1,
          "OT.ARRAY_VIEW_": 2,
          "OT.ATTACK-COUNT": 1,
          "OT.ATTACK-COUNTE": 1,
          "OT.ATTACK-COUNTER": 3,
          "OT.AUTH-LOAD-UPD": 2,
          "OT.AUTH-LOAD-UPDATE-IMAGE": 3,
          "OT.CARD-": 3,
          "OT.CARD-CONFIGUR": 2,
          "OT.CARD-CONFIGURATION": 3,
          "OT.CARD-MANAGEM": 16,
          "OT.CARD-MANAGEMENT": 3,
          "OT.CIPHER": 4,
          "OT.COMM_": 5,
          "OT.COMM_AUTH": 6,
          "OT.COMM_CONFIDENTIALITY": 3,
          "OT.COMM_INTEGRITY": 3,
          "OT.CONFID-UPDATE-": 2,
          "OT.CONFID-UPDATE-IMAGE": 3,
          "OT.CONT-DOS": 1,
          "OT.CONT-PRIV": 1,
          "OT.CONT-SEP": 1,
          "OT.CONT_DOS": 4,
          "OT.CONT_PRIV": 6,
          "OT.CONT_SEP": 8,
          "OT.DELETION": 1,
          "OT.DOMAIN-RIGHTS": 7,
          "OT.FIREWALL": 10,
          "OT.GLOBAL_": 6,
          "OT.GLOBAL_ARRAYS_CONFID": 1,
          "OT.GLOBAL_ARRAYS_INTEG": 1,
          "OT.IDENTIFICATION": 5,
          "OT.INSTALL": 1,
          "OT.INTERNALSECURE-CHANNELS": 1,
          "OT.KEY-MNGT": 4,
          "OT.LOAD": 1,
          "OT.NATIVE": 6,
          "OT.OBJ-DELETION": 3,
          "OT.OPERATE": 20,
          "OT.PIN-MNGT": 4,
          "OT.REALLOCATION": 4,
          "OT.RESOURCES": 5,
          "OT.RESTRICTED-MO": 3,
          "OT.RESTRICTED-MODE": 3,
          "OT.RND": 5,
          "OT.SCP": 34,
          "OT.SECURE-CHANNELS": 1,
          "OT.SECURE_AC_": 2,
          "OT.SECURE_AC_ACTIVATION": 3,
          "OT.SECURE_LOAD_": 4,
          "OT.SECURE_LOAD_ACODE": 3,
          "OT.SENSITIVE_": 2,
          "OT.SENSITIVE_RESULTS_INTEG": 3,
          "OT.SID": 8,
          "OT.TOE_": 2,
          "OT.TOE_IDENTIFICATION": 3,
          "OT.TRANSACTION": 4
        },
        "R": {
          "R.JAVA": 12
        },
        "SA": {
          "SA.ALARM": 2,
          "SA.CARD-MANAGEM": 1,
          "SA.CIPHER": 2,
          "SA.CONFID-APPLI-D": 1,
          "SA.CONFID-APPLI-DATA": 1,
          "SA.CONFID-JCS-CO": 1,
          "SA.CONFID-JCS-CODE": 1,
          "SA.CONFID-JCS-DAT": 1,
          "SA.CONFID-JCS-DATA": 1,
          "SA.CONFID-UPDATE": 1,
          "SA.CONFID-UPDATE-IMAGE": 1,
          "SA.CONFIG-APPLET": 1,
          "SA.CONTEXT-SEPAR": 1,
          "SA.DELETION": 1,
          "SA.EXE-APPLI-CODE": 3,
          "SA.EXE-JCS-CODE": 3,
          "SA.FIREWALL": 2,
          "SA.INSTALL": 2,
          "SA.INTEG-APPLI-CO": 1,
          "SA.INTEG-APPLI-CODE": 2,
          "SA.INTEG-APPLI-DA": 1,
          "SA.INTEG-APPLI-DATA": 2,
          "SA.INTEG-JCS-CODE": 3,
          "SA.INTEG-JCS-DATA": 1,
          "SA.INTEG-UPDATE-I": 1,
          "SA.INTEG-UPDATE-IMAGE": 1,
          "SA.KEY-MNGT": 2,
          "SA.NATIVE": 4,
          "SA.OBJ-DELETION": 3,
          "SA.OPERATE": 2,
          "SA.OSU": 1,
          "SA.PIN-MNGT": 2,
          "SA.RESOURCES": 3,
          "SA.RM": 1,
          "SA.SCP": 5,
          "SA.SID": 3,
          "SA.TRANSACTION": 2,
          "SA.VERIFICATION": 3
        },
        "T": {
          "T.COM_EXPLOIT": 4,
          "T.CONFID-": 1,
          "T.CONFID-APPLI-DA": 1,
          "T.CONFID-APPLI-DATA": 3,
          "T.CONFID-CONT": 4,
          "T.CONFID-JCS-CODE": 4,
          "T.CONFID-JCS-DATA": 4,
          "T.CONFID-UPDATE-I": 1,
          "T.CONFID-UPDATE-IMAGE": 3,
          "T.CONFIG": 4,
          "T.CONT-DOS": 4,
          "T.CONT-SID": 4,
          "T.DELETION": 3,
          "T.EXE-CODE": 8,
          "T.EXE-CODE-REMOTE": 1,
          "T.EXE-CONT": 4,
          "T.INSTALL": 3,
          "T.INTEG-APPLI-": 1,
          "T.INTEG-APPLI-COD": 2,
          "T.INTEG-APPLI-CODE": 5,
          "T.INTEG-APPLI-DATA": 13,
          "T.INTEG-CODE": 1,
          "T.INTEG-CONT": 3,
          "T.INTEG-JCS-CODE": 4,
          "T.INTEG-JCS-DATA": 4,
          "T.INTEG-UPDATE-IM": 1,
