Sony Xperia™ X and Sony Xperia™ X Performance
CSV information ?
Status | archived |
---|---|
Valid from | 07.12.2016 |
Valid until | 07.12.2021 |
Scheme | 🇸🇪 SE |
Manufacturer | Sony Mobile Communications Inc. |
Category | Mobility |
Security level | EAL1 |
Protection profiles |
Heuristics summary ?
Certificate ?
Extracted keywords
Security level
EAL 2Security Assurance Requirements (SAR)
ALC_FLREvaluation facilities
atsecFile metadata
Creation date | D:20170403155121+02'00' |
---|---|
Modification date | D:20230313140935+01'00' |
Pages | 1 |
Certification report ?
Extracted keywords
Symmetric Algorithms
AESSchemes
MACProtocols
TLS, VPNTrusted Execution Environments
TEEVendor
QualcommSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_TSS.1Certificates
CSEC201003Evaluation facilities
atsecVulnerabilities
CVE-2016-3863, CVE-2016-3861, CVE-2016-3821, CVE-2016-3820, CVE-2016-3862, CVE-2016-3840, CVE-2016-3822, CVE-2016-3743, CVE-2016-3742, CVE-2016-3741, CVE-2016-2508, CVE-2016-2507, CVE-2016-2506, CVE-2016-2464, CVE-2016-2463, CVE-2016-0841, CVE-2016-0839, CVE-2016-2428, CVE-2016-2429Certification process
out of scope, expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification BodyStandards
FIPS 140-2, ISO/IEC 17025, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003File metadata
Title | Certification Report Sony Xperia X and Sony Xperia X Performance |
---|---|
Subject | 16FMV2071-76:1 |
Author | Imre Juhász |
Creation date | D:20170403103416+02'00' |
Modification date | D:20170403124210+02'00' |
Pages | 18 |
Creator | Acrobat PDFMaker 11 för Word |
Producer | Adobe PDF Library 11.0 |
Security target ?
Extracted keywords
Symmetric Algorithms
AES, AES-256, AES-, HMAC, HMAC-SHA-256Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224, SHA256, SHA384, SHA512, SHA-2, scrypt, PBKDF, PBKDF2Schemes
MAC, AEADProtocols
TLS, TLS v1.0, TLS 1.0, TLS 1.1, TLS 1.2, IKE, IPsec, VPNRandomness
DRBG, RNG, RBGLibraries
OpenSSL, BoringSSLElliptic Curves
P-256, P-384, P-521, P-224, NIST P-224, secp256r1, secp384r1Block cipher modes
ECB, CBC, CTR, GCM, CCM, XTSTLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384Trusted Execution Environments
ARM TrustZone, TrustZone, SE, TEEVendor
Qualcomm, Broadcom, MicrosoftSecurity level
EAL1Claims
O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, OE.CONFIG, OE.NOTIFY, OE.PRECAUTIONSecurity Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT, ATE_IND.1, AVA_VAN.1, ASE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_CKM_EXT.7, FCS_RBG_EXT.1, FCS_SRV_EXT.1, FCS_STG_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.1.2, FCS_CKM_EXT.1.3, FCS_CKM_EXT.1.4, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3.1, FCS_CKM_EXT.3.2, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6.1, FCS_CKM_EXT.7.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_RBG, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_RBG_EXT.1.3, FCS_SRV, FCS_SRV_EXT.1.1, FCS_CKM.2, FCS_STG, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_TLSC, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1.4, FCS_TLSC_EXT.1.5, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FDP_ACF, FDP_DAR, FDP_IFC, FDP_STG, FDP_UPC, FDP_ACF_EXT.1, FDP_DAR_EXT.1, FDP_IFC_EXT.1, FDP_STG_EXT.1, FDP_UPC_EXT.1, FDP_ACF_EXT.1.1, FDP_ACF_EXT.1.2, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_IFC_EXT.1.1, FDP_STG_EXT.1.1, FDP_UPC_EXT.1.1, FDP_UPC_EXT.1.2, FIA_AFL, FIA_BLT, FIA_PAE, FIA_PMG, FIA_TRT, FIA_UAU, FIA_AFL_EXT.1, FIA_BLT_EXT.1, FIA_PAE_EXT.1, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU_EXT.1, FIA_UAU_EXT.2, FIA_UAU_EXT.3, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_AFL_EXT.1.3, FIA_BLT_EXT.1.1, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_UAU_EXT.3.1, FMT_MOF, FMT_SMF, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT.2, FMT_MOF_EXT.1.1, FMT_MOF_EXT.1.2, FMT_SMF_EXT.1.1, FMT_SMF_EXT.2.1, FPT_AEX, FPT_KST, FPT_STM, FPT_TST, FPT_TUD, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_NOT_EXT.1, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_KST_EXT.3.1, FPT_NOT, FPT_NOT_EXT.1.1, FPT_STM.1, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.3, FPT_TUD_EXT.2.4, FPT_TUD_EXT.2.6, FTA_SSL, FTA_WSE, FTA_SSL_EXT.1, FTA_WSE_EXT.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT.1.2, FTA_SSL_EXT.1.3, FTA_TAB.1, FTA_TAB.1.1, FTA_WSE_EXT.1.1, FTP_ITC, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3Certification process
out of scope, These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security, expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto theStandards
FIPS PUB 186-4, FIPS PUB 197, FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-2, FIPS 186-4, FIPS 104-2, NIST SP 800-38F, NIST SP 800-108, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, NIST SP 800-132, NIST SP 800-57, SP 800-38, SP 800-90A, SP 800-56A, RFC 2818, RFC 4346, RFC 5246, RFC 4492, RFC 5289, RFC 6125, RFC 5280, RFC 5759, X.509, CCMB-2012-09-004File metadata
Title | Sony-CC-SecurityTarget_v1.2 |
---|---|
Author | Rasma |
Creation date | D:20170127123826Z |
Modification date | D:20170403152705+02'00' |
Pages | 61 |
Creator | Word |
Producer | Mac OS X 10.12.2 Quartz PDFContext |
Heuristics ?
