Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701

CSV information ?

Status archived
Valid from 24.01.2006
Valid until 30.04.2013
Scheme 🇬🇧 UK
Manufacturer Sony Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4

Heuristics summary ?

Certificate ID: CRP240

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
DES, 3DES

Security level
EAL4, EAL1, EAL7
Certificates
CERTIFICATION REPORT No. P240

Certification process
out of scope, interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and, by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact

Standards
CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004

File metadata

Title CRP240
Subject COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL
Author CESG
Creation date D:20060208162208Z
Modification date D:20120106121536Z
Pages 24
Creator cp240_cr_1.02 - Microsoft Word
Producer Acrobat PDFWriter 5.0 for Windows NT

Security target ?

Extracted keywords

Symmetric Algorithms
DES, Triple-DES
Block cipher modes
CBC

Security level
EAL4
Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2
Security Functional Requirements (SFR)
FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RNG, FCS_IFC.1, FDP_ACF.1, FDP_ACC.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FDP_SDI.1, FDP_ITT.1.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_SDI.1.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FIA_AFL.1, FIA_UAU.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_PUT.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_MTD.3.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_PUT, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_ITT.1, FPT_PHP.3, FPT_RCV.4, FPT_RPL.1, FPT_SEP.1, FPT_TDC.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_RCV.4.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RPL.1.1, FPT_RPL.1.2, FPT_FSL.1, FRU_FLT.1, FRU_FLT.1.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1

Side-channel analysis
Physical Probing, physical probing, DPA, SPA, Malfunction, malfunction, reverse engineering, JIL

Standards
AIS 20, AIS20, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033

File metadata

Title CXD3715GG/GU-x Security Target
Subject 英文
Author katoh
Creation date D:20130430143756+01'00'
Modification date D:20130430143756+01'00'
Pages 126
Creator Microsoft® Office Word 2007
Producer Microsoft® Office Word 2007

Heuristics ?

Certificate ID: CRP240

Extracted SARs

ATE_FUN.1, ALC_TAT.1, AGD_ADM.1, AVA_VLA.2, ALC_DVS.1, AVA_SOF.1, ATE_COV.2, ALC_LCD.1, AVA_MSU.2, ADV_FSP.2, ADV_SPM.1, ATE_DPT.1, ADV_HLD.2, ADV_LLD.1, AGD_USR.1, ADV_IMP.1, ATE_IND.2, ADV_RCR.1

References ?

No references are available for this certificate.

Updates ?

