This page was not yet optimized for use on mobile
devices.
NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2
Known vulnerabilities detected
Our automated heuristics have identified vulnerabilities that may be associated with this certificate. See the CVEs section for details.CSV information
| Status | archived |
|---|---|
| Valid from | 31.07.2013 |
| Valid until | 01.09.2019 |
| Scheme | 🇩🇪 DE |
| Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | ALC_DVS.2, ASE_TSS.2, EAL4+, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: BSI-DSZ-CC-0860-2013
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
ERROR
Convert pdf to text:
ERROR
Extract keywords:
ERROR
Certification report
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDES, CBC-MAC, CMACAsymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-HellmanHash functions
SHA-224, SHA-256Schemes
MAC, Key ExchangeRandomness
RNGEngines
SmartMXBlock cipher modes
ECB, CBCJavaCard versions
Global Platform (version 2.2.1Operating System name
JCOP 2Vendor
NXP, NXP SemiconductorsSecurity level
EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 4 augmented, ITSEC EvaluationClaims
OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_ICSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.5, ADV_FSP.6, ADV_IMP.1, ADV_IMP.2, ADV_INT.1, ADV_INT.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.5, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_PRE, AGD_OPE, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMC.5, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.1, ALC_FLR.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_TAT.3, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.1, ATE_COV.2, ATE_COV.3, ATE_DPT.1, ATE_DPT.2, ATE_DPT.3, ATE_DPT.4, ATE_FUN.1, ATE_FUN.2, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
ANSSI-CC-PP-2010/03Certificates
BSI-DSZ-CC-0860-2013, BSI-DSZ-CC-0864-2011, BSI-DSZ-CC-0707-2011, BSI-DSZ-CC-0784, BSI-DSZ-CC-0783, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0707, BSI-DSZ-CC-0864, ANSSI-CC-PP-2010/03Evaluation facilities
BrightsightSide-channel analysis
side-channel, JILCertification process
Secure Smart Card Controller Revision 2 Security Target, NXP Semiconductors Germany GmbH (confidential document) [7] Java Card System - Open Configuration Protection Profile, Version 2.6, 19 April 2010, Technical Report NXP J3D081_M59_DF, J3D081_M61_DF Secure Smart Card Controller, Brightsight (confidential document) [10] Configuration list for the TOE, Version 1.3, NXP J3D145 J2D145 J3D145 J2D145 J3D145DF Secure, Card Controller Revision 2 (confidential document) [11] Administrator manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.1, 15, 2013, Doc.No. 209431, NXP Semiconductors Germany GmbH (confidential document) [12] User manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.3, 27 February 2013, No. 209233, NXP Semiconductors Germany GmbH (confidential document) 12 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL, Box JCOP V2.4.2, Rev. 3.3, 28 February 2013, Doc.No. 22113313 , NXP Semiconductors Germany GmbH (confidential document) [14] Product hardware data sheet JCOP V2.4.2 Revision 2 J3D081_DF secure smart card controller, 3.0, 17 October 2011, Doc.No. 219530, NXP Semiconductors Germany GmbH (confidential document) [15] Certification Report, BSI-DSZ-CC-0707-2012 for NXP Secure Smart Card Controllers, with DESFire EV1 Version 1.2, 8 June 2012, T-Tystems GmbH (confidential document) [18] ETR for composition, BSI-DSZ-CC-0864, NXP Crypto library V2.7 on SmartMX, according to AIS36, v3.0, 12 December 2012, Brightsight (confidential document) 13 Please note that [6] and [8] contain incorrect references to older versions of the document 27Standards
FIPS 00, FIPS 46-3, FIPS 180-3, PKCS #1, PKCS#3, AIS 34, AIS 36, AIS 25, AIS 26, AIS 37, AIS 20, AIS 35, AIS 32, AIS 38, AIS36, SCP03Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
| Title | Certification Report BSI-DSZ-CC-0860-2013 |
|---|---|
| Subject | Common Criteria Certification |
| Keywords | "Common Criteria, Certification, Zertifizierung, NXP J3D081_M59_DF, and J3D081_M61_DF Secure Smart Card Controller Revision 2, JCOP, NXP" |