Extracted SARs
ALC_CMC.1, ATE_IND.1, ASE_TSS.1, AGD_OPE.1, ALC_TSU_EXT.1, ASE_REQ.1, AGD_PRE.1, ASE_CCL.1, ADV_FSP.1, ALC_CMS.1, ASE_INT.1, ASE_OBJ.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.1References ?
No references are available for this certificate.
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Mobile Device Fundamentals', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_md_v2.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_MD_V2.0']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bba9452e6772e797b6c986df804218da3e13189b7d1b8017a3cc9c7a5d2a39b1', 'txt_hash': 'a61fdf4661c73fd956b62f22c13e9c96b511a2458d3b2de0ed8bd282d5c7a82a'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a02cecb474580a181e1550ca46d93f4caaa92268f0241ff7124ee869f9d950d3', 'txt_hash': '5c97e3b28eaf82cd031a4bd2a8ff91c587e346b56d45af5c9aba1033585bea63'}
data. - The cert property was updated, with the
{'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4b14297e2a8ba3bf1672258a50dcf46acd5039d3387cecd71baac2a0a0394f96', 'txt_hash': '6bc90b0cf8239851229dd1b1a4af52a3ee107ad5161de117405dc7f94131f31d'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 145099, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Ansvarigt Område/enhet': 'CSEC', '/Author': 'Imre Juhász', '/C-datum': '2008', '/CSECID': '', '/Category': '', '/Comments': '', '/Company': '', '/ContentTypeId': '0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603', '/CreationDate': "D:20170403103416+02'00'", '/Creator': 'Acrobat PDFMaker 11 för Word', '/Current Version': '', '/DDocBinder': 'Scheme (CB)', '/DDocCabinet': 'QMS', '/DDocID': '2005-03-05-64D6-T9YR', '/DDocLastModDate': '2006-03-16 10:56:39', '/DDocLibrary': 'https://haddock.fmv.se/domdoc/CSECLib.nsf', '/DDocRevision': '3,7', '/DDocTitle': '035 CB General Document - Template', '/Datum, skapat': '-', '/Deluppdragsbenämning': ' ', '/Dokument Status': 'Aktiv', '/Dokumentansvarig': 'Imre Juhász', '/Dokumentansvarigs enhet': 'KC Ledsyst', '/Dokumentbeteckning': '', '/Dokumentdatum': '2017-04-03', '/Dokumenttitel': 'Certification Report Sony Xperia X and Sony Xperia X Performance', '/Dokumenttyp': 'CB', '/FMV_beteckning': '16FMV2071-76:1', '/Fastställarens roll': 'Certifier', '/Fastställt av': 'Imre Juhász', '/Fastställt av1': 'Imre Juhász', '/Giltigt från': '-', '/Infoklass': 'HEMLIG/', '/Informationsklass': '', '/Keywords': '', '/Klassificeringsnr': '25 550', '/MallVersion': '7.0', '/ModDate': "D:20170403124210+02'00'", '/Paragraf': '', '/Platina': '1', '/Producer': 'Adobe PDF Library 11.0', '/Referens ID': 'CSEC-37-1156', '/Sekr. gäller tom.': '-', '/SourceModified': 'D:20170403083341', '/Stämpel': '1', '/Subject': '16FMV2071-76:1', '/Title': 'Certification Report Sony Xperia X and Sony Xperia X Performance', '/Uncontrolled': '0.000000', '/Uppdragsbenämning': ' ', '/Utgåva': '2.0', '/_dlc_DocId': 'CSEC-37-1156', '/_dlc_DocIdItemGuid': '671c079c-346d-423e-ac5c-f1312a8a09be', '/_dlc_DocIdUrl': 'http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1236228, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 61, '/AAPL:Keywords': '[]', '/Author': 'Rasma', '/CreationDate': 'D:20170127123826Z', '/Creator': 'Word', '/Keywords': '', '/ModDate': "D:20170403152705+02'00'", '/Producer': 'Mac OS X 10.12.2 Quartz PDFContext', '/Subject': '', '/Title': 'Sony-CC-SecurityTarget_v1.2', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The cert_metadata property was set to