          "T.INTEG-UPDATE-IMAGE": 3,
          "T.INTERRUPT-OSU": 4,
          "T.LIFE_CYCLE": 4,
          "T.NATIVE": 4,
          "T.OBJ-DELETION": 2,
          "T.PHYSICAL": 2,
          "T.RESOURCES": 3,
          "T.RESTRICTED-MOD": 1,
          "T.RESTRICTED-MODE": 3,
          "T.RND": 5,
          "T.SID": 8,
          "T.UNAUTH-LOAD-UP": 1,
          "T.UNAUTH-LOAD-UPDATE-IMAGE": 3,
          "T.UNAUTHORIZED_": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V3-2024": 2,
          "BSI-CC-PP-0100-V2-2025": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE.1": 2
        },
        "ALC": {
          "ALC_DVS.2": 3,
          "ALC_FLR.2": 3
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_ECD": 1,
          "ASE_INT": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2,
          "ASE_TSS": 2
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 5,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 14,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS": 4,
          "FAU_SAS.1": 9,
          "FAU_SAS.1.1": 2
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 6,
          "FCO_NRO.2.1": 2,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 2
        },
        "FCS": {
          "FCS_CKM.1": 16,
          "FCS_CKM.1.1": 5,
          "FCS_CKM.2": 7,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.3": 3,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.5": 9,
          "FCS_CKM.6": 7,
          "FCS_CKM.6.1": 5,
          "FCS_CKM.6.2": 4,
          "FCS_COP.1": 13,
          "FCS_COP.1.1": 18,
          "FCS_RBG.1": 2,
          "FCS_RNG.1": 15,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2,
          "FCS_RNG.2": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 53,
          "FDP_ACC.1.1": 2,
          "FDP_ACC.2": 16,
          "FDP_ACC.2.1": 5,
          "FDP_ACC.2.2": 4,
          "FDP_ACF": 1,
          "FDP_ACF.1": 31,
          "FDP_ACF.1.1": 7,
          "FDP_ACF.1.2": 8,
          "FDP_ACF.1.3": 7,
          "FDP_ACF.1.4": 9,
          "FDP_IFC": 2,
          "FDP_IFC.1": 46,
          "FDP_IFC.1.1": 2,
          "FDP_IFC.2": 24,
          "FDP_IFC.2.1": 3,
          "FDP_IFC.2.2": 3,
          "FDP_IFF": 2,
          "FDP_IFF.1": 37,
          "FDP_IFF.1.1": 5,
          "FDP_IFF.1.2": 7,
          "FDP_IFF.1.3": 7,
          "FDP_IFF.1.4": 8,
          "FDP_IFF.1.5": 6,
          "FDP_ITC": 1,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 17,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 2,
          "FDP_RIP.1": 56,
          "FDP_RIP.1.1": 9,
          "FDP_ROL.1": 10,
          "FDP_ROL.1.1": 2,
          "FDP_ROL.1.2": 3,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 6,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2,
          "FDP_UIT": 1,
          "FDP_UIT.1": 4,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 8,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 19,
          "FIA_UAU.1.1": 4,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 3,
          "FIA_UID": 1,
          "FIA_UID.1": 61,
          "FIA_UID.1.1": 7,
          "FIA_UID.1.2": 5,
          "FIA_UID.2": 3,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MSA": 7,
          "FMT_MSA.1": 72,
          "FMT_MSA.1.1": 11,
          "FMT_MSA.2": 2,
          "FMT_MSA.2.1": 2,
          "FMT_MSA.3": 66,
          "FMT_MSA.3.1": 11,
          "FMT_MSA.3.2": 10,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 5,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 72,
          "FMT_SMF.1.1": 8,
          "FMT_SMR": 2,
          "FMT_SMR.1": 91,
          "FMT_SMR.1.1": 7,
          "FMT_SMR.1.2": 7
        },
        "FPR": {
          "FPR_UNO.1": 7,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS.1": 3,
          "FPT_EMS.1.1": 4,
          "FPT_FLS.1": 30,
          "FPT_FLS.1.1": 8,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 2,
