Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 01.01.2007 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Philips Semiconductors GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | AVA_MSU.3, AVA_VLA.4, ALC_DVS.2, EAL5+ |
Maintenance updates | NXP Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC (26.06.2009) Certification report Security target |
NXP Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software (26.01.2011) Certification report |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEARandomness
RNGEngines
SmartMXVendor
PhilipsSecurity level
EAL4, EAL5, EAL 1, EAL 7, EAL 4, EAL 5, EAL5+, EAL1, EAL3, EAL7, EAL2, EAL6, EAL 5 augmented, EAL5 augmentedClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT.1, ACM_CAP.4, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_LLD.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_SMR.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001, BSI-PP- 0002-2001, BSI-PP-0002-Certificates
BSI-DSZ-CC-0349-2006, BSI-DSZ-CC-0227-2004, BSI-DSZ-CC-0312-2005, BSI-DSZ-CC-0348-2006, BSI-DSZ-CC-0349, CC-0227-2004Side-channel analysis
physical probing, Physical Probing, side channel, timing attacks, physical tampering, MalfunctionCertification process
Philips P5CT072V0Q, P5CD072V0Q and P5CD036V0Q Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0349, Version 1.2, 13 January 2006, Evaluation of Philips, Technical Report, Philips P5CT072V0Q Secure Smart Card Controller, Version 1.0, 3. March 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German, to AIS 36, Version 1.1, 3. March 2006 for Philips P5CT072V0Q Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CT072V0P and P5CT072V0Q, Version 1.1, Semiconductors, 13 January 2006 (confidential document) B-26 BSI-DSZ-CC-0349-2006 Certification Report [12] Data Sheet, P5CT072V0P/V0Q, SmartMX, Secure, Controller, Preliminary Specification, Philips Semiconductors, Revision 2.0, September 14th, 2005 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD, the P5CT072V0P/Q, BSI-DSZ-CC-0348/0349, Version 1.2, Philips Semiconductors, February 9th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective SpecificationStandards
FIPS PUB 46-3, FIPS PUB 197, AIS 34, AIS 32, AIS 36, AIS 25, AIS 26, AIS 31, ISO/IEC 15408:1999, ISO/IEC15408: 1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title | Certification Report BSI-DSZ-CC-0349-2006 |
---|---|
Keywords | Common Criteria, Smartcard, Zertifizierung, Certification |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20060329122631+02'00' |
Modification date | D:20060329122757+02'00' |
Pages | 50 |
Creator | Acrobat PDFMaker 7.0.7 für Word |
Producer | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
Certificate ID | BSI-DSZ-CC-0349-2006 |
---|---|
Certified item | Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software |
Certification lab | BSI |
Developer | Philips Semiconductors GmbH Business Line Identification Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111 |
References
Outgoing- BSI-DSZ-CC-0348-2006 - archived - Philips Secure Smart Card Controller P5CT072V0P, P5CC072V0P,P5CD072V0P and P5CD036V0P each with specific IC Dedicated Software
- BSI-DSZ-CC-0227-2004 - archived - Philips P5CT072V0M and P5CC072VOM Secure Smart Card Controller
- BSI-DSZ-CC-0312-2005 - archived - Philips Secure Smart Card Controller P5CT072V0N including OM9500/1 and OM9501/2, P5CD072V0N and P5CD036V0N with specific IC Dedicated Software
- BSI-DSZ-CC-0362-2006 - archived - TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 2 / SLE66CLX641P/m1522-a12
- BSI-DSZ-CC-0445-2007 - archived - TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 3 / SLE66CLX641P/m1522-a14
- BSI-DSZ-CC-0375-2007 - archived - NXP Secure Smart Card Controller P5CT072V0N, P5CD072V0N, P5CD036V0N, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software
- ANSSI-CC-2006/28 - archived - AXSEAL CC V2 72K e-Passport application embedded on Philips P5CD072 V0Q microcontroller
- ANSSI-CC-2006/23 - archived - Application e-Passport AXSEAL CC V2 36K embedded on Philips P5CD036V0Q microcontroller
- BSI-DSZ-CC-0384-2007 - archived - MTCOS Pro 2.0 ICAO
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEAAsymmetric Algorithms
ECCRandomness
TRNG, RNG, RNDEngines
SmartMXVendor
PhilipsSecurity level
EAL5, EAL 5, EAL4, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented, EAL4 augmentedClaims