{'pdf_file_size_bytes': 261750, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20170403155121+02'00'", '/ModDate': "D:20230313140935+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'SE': {'CSEC201003': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_TSU_EXT.1': 3}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_ECD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Qualcomm': {'Qualcomm': 3}}, 'eval_facility': {'atsec': {'atsec': 6}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2016-3863': 1, 'CVE-2016-3861': 1, 'CVE-2016-3821': 1, 'CVE-2016-3820': 1, 'CVE-2016-3862': 1, 'CVE-2016-3840': 1, 'CVE-2016-3822': 1, 'CVE-2016-3743': 1, 'CVE-2016-3742': 1, 'CVE-2016-3741': 1, 'CVE-2016-2508': 1, 'CVE-2016-2507': 1, 'CVE-2016-2506': 1, 'CVE-2016-2464': 1, 'CVE-2016-2463': 1, 'CVE-2016-0841': 1, 'CVE-2016-0839': 1, 'CVE-2016-2428': 1, 'CVE-2016-2429': 1}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TSU_EXT.1': 3, 'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_TSU_EXT': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_SPD.1': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 2, 'FCS_CKM_EXT.1': 3, 'FCS_CKM_EXT.2': 3, 'FCS_CKM_EXT.3': 4, 'FCS_CKM_EXT.4': 3, 'FCS_CKM_EXT.5': 3, 'FCS_CKM_EXT.6': 3, 'FCS_CKM_EXT.7': 3, 'FCS_RBG_EXT.1': 12, 'FCS_SRV_EXT.1': 4, 'FCS_STG_EXT.1': 3, 'FCS_TLSC_EXT.1': 3, 'FCS_TLSC_EXT.2': 5, 'FCS_CKM.1': 14, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 6, 'FCS_CKM_EXT.1.1': 2, 'FCS_CKM_EXT.1.2': 1, 'FCS_CKM_EXT.1.3': 1, 'FCS_CKM_EXT.1.4': 2, 'FCS_CKM_EXT.2.1': 1, 'FCS_CKM_EXT.3.1': 1, 'FCS_CKM_EXT.3.2': 1, 'FCS_CKM_EXT.4.1': 2, 'FCS_CKM_EXT.4.2': 1, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.6.1': 1, 'FCS_CKM_EXT.7.1': 1, 'FCS_COP': 1, 'FCS_COP.1': 34, 'FCS_COP.1.1': 5, 'FCS_RBG': 1, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_RBG_EXT.1.3': 1, 'FCS_SRV': 1, 'FCS_SRV_EXT.1.1': 1, 'FCS_CKM.2': 1, 'FCS_STG': 1, 'FCS_STG_EXT.1.1': 1, 'FCS_STG_EXT.1.2': 1, 'FCS_STG_EXT.1.3': 1, 'FCS_STG_EXT.1.4': 1, 'FCS_STG_EXT.1.5': 1, 'FCS_TLSC': 1, 'FCS_TLSC_EXT.1.1': 2, 'FCS_TLSC_EXT.1.2': 1, 'FCS_TLSC_EXT.1.3': 1, 'FCS_TLSC_EXT.1.4': 1, 'FCS_TLSC_EXT.1.5': 1, 'FCS_TLSC_EXT.2.1': 1, 'FCS_TLSC_EXT.2.2': 1, 'FCS_TLSC_EXT.2.3': 1, 'FCS_TLSC_EXT.2.4': 1, 'FCS_TLSC_EXT.2.5': 1}, 'FDP': {'FDP_ACF': 2, 'FDP_DAR': 2, 'FDP_IFC': 2, 'FDP_STG': 2, 'FDP_UPC': 2, 'FDP_ACF_EXT.1': 3, 'FDP_DAR_EXT.1': 3, 'FDP_IFC_EXT.1': 4, 'FDP_STG_EXT.1': 3, 'FDP_UPC_EXT.1': 3, 'FDP_ACF_EXT.1.1': 1, 'FDP_ACF_EXT.1.2': 1, 'FDP_DAR_EXT.1.1': 1, 'FDP_DAR_EXT.1.2': 1, 'FDP_IFC_EXT.1.1': 1, 'FDP_STG_EXT.1.1': 1, 'FDP_UPC_EXT.1.1': 1, 'FDP_UPC_EXT.1.2': 1}, 'FIA': {'FIA_AFL': 2, 'FIA_BLT': 2, 'FIA_PAE': 2, 'FIA_PMG': 2, 'FIA_TRT': 2, 'FIA_UAU': 2, 'FIA_AFL_EXT.1': 4, 'FIA_BLT_EXT.1': 3, 'FIA_PAE_EXT.1': 4, 'FIA_PMG_EXT.1': 3, 'FIA_TRT_EXT.1': 3, 'FIA_UAU_EXT.1': 3, 'FIA_UAU_EXT.2': 4, 'FIA_UAU_EXT.3': 3, 'FIA_AFL_EXT.1.1': 1, 'FIA_AFL_EXT.1.2': 1, 'FIA_AFL_EXT.1.3': 1, 'FIA_BLT_EXT.1.1': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_TRT_EXT.1.1': 1, 'FIA_UAU.7': 2, 'FIA_UAU.7.1': 1, 'FIA_UAU_EXT.1.1': 1, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU_EXT.2.2': 1, 'FIA_UAU_EXT.3.1': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_SMF': 2, 'FMT_MOF_EXT.1': 3, 'FMT_SMF_EXT.1': 14, 'FMT_SMF_EXT.2': 3, 'FMT_MOF_EXT.1.1': 3, 'FMT_MOF_EXT.1.2': 3, 'FMT_SMF_EXT.1.1': 2, 'FMT_SMF_EXT.2.1': 1}, 'FPT': {'FPT_AEX': 2, 'FPT_KST': 2, 'FPT_STM': 2, 'FPT_TST': 2, 'FPT_TUD': 2, 'FPT_AEX_EXT.1': 3, 'FPT_AEX_EXT.2': 3, 'FPT_AEX_EXT.3': 3, 'FPT_AEX_EXT.4': 3, 'FPT_KST_EXT.1': 3, 'FPT_KST_EXT.2': 3, 'FPT_KST_EXT.3': 3, 'FPT_NOT_EXT.1': 3, 'FPT_TST_EXT.1': 3, 'FPT_TST_EXT.2': 3, 'FPT_TUD_EXT.1': 3, 'FPT_TUD_EXT.2': 3, 'FPT_AEX_EXT.1.1': 1, 'FPT_AEX_EXT.1.2': 1, 'FPT_AEX_EXT.2.1': 1, 'FPT_AEX_EXT.3.1': 1, 'FPT_AEX_EXT.4.1': 1, 'FPT_AEX_EXT.4.2': 1, 'FPT_KST_EXT.1.1': 1, 'FPT_KST_EXT.2.1': 1, 'FPT_KST_EXT.3.1': 1, 'FPT_NOT': 1, 'FPT_NOT_EXT.1.1': 1, 'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TST_EXT.2.