Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701

CSV information

Status archived
Valid from 24.01.2006
Valid until 30.04.2013
Scheme 🇬🇧 UK
Manufacturer Sony Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4

Heuristics summary

Certificate ID: CRP240

Certificate

certificate could not be downloaded, no link is available.

Certification report

Extracted keywords

Symmetric Algorithms
DES, 3DES

Security level
EAL4, EAL1, EAL7
Certificates
CERTIFICATION REPORT No. P240

Certification process
out of scope, interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and, by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact

Standards
CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004

File metadata

Title CRP240
Subject COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL
Author CESG
Creation date D:20060208162208Z
Modification date D:20120106121536Z
Pages 24
Creator cp240_cr_1.02 - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Security target

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Block cipher modes
CBC

Security level
EAL4
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RNG, FCS_IFC.1, FDP_ACF.1, FDP_ACC.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FDP_SDI.1, FDP_ITT.1.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_SDI.1.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FIA_AFL.1, FIA_UAU.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_PUT.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_MTD.3.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_PUT, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_ITT.1, FPT_PHP.3, FPT_RCV.4, FPT_RPL.1, FPT_SEP.1, FPT_TDC.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_RCV.4.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RPL.1.1, FPT_RPL.1.2, FPT_FSL.1, FRU_FLT.1, FRU_FLT.1.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Side-channel analysis
Physical Probing, physical probing, DPA, SPA, Malfunction, malfunction, reverse engineering, JIL

Standards
AIS 20, AIS20, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title CXD3715GG/GU-x Security Target
Subject 英文
Author katoh
Creation date D:20130430143756+01'00'
Modification date D:20130430143756+01'00'
Pages 126
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CRP240

Extracted SARs

ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2

References

No references are available for this certificate.

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "794b142b57afbe13",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP240",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "0701"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sony Corporation",
  "manufacturer_web": "https://www.sony.com/",
  "name": "Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701",
  "not_valid_after": "2013-04-30",
  "not_valid_before": "2006-01-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP240.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CERTIFICATION REPORT No. P240": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL4": 18,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact": 1,
          "interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-001": 1,
          "CCIMB-2004-01-002": 1,
          "CCIMB-2004-01-003": 1,
          "CCIMB-2004-01-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "CESG",
      "/CreationDate": "D:20060208162208Z",
      "/Creator": "cp240_cr_1.02 - Microsoft Word",
      "/ModDate": "D:20120106121536Z",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Subject": "COMMON CRITERIA CERTIFICATION REPORT No. P240  SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701  has been evaluated under the terms of the Scheme  and complies with the requirements for   EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL ",
      "/Title": "CRP240",
      "pdf_file_size_bytes": 55971,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "ST Public v1.04.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 4,
          "ACM_CAP.3": 1,
          "ACM_CAP.4": 4,
          "ACM_SCP.2": 6
        },
        "ADO": {
          "ADO_DEL.2": 4,
          "ADO_IGS.1": 4
        },
        "ADV": {
          "ADV_FSP.1": 7,
          "ADV_FSP.2": 4,
          "ADV_HLD.1": 2,
          "ADV_HLD.2": 4,
          "ADV_IMP.1": 5,
          "ADV_LLD.1": 5,
          "ADV_RCR.1": 6,
          "ADV_SPM.1": 9
        },
        "AGD": {
          "AGD_ADM.1": 8,
          "AGD_USR.1": 6
        },
        "ALC": {
          "ALC_DVS.1": 5,
          "ALC_LCD.1": 4,
          "ALC_TAT.1": 5
        },
        "ATE": {
          "ATE_COV.2": 4,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 4
        },
        "AVA": {
          "AVA_MSU.2": 4,
          "AVA_SOF.1": 4,
          "AVA_VLA.2": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 34
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 2,
          "FCS_COP.1": 32,
          "FCS_COP.1.1": 2,
          "FCS_IFC.1": 2,
          "FCS_RNG": 2,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 10
        },
        "FDP": {
          "FDP_ACC.1": 24,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 21,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.1": 9,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 35,
          "FDP_IFF.1": 16,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.1.6": 1,
          "FDP_ITC.1": 13,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 13,
          "FDP_ITT.1.1": 1,
          "FDP_SDI.1": 13,
          "FDP_SDI.1.1": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 9,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 13,
          "FMT_MSA.2": 15,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 13,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 9,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_MTD.3": 9,
          "FMT_MTD.3.1": 1,
          "FMT_PUT": 1,
          "FMT_PUT.1": 18,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 17,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 30,
          "FPT_FSL.1": 1,
          "FPT_ITC.1": 9,
          "FPT_ITC.1.1": 1,
          "FPT_ITI.1": 11,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_ITT.1": 12,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.4": 13,
          "FPT_RCV.4.1": 1,
          "FPT_RPL.1": 11,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_SEP.1": 11,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TDC.1": 9,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1
        },
        "FRU": {
          "FRU_FLT.1": 16,
          "FRU_FLT.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 20,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 7,
          "malfunction": 18
        },
        "SCA": {
          "DPA": 4,
          "Physical Probing": 11,
          "SPA": 2,
          "physical probing": 8
        },
        "other": {
          "JIL": 2,
          "reverse engineering": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS20": 2
        },
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 5
          },
          "DES": {
            "DES": 44
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "katoh",
      "/CreationDate": "D:20130430143756+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20130430143756+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "\u82f1\u6587",
      "/Title": "CXD3715GG/GU-x Security Target",
      "pdf_file_size_bytes": 861962,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 126
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "e048e6d3ab123fc994a225e8447483412d340ae2d9fefd49bb85f31f6aa2e8b3",
      "txt_hash": "62d57b56e7cd258b30c2cbddcc7cb511ff82f03ce168548d8c8b78faa9de4e29"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "68a797f917cce5fd39e92443615f9838f75119b2031613fe564b45e258ddbb04",
      "txt_hash": "506efaf7001a601e85ca34c4b763a2db0ad23d679aa0860bf8cf9efe85f0a865"
    }
  },
  "status": "archived"
}