O.RND, O.HW_AES, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.CONFIG, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP.2, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP.2, ADV_FSP, ADV_RCR, ADV_SPM, ADV_HLD, ADV_LLD, ADV_INT, ADV_IMP, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_MSUSecurity Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_AMT.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001Certificates
BSI-DSZ-CC-0349Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31File metadata
Title | Security Target |
---|---|
Author | HGA |
Creation date | D:20060114120955+01'00' |
Modification date | D:20060114121137+01'00' |
Pages | 83 |
Creator | Acrobat PDFMaker 6.0 for Word |
Producer | Acrobat Distiller 6.0 (Windows) |
References
Incoming- BSI-DSZ-CC-0362-2006 - archived - TCOS Passport Version 1.0 Release 2 / P5CD072V0Q and TCOS Passport Version 1.0 Release 2 / SLE66CLX641P/m1522-a12
- ANSSI-CC-2006/28 - archived - AXSEAL CC V2 72K e-Passport application embedded on Philips P5CD072 V0Q microcontroller
- ANSSI-CC-2006/23 - archived - Application e-Passport AXSEAL CC V2 36K embedded on Philips P5CD036V0Q microcontroller
Heuristics ?
Extracted SARs
ADV_LLD.1, AVA_VLA.4, ALC_DVS.2, ATE_FUN.1, ASE_SRE.1, ATE_IND.2, ASE_TSS.1, ADV_INT.1, ADV_IMP.2, ALC_TAT.2, ADV_SPM.3, ASE_PPC.1, ALC_LCD.2, ASE_REQ.1, ATE_COV.2, AVA_SOF.1, ASE_DES.1, ADV_HLD.3, ASE_ENV.1, ASE_OBJ.1, AGD_USR.1, AVA_MSU.3, ASE_INT.1, AGD_ADM.1, ADV_RCR.2, AVA_CCA.1, ATE_DPT.2, ADV_FSP.3Similar certificates
References ?
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '6881b8369499d4e2587bad2598c15f8893a46648ee804efccced6ef553c31b30', 'txt_hash': '955747fae324a209d8b95c3779b1b4afe237e705f5d05c288bcebc411b5cfd2f'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '0ce04c3c5e05a16efb21e1bb8295bf8bd4fcd773508cbda4b54c13da42f78512', 'txt_hash': 'f0f875bbaefbe159cede32c7888fc22b1e6f39a982abc1759178ce72e81a8eee'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 355929, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 50, '/CreationDate': "D:20060329122631+02'00'", '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/Creator': 'Acrobat PDFMaker 7.0.7 für Word', '/Keywords': 'Common Criteria, Smartcard, Zertifizierung, Certification', '/Producer': 'Acrobat Distiller 7.0.5 (Windows)', '/ModDate': "D:20060329122757+02'00'", '/Company': 'BSI, Postfach 200363, 53133 Bonn', '/SourceModified': 'D:20060329102610', '/Category': 'Common Criteria Zertifizierung', '/Title': 'Certification Report BSI-DSZ-CC-0349-2006', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 700355, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 83, '/ModDate': "D:20060114121137+01'00'", '/CreationDate': "D:20060114120955+01'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'HGA', '/Company': 'Philips Semiconductors BL ID', '/SourceModified': 'D:20060114110443', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0349-2006', 'cert_item': 'Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software', 'developer': 'Philips Semiconductors GmbH Business Line Identification Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt für Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0349-2006': 25, 'BSI-DSZ-CC-0227-2004': 2, 'BSI-DSZ-CC-0312-2005': 3, 'BSI-DSZ-CC-0348-2006': 3, 'BSI-DSZ-CC-0349': 3}, 'NL': {'CC-0227-2004': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3, 'BSI-PP- 0002-2001': 1, 'BSI-PP-0002-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL5': 9, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL 5': 2, 'EAL5+': 1, 'EAL1': 5, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL6': 3, 'EAL 5 augmented': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_SCP.3': 3, 'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP.3': 2, 'ADV_HLD.3': 2, 'ADV_IMP.2': 2, 'ADV_INT.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2, 'ADV_LLD.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 3, 'ALC_TAT.2': 3, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 1, 'ALC_TAT': 2}, 'ATE': {'ATE_DPT.2': 2, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA.1': 2, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 3, 'FCS_RND.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ACC.1': 3, 'FDP_ACF.1': 3, 'FDP_IFC.1': 1, 'FDP_ITT.1': 1, 'FDP_ITC.1': 1}, 'FMT': {'FMT_MSA.1': 3, 'FMT_MSA.3': 3, 'FMT_SMF.