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_TUD_EXT.2.1': 1, 'FPT_TUD_EXT.2.2': 1, 'FPT_TUD_EXT.2.3': 1, 'FPT_TUD_EXT.2.4': 1, 'FPT_TUD_EXT.2.6': 1}, 'FTA': {'FTA_SSL': 2, 'FTA_WSE': 2, 'FTA_SSL_EXT.1': 3, 'FTA_WSE_EXT.1': 3, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL_EXT.1.2': 1, 'FTA_SSL_EXT.1.3': 1, 'FTA_TAB.1': 2, 'FTA_TAB.1.1': 1, 'FTA_WSE_EXT.1.1': 1}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC_EXT.1': 3, 'FTP_ITC_EXT.1.1': 1, 'FTP_ITC_EXT.1.2': 1, 'FTP_ITC_EXT.1.3': 1}}, 'cc_claims': {'O': {'O.COMMS': 1, 'O.STORAGE': 1, 'O.CONFIG': 1, 'O.AUTH': 1, 'O.INTEGRITY': 1}, 'T': {'T.EAVESDROP': 1, 'T.NETWORK': 1, 'T.PHYSICAL': 3, 'T.FLAWAPP': 2, 'T.PERSISTENT': 2}, 'A': {'A.CONFIG': 1, 'A.NOTIFY': 1, 'A.PRECAUTION': 1}, 'OE': {'OE.CONFIG': 1, 'OE.NOTIFY': 1, 'OE.PRECAUTION': 1}}, 'vendor': {'Qualcomm': {'Qualcomm': 9}, 'Broadcom': {'Broadcom': 4}, 'Microsoft': {'Microsoft': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 27, 'AES-256': 1, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-256': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 6}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 8, 'SHA-384': 2, 'SHA-512': 2, 'SHA-224': 1, 'SHA256': 2, 'SHA384': 1, 'SHA512': 1, 'SHA-2': 1}}, 'scrypt': {'scrypt': 4}, 'PBKDF': {'PBKDF': 9, 'PBKDF2': 2}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'AEAD': {'AEAD': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 25, 'TLS v1.0': 1, 'TLS 1.0': 2, 'TLS 1.1': 2, 'TLS 1.2': 4}}, 'IKE': {'IKE': 2}, 'IPsec': {'IPsec': 7}, 'VPN': {'VPN': 33}}, 'randomness': {'PRNG': {'DRBG': 3}, 'RNG': {'RNG': 6, 'RBG': 8}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 11}, 'CTR': {'CTR': 4}, 'GCM': {'GCM': 4}, 'CCM': {'CCM': 3}, 'XTS': {'XTS': 9}}, 'ecc_curve': {'NIST': {'P-256': 10, 'P-384': 10, 'P-521': 10, 'P-224': 1, 'NIST P-224': 1, 'secp256r1': 3, 'secp384r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_RSA_WITH_AES_256_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}, 'BoringSSL': {'BoringSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'ARM TrustZone': 1, 'TrustZone': 1}, 'IBM': {'SE': 2}, 'other': {'TEE': 19}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 8, 'FIPS PUB 197': 4, 'FIPS 140-2': 6, 'FIPS 197': 5, 'FIPS 180-4': 3, 'FIPS 198-1': 3, 'FIPS 186-2': 1, 'FIPS 186-4': 5, 'FIPS 104-2': 1}, 'NIST': {'NIST SP 800-38F': 4, 'NIST SP 800-108': 1, 'NIST SP 800-38A': 2, 'NIST SP 800-38C': 2, 'NIST SP 800-38D': 2, 'NIST SP 800-38E': 2, 'NIST SP 800-132': 2, 'NIST SP 800-57': 2, 'SP 800-38': 4, 'SP 800-90A': 1, 'SP 800-56A': 2}, 'RFC': {'RFC 2818': 2, 'RFC 4346': 2, 'RFC 5246': 14, 'RFC 4492': 8, 'RFC 5289': 4, 'RFC 6125': 2, 'RFC 5280': 4, 'RFC 5759': 2}, 'X509': {'X.509': 5}, 'CC': {'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'java': {'java.security.cert': 3}, 'com': {'com.android.voicemail.permission': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security': 1, 'expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the': 1}}}
. - The cert_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
Certification Report Sony X.pdf
. - The st_filename property was set to
Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf
. - The cert_filename property was set to
ccra cert sony x.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CSEC2010003
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TSU_EXT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The cert property was updated, with the
{'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The cert_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The cert_keywords property was set to
None
. - The report_filename property was set to
None
. - The cert_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}]}
values discarded.