          "FPT_RCV.3.1": 2,
          "FPT_RCV.3.2": 2,
          "FPT_RCV.3.3": 2,
          "FPT_RCV.3.4": 1,
          "FPT_TDC.1": 6,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 40
        },
        "CFB": {
          "CFB": 5
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 7
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library ..................................................11": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1
        },
        "Curve": {
          "Curve25519": 1
        },
        "Edwards": {
          "Ed25519": 1,
          "Ed448": 1
        },
        "NIST": {
          "NIST P-256": 1,
          "P-256": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_CBC_NOPAD": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD": 2,
            "ALG_AES_BLOCK_128_ECB_NOPAD": 1,
            "ALG_AES_CBC_ISO9797_M1": 1,
            "ALG_AES_CBC_ISO9797_M2": 1,
            "ALG_AES_CBC_ISO9797_M2_STANDARD": 1,
            "ALG_AES_CBC_ISO9797_STANDARD": 1,
            "ALG_AES_CBC_PKCS5": 1,
            "ALG_AES_CBC_PKCS7": 2,
            "ALG_AES_CFB": 1,
            "ALG_AES_CMAC16": 1,
            "ALG_AES_CMAC16_STANDARD": 1,
            "ALG_AES_CMAC8": 1,
            "ALG_AES_CMAC_128": 1,
            "ALG_AES_ECB_ISO9797_M1": 1,
            "ALG_AES_ECB_ISO9797_M2": 1,
            "ALG_AES_ECB_PKCS5": 1,
            "ALG_AES_ECB_PKCS7": 2,
            "ALG_AES_MAC_128_NOPAD": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 1,
            "ALG_DES_CBC_ISO9797_M2": 1,
            "ALG_DES_CBC_NOPAD": 1,
            "ALG_DES_CBC_PKCS5": 1,
            "ALG_DES_CBC_PKCS7": 1,
            "ALG_DES_CMAC8": 1,
            "ALG_DES_ECB_ISO9797_M1": 1,
            "ALG_DES_ECB_ISO9797_M2": 2,
            "ALG_DES_ECB_NOPAD": 1,
            "ALG_DES_ECB_PKCS5": 1,
            "ALG_DES_ECB_PKCS7": 1,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_M1": 1,
            "ALG_DES_MAC4_ISO9797_M2": 1,
            "ALG_DES_MAC4_PKCS5": 1,
            "ALG_DES_MAC8_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_M1": 1,
            "ALG_DES_MAC8_ISO9797_M2": 1,
            "ALG_DES_MAC8_NOPAD": 1,
            "ALG_DES_MAC8_PKCS5": 1
          },
          "EC": {
            "ALG_EC_SVDP_DH": 1,
            "ALG_EC_SVDP_DHC": 1,
            "ALG_EC_SVDP_DHC_KDF": 1,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_KDF": 1,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 2
          },
          "ECDSA": {
            "ALG_ECDSA_SHA_224": 1,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 1,
            "ALG_ECDSA_SHA_512": 1
          },
          "HMAC": {
            "ALG_HMAC_SHA_256": 1,
            "ALG_HMAC_SHA_384": 1,
            "ALG_HMAC_SHA_512": 1
          },
          "RSA": {
            "ALG_RSA_NOPAD": 1,
            "ALG_RSA_PKCS1": 1,
            "ALG_RSA_PKCS1_OAEP": 1,
            "ALG_RSA_SHA_224_PKCS1": 1,
            "ALG_RSA_SHA_224_PKCS1_PSS": 1,
            "ALG_RSA_SHA_256_PKCS1": 1,
            "ALG_RSA_SHA_256_PKCS1_PSS": 1,
            "ALG_RSA_SHA_384_PKCS1": 1,
            "ALG_RSA_SHA_384_PKCS1_PSS": 1,
            "ALG_RSA_SHA_512_PKCS1": 1,
            "ALG_RSA_SHA_512_PKCS1_PSS": 1,
            "ALG_RSA_SHA_ISO9796": 1,
            "ALG_RSA_SHA_ISO9796_MR": 1,
            "ALG_RSA_SHA_PKCS1": 1
          },
          "SHA": {
            "ALG_SHA_224": 1,
            "ALG_SHA_256": 3,
            "ALG_SHA_384": 3,
            "ALG_SHA_512": 3
          },
          "XDH": {
            "ALG_XDH": 1
          }
        },
        "curves": {
          "FRP256V1": 2
        },
        "misc": {
          "LENGTH_AES_128": 4,
          "LENGTH_AES_192": 4,
          "LENGTH_AES_256": 4,
          "LENGTH_DES3_2KEY": 4,
          "LENGTH_DES3_3KEY": 4,