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.2': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_ITT.1': 1, 'FPT_PHP.3': 1, 'FPT_SEP.1': 2}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'O': {'O.C': 2}, 'R': {'R.O': 2}}, 'vendor': {'Philips': {'Philips': 51}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 21}}, 'DES': {'DES': {'DES': 3, 'DEA': 1}, '3DES': {'Triple-DES': 11, 'TDEA': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 6}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'Physical Probing': 1, 'side channel': 1, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 2}, 'BSI': {'AIS 34': 3, 'AIS 32': 3, 'AIS 36': 6, 'AIS 25': 2, 'AIS 26': 3, 'AIS 31': 4}, 'ISO': {'ISO/IEC 15408:1999': 1, 'ISO/IEC15408: 1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Philips P5CT072V0Q, P5CD072V0Q and P5CD036V0Q Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0349, Version 1.2, 13 January 2006, Evaluation of Philips': 1, 'Technical Report, Philips P5CT072V0Q Secure Smart Card Controller, Version 1.0, 3. March 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German': 1, 'to AIS 36, Version 1.1, 3. March 2006 for Philips P5CT072V0Q Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CT072V0P and P5CT072V0Q, Version 1.1': 1, 'Semiconductors, 13 January 2006 (confidential document) B-26 BSI-DSZ-CC-0349-2006 Certification Report [12] Data Sheet, P5CT072V0P/V0Q, SmartMX, Secure': 1, 'Controller, Preliminary Specification, Philips Semiconductors, Revision 2.0, September 14th, 2005 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD': 1, 'the P5CT072V0P/Q, BSI-DSZ-CC-0348/0349, Version 1.2, Philips Semiconductors, February 9th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0349': 85}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 34, 'EAL 5': 4, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 4, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 6, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 4, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 2, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 5, 'FCS_RND.1.1': 1, 'FCS_COP.1': 28, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 6, 'FCS_CKM.4': 4, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 6, 'FDP_ACC.1': 34, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 6, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 15, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.HW_AES': 10, 'O.MF_FW': 7, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 7, 'O.CONFIG': 7}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 115}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 66}}, 'DES': {'DES': {'DES': 29, 'DEA': 2}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 2}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 12, 'RND': 5}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 3}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 15, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0349a.pdf
. - The st_filename property was set to
0349b.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0349-2006
. - The st_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2006/28', 'ANSSI-CC-2006/23', 'BSI-DSZ-CC-0362-2006']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2006/28', 'ANSSI-CC-2006/23', 'BSI-DSZ-CC-0362-2006']}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0362-2006', 'ANSSI-CC-2006/28', 'BSI-DSZ-CC-0384-2007', 'BSI-DSZ-CC-0375-2007', 'ANSSI-CC-2006/23', 'BSI-DSZ-CC-0445-2007']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0362-2006', 'ANSSI-CC-2006/28', 'BSI-DSZ-CC-0507-2008', 'BSI-DSZ-CC-0506-2008', 'BSI-DSZ-CC-0384-2007', 'BSI-DSZ-CC-0375-2007', 'ANSSI-CC-2006/23', 'BSI-DSZ-CC-0445-2007']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0348-2006', 'BSI-DSZ-CC-0227-2004', 'BSI-DSZ-CC-0312-2005']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0348-2006', 'BSI-DSZ-CC-0227-2004', 'BSI-DSZ-CC-0312-2005']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349a.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349b.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The st_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The st_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2006/28', 'BSI-DSZ-CC-0362-2006']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2006/28', 'BSI-DSZ-CC-0362-2006']}}}
data. - The report_references property was updated, with the
{'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2006/28', 'BSI-DSZ-CC-0362-2006']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['ANSSI-CC-2006/28', 'BSI-DSZ-CC-0507-2008', 'BSI-DSZ-CC-0362-2006']}}, 'directly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0312-2005']}}, 'indirectly_referencing': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0312-2005']}}}
data.