- The st property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Sony Xperia™ X and Sony Xperia™ X Performance was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Mobility",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ccra%20cert%20sony%20x.pdf",
"dgst": "69e48d085b8d8069",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CSEC2010003",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TSU_EXT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sony Mobile Communications Inc.",
"manufacturer_web": "https://www.sonymobile.com/se/",
"name": "Sony Xperia\u2122 X and Sony Xperia\u2122 X Performance",
"not_valid_after": "2021-12-07",
"not_valid_before": "2016-12-07",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": "ccra cert sony x.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 2": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": {
"/CreationDate": "D:20170403155121+02\u002700\u0027",
"/ModDate": "D:20230313140935+01\u002700\u0027",
"pdf_file_size_bytes": 261750,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 1
},
"report_filename": "Certification Report Sony X.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"SE": {
"CSEC201003": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_TSU_EXT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"TLS": {
"TLS": {
"TLS": 1
}
},
"VPN": {
"VPN": 1
}
},
"crypto_scheme": {
"MAC": {
"MAC": 3
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"atsec": {
"atsec": 6
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-001": 1,
"CCMB-2012-09-002": 1,
"CCMB-2012-09-003": 1
},
"FIPS": {
"FIPS 140-2": 1
},
"ISO": {
"ISO/IEC 17025": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {
"other": {
"TEE": 2
}
},
"tls_cipher_suite": {},
"vendor": {
"Qualcomm": {
"Qualcomm": 3
}
},
"vulnerability": {
"CVE": {
"CVE-2016-0839": 1,
"CVE-2016-0841": 1,
"CVE-2016-2428": 1,
"CVE-2016-2429": 1,
"CVE-2016-2463": 1,
"CVE-2016-2464": 1,
"CVE-2016-2506": 1,
"CVE-2016-2507": 1,
"CVE-2016-2508": 1,
"CVE-2016-3741": 1,
"CVE-2016-3742": 1,
"CVE-2016-3743": 1,
"CVE-2016-3820": 1,
"CVE-2016-3821": 1,
"CVE-2016-3822": 1,
"CVE-2016-3840": 1,
"CVE-2016-3861": 1,
"CVE-2016-3862": 1,
"CVE-2016-3863": 1
}
}
},
"report_metadata": {
"/Ansvarigt Omr\u00e5de/enhet": "CSEC",
"/Author": "Imre Juh\u00e1sz",
"/C-datum": "2008",
"/CSECID": "",
"/Category": "",
"/Comments": "",
"/Company": "",
"/ContentTypeId": "0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603",
"/CreationDate": "D:20170403103416+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 11 f\u00f6r Word",
"/Current Version": "",
"/DDocBinder": "Scheme (CB)",
"/DDocCabinet": "QMS",
"/DDocID": "2005-03-05-64D6-T9YR",
"/DDocLastModDate": "2006-03-16 10:56:39",
"/DDocLibrary": "https://haddock.fmv.se/domdoc/CSECLib.nsf",
"/DDocRevision": "3,7",
"/DDocTitle": "035 CB General Document - Template",
"/Datum, skapat": "-",
"/Deluppdragsben\u00e4mning": " ",
"/Dokument Status": "Aktiv",
"/Dokumentansvarig": "Imre Juh\u00e1sz",
"/Dokumentansvarigs enhet": "KC Ledsyst",
"/Dokumentbeteckning": "",
"/Dokumentdatum": "2017-04-03",
"/Dokumenttitel": "Certification Report Sony Xperia X and Sony Xperia X Performance",