| Author | Bundesamt für Sicherheit in der Informationstechnik |
| Creation date | D:20130819095646+02'00' |
| Modification date | D:20130819095857+02'00' |
| Pages | 42 |
| Creator | Writer |
| Producer | LibreOffice 3.6 |
Frontpage
| Certificate ID | BSI-DSZ-CC-0860-2013 |
|---|---|
| Certified item | NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2 |
| Certification lab | BSI |
| Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0707-2012 - archived - NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
- BSI-DSZ-CC-0864-2012 - archived - Crypto Library V2.7 NXP Smart Card Controller P5CD081V1D and its major configurations
Security target
Extracted keywords
Symmetric Algorithms
AES, DES, TripleDES, 3DES, Triple-DES, TDES, TDEA, CMAC, CBC-MACAsymmetric Algorithms
RSA-CRT, ECDSA, ECC, DH, Diffie-HellmanHash functions
SHA-1, SHA-224, SHA-256Schemes
MAC, Key ExchangeRandomness
RNG, RNDBlock cipher modes
ECB, CBCJavaCard versions
Java Card 3.0.1, Global Platform 2.2.1, GlobalPlatform 2.2.1JavaCard API constants
TYPE_ACCESSOperating System name
JCOP 2Vendor
NXP, NXP SemiconductorsSecurity level
EAL4, EAL 4, EAL 5, EAL5, EAL 4 augmented, EAL4 augmented, EAL5 augmentedClaims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.PIN, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.API_DATA, D.CRYPTO, D.ADMIN_CONF_DATA, D.PERSO_CONF_DATA, D.DF_DATA, D.DF_CODE, D.APP_KEY, O.SCP, O.DF_TYPE-CONSISTENCY, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.REMOTE_MTHD, O.REMOTE_OBJ, O.RMI_SERVICE, O.ROR, O.EXT_MEM_INSTANCE, O.SB_SFR, O.NON_SB_SFR, O.CODE_, O.EXT_MEM_IN, O.SB_CONTENT, O.NON_SB_CONTENT, O.CIPHER, O.EXT-MEM, T.OS_OPERATE, T.SEC_BOX_BORDER, T.RND, T.DF_DATA-MODIFICATION, T.DF_IMPERSONATE, T.DF_CLONING, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-APPLI-CODE, T.INTEG-APPLI-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE, T.EXE-CODE-REMOTE, T.NATIVE, T.RESOURCES, T.DELETION, T.INSTALL, T.OBJ-DELETION, T.PHYSICAL, T.INTEG-APPLI-, T.DF_DATA_MODIFICATION, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-IC, A.DF_SECURE-VALUES, A.DF_TERMINAL-SUPPORT, A.DF_SECURE-VALUE, A.DF_TERMINAL-, A.APPLET, A.VERIFICATION, A.PPROCESS-SEC-IC, A.NATIVE, A.USE_KEY, A.PROCESS_SEC_IC, A.DF_SECURE-, R.JAVA, OT.SEC_BOX_FW, OT.IDENTIFICATION, OT.RND, OT.MF_FW, OT.DF_DATA-ACCESS, OT.DF_AUTHENTICATION, OT.DF_CONFIDENTIALITY, OT.DF_TYPE-CONSISTENCY, OT.DF_TRANSACTION, OT.DF_DATA-, OT.DF_TYPE-, OT.FIREWALL, OT.SID, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.ALARM, OT.CIPHER, OT.KEY-MNGT, OT.PIN-MNGT, OT.REMOTE, OT.TRANSACTION, OT.OBJ-DELETION, OT.DELETION, OT.LOAD, OT.INSTALL, OT.CARD-MANAGEMENT, OT.SCP, OT.EXT-MEM, OT.XYZ, OT.CARD-, OT.KEY-, OT.VERIFICATION, OP.ARRAY_ACCESS, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.GET_ROR, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.INVOKE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.RET_RORD, OP.CREATE_EXT_MEM_INSTANCE, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OP.SB_ACCESS, OP.SB_ACCESS_SFR, OE.USE_DIAG, OE.USE_KEYS, OE.PROCESS_SEC_IC, OE.NATIVE, OE.XYZ, OE.CARD-MANAGEMENT, OE.SCP, OE.VERIFICATION, OE.APPLET, OE.DF_SECURE-VALUES, OE.DF_TERMINAL-SUPPORT, OSP.PROCESS-TOE, OSP.VERIFICATIONSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_ARC.1, ADV_TDS.4, ADV_INT.2, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AGD_OPE, AGD_PRE, AGD_OPE.1, AGD_PRE.1, ALC_DEL.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.5, ALC_LCD.1, ALC_TAT.2, ALC_DVS.1, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, AVA_VAN.3, ASE_INT, ASE_TSS.2, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ASE_TSSSecurity Functional Requirements (SFR)
FAU_SAS, FAU_GEN, FAU_SAS.1, FAU_SAS.1.1, FAU_ARP.1, FAU_ARP.1.1, FAU_SAA.1, FCO_NRO, FCO_NRO.2, FCS_CKM.4, FCS_COP.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_CKM.4.1, FCS_COP, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ACC, FDP_ACC.1, FDP_ACF.1, FDP_ITC.2, FDP_ROL.1, FDP_ACC.2, FDP_IFC.1, FDP_IFF.1, FDP_RIP, FDP_RIP.1, FDP_ROL, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITC, FDP_IFC.2, FDP_UIT, FDP_UIT.1, FDP_ITC.1, FIA_UID.2, FIA_UAU.2, FIA_UAU.5, FIA_AFL, FIA_ATD, FIA_ATD.1, FIA_UID, FIA_USB, FIA_USB.1, FIA_UID.1, FIA_AFL.1, FIA_UAU.1, FMT_MSA, FMT_SMF, FMT_REV, FMT_SMR, FMT_SMR.1, FMT_MSA.3, FMT_MSA.1, FMT_SMF.1, FMT_MTD.1, FMT_MSA.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD, FMT_MTD.3, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS, FPT_PHP, FPT_RPL.1, FPT_TDC.1, FPT_FLS.1, FPT_FLS.1.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV, FPT_RCV.3, FPT_PHP.3, FPT_ITC.1, FRU_FLT, FRU_FLT.2, FTP_TRP.1, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP-0035-2007―, BSI-PP-0035, BSI-PP-0017, BSI-PP-0035-2007Certificates