          "LENGTH_EC_FP_128": 2,
          "LENGTH_EC_FP_160": 1,
          "LENGTH_EC_FP_192": 2,
          "LENGTH_EC_FP_224": 2,
          "LENGTH_EC_FP_256": 3,
          "LENGTH_EC_FP_384": 1,
          "LENGTH_EC_FP_528": 2,
          "LENGTH_RSA_1024": 1,
          "LENGTH_SHA": 1,
          "LENGTH_SHA_224": 1,
          "LENGTH_SHA_256": 2,
          "LENGTH_SHA_384": 1,
          "LENGTH_SHA_512": 2,
          "PAD_PKCS1_OAEP": 1,
          "SIG_CIPHER_AES_CMAC128": 1,
          "SIG_CIPHER_AES_CMAC16": 1,
          "SIG_CIPHER_AES_CMAC8": 1,
          "SIG_CIPHER_DES_CMAC8": 1,
          "SIG_CIPHER_ECDSA": 1,
          "SIG_CIPHER_RSA": 1,
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.nxp.id.jcopx.security": 1
        },
        "java": {
          "java.rmi": 1
        },
        "javacard": {
          "javacard.framework": 2,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 1,
          "javacardx.security": 1
        },
        "org": {
          "org.globalplatform": 1
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.3.1": 1
        },
        "JavaCard": {
          "JC3.1": 1,
          "Java Card 3.1": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 7": 324,
          "JCOP7": 10
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 10,
          "RNG": 17
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Physical Tampering": 1,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 2,
          "side-channel": 1,
          "timing attack": 1,
          "timing attacks": 2
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS20": 2,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2022-11-001": 2,
          "CCMB-2022-11-002": 2,
          "CCMB-2022-11-003": 2,
          "CCMB-2022-11-004": 2,
          "CCMB-2022-11-005": 2,
          "CCMB-2022-11-006": 2
        },
        "FIPS": {
          "FIPS 140-3": 1,
          "FIPS 197": 2,
          "FIPS PUB 186-3": 1
        },
        "ISO": {
          "ISO/IEC 7816": 4
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC 7748": 1,
          "RFC 8032": 1
        },
        "SCP": {
          "SCP03": 1,
          "SCP80": 1,
          "SCP81": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 2,
            "Triple-DES": 4,
            "TripleDES": 1
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 3,
            "HMAC": 10
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 3
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 502,
          "NXP Semiconductors": 24
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20250818165625+02\u002700\u0027",
      "/Creator": "DITA Open Toolkit 3.3.1",
      "/Keywords": "NXP, ASE, JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented",
      "/Producer": "Apache FOP Version 2.3",
      "/Subject": "NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1221152,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 184
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V3b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500052-01_CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4",
      "ALC_DVS.2",
      "AVA_VAN.5",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500052-01_ST_lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "aac24bae624886586e18e5a3103e1915d173d308d95303b8a85c6c9db811935f",
      "txt_hash": "a1b5499af99086a791be30d7fe2cf1bd28ed1d17bc0b4a57b62fcdb59bb1770a"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "36dcc469d875da133a76aaa052ef86b5865c4217d7f16ca5fd91b5515e1c4131",
      "txt_hash": "8b71bc7f7fe9c49f68372d3abc79f7091ceb4ee77ef3f9c5bdc010fc23cd3181"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "f6eb30590ccf7a798eae33cc7fcf3e0428060482cd7e9346c3de18919f58d2c3",
      "txt_hash": "dd05e3e4106a8a8eaeb6c91334c624d289c3247549fd5688e8247cd39332d1f5"
    }
  },
  "status": "active"
}