- The st_references property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "55b33b1d9f1cc8bc",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0349-2006",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"ANSSI-CC-2006/23",
"BSI-DSZ-CC-0445-2007",
"BSI-DSZ-CC-0362-2006",
"BSI-DSZ-CC-0384-2007",
"ANSSI-CC-2006/28",
"BSI-DSZ-CC-0375-2007"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0348-2006",
"BSI-DSZ-CC-0312-2005",
"BSI-DSZ-CC-0227-2004"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0506-2008",
"BSI-DSZ-CC-0445-2007",
"ANSSI-CC-2006/23",
"BSI-DSZ-CC-0362-2006",
"BSI-DSZ-CC-0507-2008",
"BSI-DSZ-CC-0384-2007",
"ANSSI-CC-2006/28",
"BSI-DSZ-CC-0375-2007"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0348-2006",
"BSI-DSZ-CC-0312-2005",
"BSI-DSZ-CC-0227-2004"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0362-2006",
"ANSSI-CC-2006/28",
"ANSSI-CC-2006/23"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0362-2006",
"ANSSI-CC-2006/28",
"ANSSI-CC-2006/23"
]
},
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2011-01-26",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349_ma2a_pdf.pdf",
"maintenance_st_link": null,
"maintenance_title": "NXP Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-06-26",
"maintenance_report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349_ma1a.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349_ma1b.pdf",
"maintenance_title": "NXP Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC"
}
]
},
"manufacturer": "Philips Semiconductors GmbH",
"manufacturer_web": "https://www.philips.com/",
"name": "Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q,P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2007-01-01",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0349a.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0349-2006",
"cert_item": "Philips Secure Smart Card Controller P5CT072V0Q, P5CD072V0Q, P5CD036V0Q, including specific Inlay Packages OM95xx, each with specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Philips Semiconductors GmbH Business Line Identification Certification Report V1.0 ZS-01-01-F-330 V3.23 BSI - Bundesamt f\u00fcr Sicherheit in der Informationstechnik, Postfach 20 03 63, D-53133 Bonn Phone +49 228 9582-0, Fax +49 228 9582-455, Infoline +49 228 9582-111",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0227-2004": 2,
"BSI-DSZ-CC-0312-2005": 3,
"BSI-DSZ-CC-0348-2006": 3,
"BSI-DSZ-CC-0349": 3,
"BSI-DSZ-CC-0349-2006": 25
},
"NL": {
"CC-0227-2004": 1
}
},
"cc_claims": {
"O": {
"O.C": 2
},
"R": {
"R.O": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0002-2001": 1,
"BSI-PP-0002-": 1,
"BSI-PP-0002-2001": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 2,
"ACM_SCP.3": 3
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.3": 2,
"ADV_HLD": 2,
"ADV_HLD.3": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 2,
"ADV_INT": 2,
"ADV_INT.1": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.2": 2,
"ADV_SPM": 2,
"ADV_SPM.3": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 3,
"ALC_TAT": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.2": 2,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_CCA.1": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 5": 2,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 10,
"EAL5": 9,
"EAL5 augmented": 1,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 3,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACF.1": 3,
"FDP_IFC.1": 1,
"FDP_ITC.1": 1,
"FDP_ITT.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 3,
"FMT_MSA.2": 1,
"FMT_MSA.3": 3,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_SEP.1": 2
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"Controller, Preliminary Specification, Philips Semiconductors, Revision 2.0, September 14th, 2005 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD": 1,
"Philips P5CT072V0Q, P5CD072V0Q and P5CD036V0Q Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0349, Version 1.2, 13 January 2006, Evaluation of Philips": 1,
"Semiconductors, 13 January 2006 (confidential document) B-26 BSI-DSZ-CC-0349-2006 Certification Report [12] Data Sheet, P5CT072V0P/V0Q, SmartMX, Secure": 1,
"Technical Report, Philips P5CT072V0Q Secure Smart Card Controller, Version 1.0, 3. March 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German": 1,
"the P5CT072V0P/Q, BSI-DSZ-CC-0348/0349, Version 1.2, Philips Semiconductors, February 9th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification": 1,