BSI-DSZ-CC-0860, BSI-DSZ-CC-0864, BSI-DSZ-CC-0707, CC-0707Side-channel analysis
physical probing, side channel, side-channel, side-channels, DPA, SPA, timing attacks, timing attack, physical tampering, Physical tampering, malfunction, DFA, Fault InjectionCertification process
out of scope, Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG, a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT areStandards
FIPS 186-3, FIPS 180-3, FIPS 197, FIPS 46-3, FIPS PUB 180-3, FIPS PUB 186-2, FIPS PUB 81, FIPS PUB 186-3, PKCS #1, PKCS#3, PKCS#1, PKCS1, AIS20, AIS 20, AIS31, RFC 5639, ISO/IEC 9796-, ISO/IEC 15946-1, ISO/IEC 11770, ICAO, SCP01, SCP02, SCP03, CCMB-2009-07-004Technical reports
BSI TR-02102File metadata
| Title | NXP J3D081_M59_DF, and J3D081_M61_DF Secure Smart Card Controller Revision 2 |
|---|---|
| Subject | Security Target Lite |
| Keywords | JCOP, ST, Security Target Lite |
| Author | NXP Semiconductors |
| Creation date | D:20130909160805Z |
| Modification date | D:20130909161018+02'00' |
| Pages | 143 |
| Creator | Microsoft® Office Word 2007 |
| Producer | Microsoft® Office Word 2007 |
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
BSI-DSZ-CC-0860-2013Extracted SARs
ADV_ARC.1, ADV_FSP.5, ADV_IMP.1, ADV_INT.2, ADV_SPM.1, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_FLR.3, ALC_LCD.1, ALC_TAT.2, APE_CCL.1, APE_ECD.1, APE_INT.1, APE_OBJ.2, APE_REQ.2, APE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.2, ATE_COV.2, ATE_DPT.3, ATE_FUN.1, ATE_IND.2, AVA_VAN.5CPE matches
Related CVEs
| ID | Links | Severity | CVSS Score | Published on | ||
|---|---|---|---|---|---|---|
| Base | Exploitability | Impact | ||||
| CVE-2021-3011 | MEDIUM | 4.2 | 3.6 | 07.01.2021 | ||
Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NXP J3D081_M59, J2D081_M59, J3D081_M61, J2D081_M61 Secure Smart Card Controller of JCOP V2.4.2 R2 | BSI-DSZ-CC-0784-2013 | Compare |
| NXP J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60 Secure Smart Card Controller of JCOP V2.4.2 R2 | BSI-DSZ-CC-0783-2013 | Compare |
| NXP J3A080 v2.4.1 Secure Smart Card Controller (JCOP v2.4.1) | BSI-DSZ-CC-0515-2009 | Compare |
| NXP Secure Smart Card Controller P6021y VB including IC Dedicated Software --- The certificate comprises four major c... | BSI-DSZ-CC-0955-V2-2016 | Compare |
| NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major c... | BSI-DSZ-CC-0973-V2-2016 | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "9c4abfb7ef7e0f82",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0860-2013",
"cert_lab": [
"BSI"
],
"cpe_matches": {
"_type": "Set",
"elements": [
"cpe:2.3:h:nxp:j3d081_m61_df:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nxp:j3d081_m59_df:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nxp:j3d081_m59:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nxp:j3d081_m61:-:*:*:*:*:*:*:*"
]
},
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"2.4.2"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"85bef5b6f16c4d33"
]
},
"related_cves": {
"_type": "Set",
"elements": [
"CVE-2021-3011"
]
},
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0864-2012",
"BSI-DSZ-CC-0707-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0864-2012",
"BSI-DSZ-CC-0707-2012",
"BSI-DSZ-CC-0555-2009",
"BSI-DSZ-CC-0633-2010"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2",
"not_valid_after": "2019-09-01",
"not_valid_before": "2013-07-31",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0860a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0860-2013",
"cert_item": "NXP J3D081_M59_DF and J3D081_M61_DF Secure Smart Card Controller Revision 2 of JCOP V2.4.2 R2",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 2