"/Dokumenttyp": "CB",
"/FMV_beteckning": "16FMV2071-76:1",
"/Fastst\u00e4llarens roll": "Certifier",
"/Fastst\u00e4llt av": "Imre Juh\u00e1sz",
"/Fastst\u00e4llt av1": "Imre Juh\u00e1sz",
"/Giltigt fr\u00e5n": "-",
"/Infoklass": "HEMLIG/",
"/Informationsklass": "",
"/Keywords": "",
"/Klassificeringsnr": "25 550",
"/MallVersion": "7.0",
"/ModDate": "D:20170403124210+02\u002700\u0027",
"/Paragraf": "",
"/Platina": "1",
"/Producer": "Adobe PDF Library 11.0",
"/Referens ID": "CSEC-37-1156",
"/Sekr. g\u00e4ller tom.": "-",
"/SourceModified": "D:20170403083341",
"/St\u00e4mpel": "1",
"/Subject": "16FMV2071-76:1",
"/Title": "Certification Report Sony Xperia X and Sony Xperia X Performance",
"/Uncontrolled": "0.000000",
"/Uppdragsben\u00e4mning": " ",
"/Utg\u00e5va": "2.0",
"/_dlc_DocId": "CSEC-37-1156",
"/_dlc_DocIdItemGuid": "671c079c-346d-423e-ac5c-f1312a8a09be",
"/_dlc_DocIdUrl": "http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156",
"pdf_file_size_bytes": 145099,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 18
},
"st_filename": "Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 6
},
"ECDH": {
"ECDH": 4
},
"ECDSA": {
"ECDSA": 7
}
},
"FF": {
"DH": {
"Diffie-Hellman": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.CONFIG": 1,
"A.NOTIFY": 1,
"A.PRECAUTION": 1
},
"O": {
"O.AUTH": 1,
"O.COMMS": 1,
"O.CONFIG": 1,
"O.INTEGRITY": 1,
"O.STORAGE": 1
},
"OE": {
"OE.CONFIG": 1,
"OE.NOTIFY": 1,
"OE.PRECAUTION": 1
},
"T": {
"T.EAVESDROP": 1,
"T.FLAWAPP": 2,
"T.NETWORK": 1,
"T.PERSISTENT": 2,
"T.PHYSICAL": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_FSP.1": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.1": 1,
"ALC_CMS.1": 1,
"ALC_TSU_EXT": 1,
"ALC_TSU_EXT.1": 3
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_REQ.1": 1,
"ASE_SPD.1": 3,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_IND.1": 1
},
"AVA": {
"AVA_VAN.1": 1
}
},
"cc_security_level": {
"EAL": {
"EAL1": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 2,
"FCS_CKM.1": 14,
"FCS_CKM.1.1": 2,
"FCS_CKM.2": 1,
"FCS_CKM.2.1": 6,
"FCS_CKM_EXT.1": 3,
"FCS_CKM_EXT.1.1": 2,
"FCS_CKM_EXT.1.2": 1,
"FCS_CKM_EXT.1.3": 1,
"FCS_CKM_EXT.1.4": 2,
"FCS_CKM_EXT.2": 3,
"FCS_CKM_EXT.2.1": 1,
"FCS_CKM_EXT.3": 4,
"FCS_CKM_EXT.3.1": 1,
"FCS_CKM_EXT.3.2": 1,
"FCS_CKM_EXT.4": 3,
"FCS_CKM_EXT.4.1": 2,
"FCS_CKM_EXT.4.2": 1,
"FCS_CKM_EXT.5": 3,
"FCS_CKM_EXT.5.1": 1,
"FCS_CKM_EXT.5.2": 1,
"FCS_CKM_EXT.6": 3,
"FCS_CKM_EXT.6.1": 1,
"FCS_CKM_EXT.7": 3,
"FCS_CKM_EXT.7.1": 1,
"FCS_COP": 1,
"FCS_COP.1": 34,
"FCS_COP.1.1": 5,
"FCS_RBG": 1,
"FCS_RBG_EXT.1": 12,
"FCS_RBG_EXT.1.1": 1,
"FCS_RBG_EXT.1.2": 1,
"FCS_RBG_EXT.1.3": 1,
"FCS_SRV": 1,
"FCS_SRV_EXT.1": 4,
"FCS_SRV_EXT.1.1": 1,
"FCS_STG": 1,
"FCS_STG_EXT.1": 3,
"FCS_STG_EXT.1.1": 1,
"FCS_STG_EXT.1.2": 1,
"FCS_STG_EXT.1.3": 1,
"FCS_STG_EXT.1.4": 1,
"FCS_STG_EXT.1.5": 1,
"FCS_TLSC": 1,
"FCS_TLSC_EXT.1": 3,
"FCS_TLSC_EXT.1.1": 2,
"FCS_TLSC_EXT.1.2": 1,
"FCS_TLSC_EXT.1.3": 1,
"FCS_TLSC_EXT.1.4": 1,
"FCS_TLSC_EXT.1.5": 1,
"FCS_TLSC_EXT.2": 5,
"FCS_TLSC_EXT.2.1": 1,
"FCS_TLSC_EXT.2.2": 1,
"FCS_TLSC_EXT.2.3": 1,
"FCS_TLSC_EXT.2.4": 1,
