This page was not yet optimized for use on mobile
devices.
Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701
CSV information
| Status | archived |
|---|---|
| Valid from | 24.01.2006 |
| Valid until | 30.04.2013 |
| Scheme | 🇬🇧 UK |
| Manufacturer | Sony Corporation |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4 |
Heuristics summary
Certificate ID: CRP240
Certificate
certificate could not be downloaded, no link is available.
Certification report
Extracted keywords
Symmetric Algorithms
DES, 3DESSecurity level
EAL4, EAL1, EAL7Certificates
CERTIFICATION REPORT No. P240Certification process
out of scope, interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and, by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contactStandards
CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004File metadata
| Title | CRP240 |
|---|---|
| Subject | COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL |
| Author | CESG |
| Creation date | D:20060208162208Z |
| Modification date | D:20120106121536Z |
| Pages | 24 |
| Creator | cp240_cr_1.02 - Microsoft Word |
| Producer | Acrobat PDFWriter 5.0 for Windows NT |
Security target
Extracted keywords
Symmetric Algorithms
DES, Triple-DESBlock cipher modes
CBCSecurity level
EAL4Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RNG, FCS_IFC.1, FDP_ACF.1, FDP_ACC.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FDP_SDI.1, FDP_ITT.1.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_SDI.1.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FIA_AFL.1, FIA_UAU.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_PUT.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_MTD.3.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_PUT, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_ITT.1, FPT_PHP.3, FPT_RCV.4, FPT_RPL.1, FPT_SEP.1, FPT_TDC.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_RCV.4.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RPL.1.1, FPT_RPL.1.2, FPT_FSL.1, FRU_FLT.1, FRU_FLT.1.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Side-channel analysis
Physical Probing, physical probing, DPA, SPA, Malfunction, malfunction, reverse engineering, JILStandards
AIS 20, AIS20, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
| Title | CXD3715GG/GU-x Security Target |
|---|---|
| Subject | 英文 |
| Author | katoh |
| Creation date | D:20130430143756+01'00' |
| Modification date | D:20130430143756+01'00' |
| Pages | 126 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
CRP240Extracted SARs
ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2References
No references are available for this certificate.
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "794b142b57afbe13",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP240",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"0701"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sony Corporation",
"manufacturer_web": "https://www.sony.com/",
"name": "Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701",
"not_valid_after": "2013-04-30",
"not_valid_before": "2006-01-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP240.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P240": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL4": 18,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact": 1,
"interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and": 1,
"out of scope": 2
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-2004-01-001": 1,
"CCIMB-2004-01-002": 1,
"CCIMB-2004-01-003": 1,
"CCIMB-2004-01-004": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "CESG",
"/CreationDate": "D:20060208162208Z",
"/Creator": "cp240_cr_1.02 - Microsoft Word",
"/ModDate": "D:20120106121536Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Subject": "COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL ",
"/Title": "CRP240",
"pdf_file_size_bytes": 55971,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "ST Public v1.04.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 4,
"ACM_CAP.3": 1,
"ACM_CAP.4": 4,
"ACM_SCP.2": 6
},
"ADO": {
"ADO_DEL.2": 4,
"ADO_IGS.1": 4
},
"ADV": {
"ADV_FSP.1": 7,
"ADV_FSP.2": 4,
"ADV_HLD.1": 2,
"ADV_HLD.2": 4,
"ADV_IMP.1": 5,
"ADV_LLD.1": 5,
"ADV_RCR.1": 6,
"ADV_SPM.1": 9
},
"AGD": {
"AGD_ADM.1": 8,
"AGD_USR.1": 6
},
"ALC": {
"ALC_DVS.1": 5,
"ALC_LCD.1": 4,
"ALC_TAT.1": 5
},
"ATE": {
"ATE_COV.2": 4,
"ATE_DPT.1": 3,
"ATE_FUN.1": 6,
"ATE_IND.2": 4
},
"AVA": {
"AVA_MSU.2": 4,
"AVA_SOF.1": 4,
"AVA_VLA.2": 6
}
},
"cc_security_level": {
"EAL": {
"EAL4": 34
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 18,
"FCS_CKM.1.1": 2,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 32,
"FCS_COP.1.1": 2,
"FCS_IFC.1": 2,
"FCS_RNG": 2,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 10
},
"FDP": {
"FDP_ACC.1": 24,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 21,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.1": 9,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 35,
"FDP_IFF.1": 16,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.1.6": 1,
"FDP_ITC.1": 13,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 13,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 13,
"FDP_SDI.1.1": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 9,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 13,
"FMT_MSA.2": 15,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 9,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_MTD.3": 9,
"FMT_MTD.3.1": 1,
"FMT_PUT": 1,
"FMT_PUT.1": 18,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 30,
"FPT_FSL.1": 1,
"FPT_ITC.1": 9,
"FPT_ITC.1.1": 1,
"FPT_ITI.1": 11,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_ITT.1": 12,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 11,
"FPT_PHP.3.1": 1,
"FPT_RCV.4": 13,
"FPT_RCV.4.1": 1,
"FPT_RPL.1": 11,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_SEP.1": 11,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.1": 16,
"FRU_FLT.1.1": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 20,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 3,
"FTP_ITC.1.3": 2,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 7,
"malfunction": 18
},
"SCA": {
"DPA": 4,
"Physical Probing": 11,
"SPA": 2,
"physical probing": 8
},
"other": {
"JIL": 2,
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS20": 2
},
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 5
},
"DES": {
"DES": 44
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "katoh",
"/CreationDate": "D:20130430143756+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20130430143756+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "\u82f1\u6587",
"/Title": "CXD3715GG/GU-x Security Target",
"pdf_file_size_bytes": 861962,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 126
}
},
"protection_profile_links": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"json_hash": null,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "e048e6d3ab123fc994a225e8447483412d340ae2d9fefd49bb85f31f6aa2e8b3",
"txt_hash": "62d57b56e7cd258b30c2cbddcc7cb511ff82f03ce168548d8c8b78faa9de4e29"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "68a797f917cce5fd39e92443615f9838f75119b2031613fe564b45e258ddbb04",
"txt_hash": "506efaf7001a601e85ca34c4b763a2db0ad23d679aa0860bf8cf9efe85f0a865"
}
},
"status": "archived"
}