  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e048e6d3ab123fc994a225e8447483412d340ae2d9fefd49bb85f31f6aa2e8b3', 'txt_hash': '62d57b56e7cd258b30c2cbddcc7cb511ff82f03ce168548d8c8b78faa9de4e29'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '68a797f917cce5fd39e92443615f9838f75119b2031613fe564b45e258ddbb04', 'txt_hash': '506efaf7001a601e85ca34c4b763a2db0ad23d679aa0860bf8cf9efe85f0a865'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 55971, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/ModDate': 'D:20120106121536Z', '/CreationDate': 'D:20060208162208Z', '/Title': 'CRP240', '/Creator': 'cp240_cr_1.02 - Microsoft Word', '/Author': 'CESG', '/Subject': 'COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL ', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 861962, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 126, '/Title': 'CXD3715GG/GU-x Security Target', '/Author': 'katoh', '/Subject': '英文', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20130430143756+01'00'", '/ModDate': "D:20130430143756+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P240': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 18, 'EAL1': 1, 'EAL7': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1, 'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and': 1, 'by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 34}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 4, 'ACM_CAP.4': 4, 'ACM_SCP.2': 6, 'ACM_CAP.3': 1}, 'ADO': {'ADO_DEL.2': 4, 'ADO_IGS.1': 4}, 'ADV': {'ADV_FSP.2': 4, 'ADV_HLD.2': 4, 'ADV_IMP.1': 5, 'ADV_LLD.1': 5, 'ADV_RCR.1': 6, 'ADV_SPM.1': 9, 'ADV_FSP.1': 7, 'ADV_HLD.1': 2}, 'AGD': {'AGD_ADM.1': 8, 'AGD_USR.1': 6}, 'ALC': {'ALC_DVS.1': 5, 'ALC_LCD.1': 4, 'ALC_TAT.1': 5}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 4}, 'AVA': {'AVA_MSU.2': 4, 'AVA_SOF.1': 4, 'AVA_VLA.2': 6}}, 'cc_sfr': {'FCS': {'FCS_RNG.1': 10, 'FCS_CKM.1': 18, 'FCS_CKM.4': 16, 'FCS_COP.1': 32, 'FCS_COP.1.1': 2, 'FCS_RNG.1.1': 10, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 2, 'FCS_RNG': 2, 'FCS_IFC.1': 2}, 'FDP': {'FDP_ACF.1': 21, 'FDP_ACC.1': 24, 'FDP_ETC.1': 9, 'FDP_IFC.1': 35, 'FDP_IFF.1': 16, 'FDP_ITC.1': 13, 'FDP_ITT.1': 13, 'FDP_UCT.1': 9, 'FDP_UIT.1': 9, 'FDP_SDI.1': 13, 'FDP_ITT.1.1': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_SDI.1.1': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1}, 'FIA': {'FIA_AFL.1': 10, 'FIA_UAU.2': 11, 'FIA_UID.1': 12, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_PUT.1': 18, 'FMT_MOF.1': 8, 'FMT_MSA.1': 13, 'FMT_MSA.2': 15, 'FMT_MSA.3': 13, 'FMT_MTD.1': 10, 'FMT_MTD.2': 9, 'FMT_MTD.3': 9, 'FMT_SMF.1': 10, 'FMT_SMR.1': 17, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_MTD.3.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_PUT': 1}, 'FPT': {'FPT_FLS.1': 30, 'FPT_ITC.1': 9, 'FPT_ITI.1': 11, 'FPT_ITT.1': 12, 'FPT_PHP.3': 11, 'FPT_RCV.4': 13, 'FPT_RPL.1': 11, 'FPT_SEP.1': 11, 'FPT_TDC.1': 9, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_FSL.1': 1}, 'FRU': {'FRU_FLT.1': 16, 'FRU_FLT.1.1': 1}, 'FTP': {'FTP_ITC': 3, 'FTP_ITC.1': 20, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 3, 'FTP_ITC.1.3': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 44}, '3DES': {'Triple-DES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical Probing': 11, 'physical probing': 8, 'DPA': 4, 'SPA': 2}, 'FI': {'Malfunction': 7, 'malfunction': 18}, 'other': {'reverse engineering': 2, 'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 20': 2, 'AIS20': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to CRP240.pdf.
    • The st_filename property was set to ST Public v1.04.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CRP240.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The st_keywords property was set to None.
    • The report_filename property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "794b142b57afbe13",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CRP240",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_RCR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VLA",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_SOF",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_MSU",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_USR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_ADM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_HLD",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_LLD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "0701"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sony Corporation",
  "manufacturer_web": "https://www.sony.com/",
  "name": "Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701",
  "not_valid_after": "2013-04-30",
  "not_valid_before": "2006-01-24",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "CRP240.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "UK": {
          "CERTIFICATION REPORT No. P240": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL1": 1,
          "EAL4": 18,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact": 1,
          "interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCIMB-2004-01-001": 1,
          "CCIMB-2004-01-002": 1,
          "CCIMB-2004-01-003": 1,
          "CCIMB-2004-01-004": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "CESG",
      "/CreationDate": "D:20060208162208Z",
      "/Creator": "cp240_cr_1.02 - Microsoft Word",
      "/ModDate": "D:20120106121536Z",
      "/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