"FCS_TLSC_EXT.2.5": 1
},
"FDP": {
"FDP_ACF": 2,
"FDP_ACF_EXT.1": 3,
"FDP_ACF_EXT.1.1": 1,
"FDP_ACF_EXT.1.2": 1,
"FDP_DAR": 2,
"FDP_DAR_EXT.1": 3,
"FDP_DAR_EXT.1.1": 1,
"FDP_DAR_EXT.1.2": 1,
"FDP_IFC": 2,
"FDP_IFC_EXT.1": 4,
"FDP_IFC_EXT.1.1": 1,
"FDP_STG": 2,
"FDP_STG_EXT.1": 3,
"FDP_STG_EXT.1.1": 1,
"FDP_UPC": 2,
"FDP_UPC_EXT.1": 3,
"FDP_UPC_EXT.1.1": 1,
"FDP_UPC_EXT.1.2": 1
},
"FIA": {
"FIA_AFL": 2,
"FIA_AFL_EXT.1": 4,
"FIA_AFL_EXT.1.1": 1,
"FIA_AFL_EXT.1.2": 1,
"FIA_AFL_EXT.1.3": 1,
"FIA_BLT": 2,
"FIA_BLT_EXT.1": 3,
"FIA_BLT_EXT.1.1": 1,
"FIA_PAE": 2,
"FIA_PAE_EXT.1": 4,
"FIA_PMG": 2,
"FIA_PMG_EXT.1": 3,
"FIA_PMG_EXT.1.1": 1,
"FIA_TRT": 2,
"FIA_TRT_EXT.1": 3,
"FIA_TRT_EXT.1.1": 1,
"FIA_UAU": 2,
"FIA_UAU.7": 2,
"FIA_UAU.7.1": 1,
"FIA_UAU_EXT.1": 3,
"FIA_UAU_EXT.1.1": 1,
"FIA_UAU_EXT.2": 4,
"FIA_UAU_EXT.2.1": 1,
"FIA_UAU_EXT.2.2": 1,
"FIA_UAU_EXT.3": 3,
"FIA_UAU_EXT.3.1": 1
},
"FMT": {
"FMT_MOF": 2,
"FMT_MOF_EXT.1": 3,
"FMT_MOF_EXT.1.1": 3,
"FMT_MOF_EXT.1.2": 3,
"FMT_SMF": 2,
"FMT_SMF_EXT.1": 14,
"FMT_SMF_EXT.1.1": 2,
"FMT_SMF_EXT.2": 3,
"FMT_SMF_EXT.2.1": 1
},
"FPT": {
"FPT_AEX": 2,
"FPT_AEX_EXT.1": 3,
"FPT_AEX_EXT.1.1": 1,
"FPT_AEX_EXT.1.2": 1,
"FPT_AEX_EXT.2": 3,
"FPT_AEX_EXT.2.1": 1,
"FPT_AEX_EXT.3": 3,
"FPT_AEX_EXT.3.1": 1,
"FPT_AEX_EXT.4": 3,
"FPT_AEX_EXT.4.1": 1,
"FPT_AEX_EXT.4.2": 1,
"FPT_KST": 2,
"FPT_KST_EXT.1": 3,
"FPT_KST_EXT.1.1": 1,
"FPT_KST_EXT.2": 3,
"FPT_KST_EXT.2.1": 1,
"FPT_KST_EXT.3": 3,
"FPT_KST_EXT.3.1": 1,
"FPT_NOT": 1,
"FPT_NOT_EXT.1": 3,
"FPT_NOT_EXT.1.1": 1,
"FPT_STM": 2,
"FPT_STM.1": 2,
"FPT_STM.1.1": 1,
"FPT_TST": 2,
"FPT_TST_EXT.1": 3,
"FPT_TST_EXT.1.1": 1,
"FPT_TST_EXT.2": 3,
"FPT_TST_EXT.2.1": 1,
"FPT_TUD": 2,
"FPT_TUD_EXT.1": 3,
"FPT_TUD_EXT.1.1": 1,
"FPT_TUD_EXT.1.2": 1,
"FPT_TUD_EXT.1.3": 1,
"FPT_TUD_EXT.2": 3,
"FPT_TUD_EXT.2.1": 1,
"FPT_TUD_EXT.2.2": 1,
"FPT_TUD_EXT.2.3": 1,
"FPT_TUD_EXT.2.4": 1,
"FPT_TUD_EXT.2.6": 1
},
"FTA": {
"FTA_SSL": 2,
"FTA_SSL_EXT.1": 3,
"FTA_SSL_EXT.1.1": 1,
"FTA_SSL_EXT.1.2": 1,
"FTA_SSL_EXT.1.3": 1,
"FTA_TAB.1": 2,
"FTA_TAB.1.1": 1,
"FTA_WSE": 2,
"FTA_WSE_EXT.1": 3,
"FTA_WSE_EXT.1.1": 1
},
"FTP": {
"FTP_ITC": 2,
"FTP_ITC_EXT.1": 3,
"FTP_ITC_EXT.1.1": 1,
"FTP_ITC_EXT.1.2": 1,
"FTP_ITC_EXT.1.3": 1
}
},
"certification_process": {
"OutOfScope": {
"These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security": 1,
"expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 11
},
"CCM": {
"CCM": 3
},
"CTR": {
"CTR": 4
},
"ECB": {
"ECB": 6
},
"GCM": {
"GCM": 4
},
"XTS": {
"XTS": 9
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {
"BoringSSL": {
"BoringSSL": 3
},
"OpenSSL": {
"OpenSSL": 4
}
},
"crypto_protocol": {
"IKE": {
"IKE": 2
},
"IPsec": {
"IPsec": 7
},
"TLS": {
"TLS": {
"TLS": 25,
"TLS 1.0": 2,
"TLS 1.1": 2,
"TLS 1.2": 4,
"TLS v1.0": 1
}
},
"VPN": {
"VPN": 33
}
},
"crypto_scheme": {
"AEAD": {
"AEAD": 1
},
"MAC": {
"MAC": 7
}
},
"device_model": {},
"ecc_curve": {
"NIST": {
"NIST P-224": 1,
"P-224": 1,
"P-256": 10,
"P-384": 10,
"P-521": 10,
"secp256r1": 3,
"secp384r1": 3
}
},
"eval_facility": {},
"hash_function": {
"PBKDF": {
"PBKDF": 9,
"PBKDF2": 2
},
"SHA": {
"SHA1": {
"SHA-1": 7
},
"SHA2": {
"SHA-2": 1,
"SHA-224": 1,