"to AIS 36, Version 1.1, 3. March 2006 for Philips P5CT072V0Q Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CT072V0P and P5CT072V0Q, Version 1.1": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 6
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 4
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"physical tampering": 1
},
"SCA": {
"Physical Probing": 1,
"physical probing": 2,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 4,
"AIS 32": 3,
"AIS 34": 3,
"AIS 36": 6
},
"FIPS": {
"FIPS PUB 197": 2,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 15408:1999": 1,
"ISO/IEC15408: 1999": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 21
}
},
"DES": {
"3DES": {
"TDEA": 2,
"Triple-DES": 11
},
"DES": {
"DEA": 1,
"DES": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Philips": {
"Philips": 51
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Category": "Common Criteria Zertifizierung",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20060329122631+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
"/Keywords": "Common Criteria, Smartcard, Zertifizierung, Certification",
"/ModDate": "D:20060329122757+02\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20060329102610",
"/Title": "Certification Report BSI-DSZ-CC-0349-2006",
"pdf_file_size_bytes": 355929,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 50
},
"st_filename": "0349b.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0349": 85
}
},
"cc_claims": {
"O": {
"O.CONFIG": 7,
"O.HW_AES": 10,
"O.MEM_ACCESS": 9,
"O.MF_FW": 7,
"O.RND": 3,
"O.SFR_ACCESS": 7
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 1,
"ACM_CAP": 1,
"ACM_CAP.4": 2,
"ACM_SCP": 3,
"ACM_SCP.2": 4,
"ACM_SCP.3": 5
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 3,
"ADV_FSP.2": 4,
"ADV_FSP.3": 6,
"ADV_HLD": 1,
"ADV_HLD.3": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 1,
"ADV_RCR": 4,
"ADV_RCR.2": 1,
"ADV_SPM": 1,
"ADV_SPM.3": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 2,
"AGD_USR": 2,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU": 2,
"AVA_MSU.3": 1,
"AVA_SOF.1": 2,
"AVA_VLA.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 2,
"EAL4": 4,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5": 34,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 6,
"FCS_CKM.4": 4,
"FCS_COP.1": 28,
"FCS_COP.1.1": 2,
"FCS_RND.1": 5,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 34,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 30,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 10,
"FDP_ITC.1": 6,
"FDP_ITT.1": 6,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 3,
"FMT_MSA.1": 29,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 6,
"FMT_MSA.3": 22,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 7,
"FPT_ITT.1": 6,
"FPT_PHP.3": 7,
"FPT_SEP.1": 15,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 3
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 12
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 10,
"fault injection": 3,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 15,
"Physical Probing": 2,
"physical probing": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"FIPS": {
"FIPS PUB 197": 3,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 66
}
},
"DES": {
"3DES": {
"TDEA": 3,
"Triple-DEA": 1,
"Triple-DES": 10
},
"DES": {
"DEA": 2,
"DES": 29
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Philips": {
"Philips": 115
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "HGA",
"/Company": "Philips Semiconductors BL ID",
"/CreationDate": "D:20060114120955+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/ModDate": "D:20060114121137+01\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/SourceModified": "D:20060114110443",
"/Title": "Security Target",
"pdf_file_size_bytes": 700355,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 83
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL5+",
"AVA_MSU.3",
"AVA_VLA.4",
"ALC_DVS.2"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0349b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "6881b8369499d4e2587bad2598c15f8893a46648ee804efccced6ef553c31b30",
"txt_hash": "955747fae324a209d8b95c3779b1b4afe237e705f5d05c288bcebc411b5cfd2f"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "0ce04c3c5e05a16efb21e1bb8295bf8bd4fcd773508cbda4b54c13da42f78512",
"txt_hash": "f0f875bbaefbe159cede32c7888fc22b1e6f39a982abc1759178ce72e81a8eee"
}
},
"status": "archived"
}