      "/Subject": "COMMON CRITERIA CERTIFICATION REPORT No. P240  SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701  has been evaluated under the terms of the Scheme  and complies with the requirements for   EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL ",
      "/Title": "CRP240",
      "pdf_file_size_bytes": 55971,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 24
    },
    "st_filename": "ST Public v1.04.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ACM": {
          "ACM_AUT.1": 4,
          "ACM_CAP.3": 1,
          "ACM_CAP.4": 4,
          "ACM_SCP.2": 6
        },
        "ADO": {
          "ADO_DEL.2": 4,
          "ADO_IGS.1": 4
        },
        "ADV": {
          "ADV_FSP.1": 7,
          "ADV_FSP.2": 4,
          "ADV_HLD.1": 2,
          "ADV_HLD.2": 4,
          "ADV_IMP.1": 5,
          "ADV_LLD.1": 5,
          "ADV_RCR.1": 6,
          "ADV_SPM.1": 9
        },
        "AGD": {
          "AGD_ADM.1": 8,
          "AGD_USR.1": 6
        },
        "ALC": {
          "ALC_DVS.1": 5,
          "ALC_LCD.1": 4,
          "ALC_TAT.1": 5
        },
        "ATE": {
          "ATE_COV.2": 4,
          "ATE_DPT.1": 3,
          "ATE_FUN.1": 6,
          "ATE_IND.2": 4
        },
        "AVA": {
          "AVA_MSU.2": 4,
          "AVA_SOF.1": 4,
          "AVA_VLA.2": 6
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 34
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 2,
          "FCS_COP.1": 32,
          "FCS_COP.1.1": 2,
          "FCS_IFC.1": 2,
          "FCS_RNG": 2,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 10
        },
        "FDP": {
          "FDP_ACC.1": 24,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 21,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_ETC.1": 9,
          "FDP_ETC.1.1": 1,
          "FDP_ETC.1.2": 1,
          "FDP_IFC": 1,
          "FDP_IFC.1": 35,
          "FDP_IFF.1": 16,
          "FDP_IFF.1.1": 1,
          "FDP_IFF.1.2": 1,
          "FDP_IFF.1.3": 1,
          "FDP_IFF.1.4": 1,
          "FDP_IFF.1.5": 1,
          "FDP_IFF.1.6": 1,
          "FDP_ITC.1": 13,
          "FDP_ITC.1.1": 1,
          "FDP_ITC.1.2": 1,
          "FDP_ITC.1.3": 1,
          "FDP_ITT.1": 13,
          "FDP_ITT.1.1": 1,
          "FDP_SDI.1": 13,
          "FDP_SDI.1.1": 1,
          "FDP_UCT.1": 9,
          "FDP_UCT.1.1": 1,
          "FDP_UIT.1": 9,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 10,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_UAU.2": 11,
          "FIA_UAU.2.1": 1,
          "FIA_UID.1": 12,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_MOF.1": 8,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 13,
          "FMT_MSA.2": 15,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 13,
          "FMT_MSA.3.1": 1,
          "FMT_MSA.3.2": 1,
          "FMT_MTD.1": 10,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.2": 9,
          "FMT_MTD.2.1": 1,
          "FMT_MTD.2.2": 1,
          "FMT_MTD.3": 9,
          "FMT_MTD.3.1": 1,
          "FMT_PUT": 1,
          "FMT_PUT.1": 18,
          "FMT_SMF.1": 10,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 17,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPT": {
          "FPT_FLS.1": 30,
          "FPT_FSL.1": 1,
          "FPT_ITC.1": 9,
          "FPT_ITC.1.1": 1,
          "FPT_ITI.1": 11,
          "FPT_ITI.1.1": 1,
          "FPT_ITI.1.2": 1,
          "FPT_ITT.1": 12,
          "FPT_ITT.1.1": 1,
          "FPT_PHP.3": 11,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.4": 13,
          "FPT_RCV.4.1": 1,
          "FPT_RPL.1": 11,
          "FPT_RPL.1.1": 1,
          "FPT_RPL.1.2": 1,
          "FPT_SEP.1": 11,
          "FPT_SEP.1.1": 1,
          "FPT_SEP.1.2": 1,
          "FPT_TDC.1": 9,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1
        },
        "FRU": {
          "FRU_FLT.1": 16,
          "FRU_FLT.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 3,
          "FTP_ITC.1": 20,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 3,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 7,
          "malfunction": 18
        },
        "SCA": {
          "DPA": 4,
          "Physical Probing": 11,
          "SPA": 2,
          "physical probing": 8
        },
        "other": {
          "JIL": 2,
          "reverse engineering": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS20": 2
        },
        "CC": {
          "CCIMB-99-031": 1,
          "CCIMB-99-032": 1,
          "CCIMB-99-033": 1
        }
      },
      "symmetric_crypto": {
        "DES": {
          "3DES": {
            "Triple-DES": 5
          },
          "DES": {
            "DES": 44
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "katoh",
      "/CreationDate": "D:20130430143756+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Office Word 2007",
      "/ModDate": "D:20130430143756+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Office Word 2007",
      "/Subject": "\u82f1\u6587",
      "/Title": "CXD3715GG/GU-x Security Target",
      "pdf_file_size_bytes": 861962,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 126
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": []
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf",
  "scheme": "UK",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e048e6d3ab123fc994a225e8447483412d340ae2d9fefd49bb85f31f6aa2e8b3",
      "txt_hash": "62d57b56e7cd258b30c2cbddcc7cb511ff82f03ce168548d8c8b78faa9de4e29"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "68a797f917cce5fd39e92443615f9838f75119b2031613fe564b45e258ddbb04",
      "txt_hash": "506efaf7001a601e85ca34c4b763a2db0ad23d679aa0860bf8cf9efe85f0a865"
    }
  },
  "status": "archived"
}