"SHA-256": 8,
"SHA-384": 2,
"SHA-512": 2,
"SHA256": 2,
"SHA384": 1,
"SHA512": 1
}
},
"scrypt": {
"scrypt": 4
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {
"com": {
"com.android.voicemail.permission": 1
},
"java": {
"java.security.cert": 3
}
},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"PRNG": {
"DRBG": 3
},
"RNG": {
"RBG": 8,
"RNG": 6
}
},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2012-09-004": 1
},
"FIPS": {
"FIPS 104-2": 1,
"FIPS 140-2": 6,
"FIPS 180-4": 3,
"FIPS 186-2": 1,
"FIPS 186-4": 5,
"FIPS 197": 5,
"FIPS 198-1": 3,
"FIPS PUB 186-4": 8,
"FIPS PUB 197": 4
},
"NIST": {
"NIST SP 800-108": 1,
"NIST SP 800-132": 2,
"NIST SP 800-38A": 2,
"NIST SP 800-38C": 2,
"NIST SP 800-38D": 2,
"NIST SP 800-38E": 2,
"NIST SP 800-38F": 4,
"NIST SP 800-57": 2,
"SP 800-38": 4,
"SP 800-56A": 2,
"SP 800-90A": 1
},
"RFC": {
"RFC 2818": 2,
"RFC 4346": 2,
"RFC 4492": 8,
"RFC 5246": 14,
"RFC 5280": 4,
"RFC 5289": 4,
"RFC 5759": 2,
"RFC 6125": 2
},
"X509": {
"X.509": 5
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 27,
"AES-": 1,
"AES-256": 1
}
},
"constructions": {
"MAC": {
"HMAC": 5,
"HMAC-SHA-256": 2
}
}
},
"technical_report_id": {},
"tee_name": {
"ARM": {
"ARM TrustZone": 1,
"TrustZone": 1
},
"IBM": {
"SE": 2
},
"other": {
"TEE": 19
}
},
"tls_cipher_suite": {
"TLS": {
"TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 2,
"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 2,
"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 2,
"TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 2,
"TLS_RSA_WITH_AES_128_CBC_SHA": 4,
"TLS_RSA_WITH_AES_256_CBC_SHA": 4
}
},
"vendor": {
"Broadcom": {
"Broadcom": 4
},
"Microsoft": {
"Microsoft": 5
},
"Qualcomm": {
"Qualcomm": 9
}
},
"vulnerability": {}
},
"st_metadata": {
"/AAPL:Keywords": "[]",
"/Author": "Rasma",
"/CreationDate": "D:20170127123826Z",
"/Creator": "Word",
"/Keywords": "",
"/ModDate": "D:20170403152705+02\u002700\u0027",
"/Producer": "Mac OS X 10.12.2 Quartz PDFContext",
"/Subject": "",
"/Title": "Sony-CC-SecurityTarget_v1.2",
"pdf_file_size_bytes": 1236228,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": null,
"pp_ids": {
"_type": "Set",
"elements": [
"PP_MD_V2.0"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_md_v2.0.pdf",
"pp_name": "Protection Profile for Mobile Device Fundamentals"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf",
"scheme": "SE",
"security_level": {
"_type": "Set",
"elements": [
"EAL1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": true,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "4b14297e2a8ba3bf1672258a50dcf46acd5039d3387cecd71baac2a0a0394f96",
"txt_hash": "6bc90b0cf8239851229dd1b1a4af52a3ee107ad5161de117405dc7f94131f31d"
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "bba9452e6772e797b6c986df804218da3e13189b7d1b8017a3cc9c7a5d2a39b1",
"txt_hash": "a61fdf4661c73fd956b62f22c13e9c96b511a2458d3b2de0ed8bd282d5c7a82a"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "a02cecb474580a181e1550ca46d93f4caaa92268f0241ff7124ee869f9d950d3",
"txt_hash": "5c97e3b28eaf82cd031a4bd2a8ff91c587e346b56d45af5c9aba1033585bea63"
}
},
"status": "archived"
}