},
"ECDH": {
"ECDH": 1
},
"ECDSA": {
"ECDSA": 1
}
},
"FF": {
"DH": {
"Diffie-Hellman": 3
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0707": 1,
"BSI-DSZ-CC-0707-2011": 1,
"BSI-DSZ-CC-0707-2012": 1,
"BSI-DSZ-CC-0783": 1,
"BSI-DSZ-CC-0784": 1,
"BSI-DSZ-CC-0860-2013": 24,
"BSI-DSZ-CC-0864": 1,
"BSI-DSZ-CC-0864-2011": 1,
"BSI-DSZ-CC-0864-2012": 1
},
"FR": {
"ANSSI-CC-PP-2010/03": 4
}
},
"cc_claims": {
"OE": {
"OE.PROCESS_SEC_IC": 1,
"OE.USE_DIAG": 1,
"OE.USE_KEYS": 1
}
},
"cc_protection_profile_id": {
"ANSSI": {
"ANSSI-CC-PP-2010/03": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 1,
"ADV_SPM": 1,
"ADV_SPM.1": 1,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 1,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 2,
"AGD_OPE.1": 1,
"AGD_PRE": 2,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 2,
"ALC_CMC.5": 1,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 2,
"ALC_CMS.5": 1,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 7,
"ALC_FLR": 1,
"ALC_FLR.1": 1,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 2,
"ALC_TAT.2": 1,
"ALC_TAT.3": 1
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 1,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 1,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 7,
"EAL 4 augmented": 3,
"EAL 5": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"2013, Doc.No. 209431, NXP Semiconductors Germany GmbH (confidential document) [12] User manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.3, 27 February 2013": 1,
"3.0, 17 October 2011, Doc.No. 219530, NXP Semiconductors Germany GmbH (confidential document) [15] Certification Report, BSI-DSZ-CC-0707-2012 for NXP Secure Smart Card Controllers": 1,
"Box JCOP V2.4.2, Rev. 3.3, 28 February 2013, Doc.No. 22113313 , NXP Semiconductors Germany GmbH (confidential document) [14] Product hardware data sheet JCOP V2.4.2 Revision 2 J3D081_DF secure smart card controller": 1,
"Card Controller Revision 2 (confidential document) [11] Administrator manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.1, 15": 1,
"No. 209233, NXP Semiconductors Germany GmbH (confidential document) 12 specifically \u2022 AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
"Secure Smart Card Controller Revision 2 Security Target, NXP Semiconductors Germany GmbH (confidential document) [7] Java Card System - Open Configuration Protection Profile, Version 2.6, 19 April 2010": 1,
"Technical Report NXP J3D081_M59_DF, J3D081_M61_DF Secure Smart Card Controller, Brightsight (confidential document) [10] Configuration list for the TOE, Version 1.3, NXP J3D145 J2D145 J3D145 J2D145 J3D145DF Secure": 1,
"according to AIS36, v3.0, 12 December 2012, Brightsight (confidential document) 13 Please note that [6] and [8] contain incorrect references to older versions of the document 27": 1,
"with DESFire EV1 Version 1.2, 8 June 2012, T-Tystems GmbH (confidential document) [18] ETR for composition, BSI-DSZ-CC-0864, NXP Crypto library V2.7 on SmartMX": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 6
},
"ECB": {
"ECB": 4
}
},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 2
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 2
},
"MAC": {
"MAC": 6
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"BrightSight": {
"Brightsight": 8
}
},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-224": 1,
"SHA-256": 1
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {
"GlobalPlatform": {
"Global Platform (version 2.2.1": 1
}
},
"os_name": {
"JCOP": {
"JCOP 2": 5
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 2
}
},
"side_channel_analysis": {
"SCA": {
"side-channel": 1
},
"other": {
"JIL": 6
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS 25": 2,
"AIS 26": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 3,
"AIS 37": 1,
"AIS 38": 1,
"AIS36": 1
},
"FIPS": {
"FIPS 00": 1,
"FIPS 180-3": 1,
"FIPS 46-3": 3
},
"PKCS": {
"PKCS #1": 3,
"PKCS#3": 1
},
"SCP": {
"SCP03": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 9
}
},
"DES": {
"3DES": {
"TDES": 3,
"Triple-DES": 4
},
"DES": {
"DES": 2
}
},
"constructions": {
"MAC": {
"CBC-MAC": 4,
"CMAC": 2
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 28,
"NXP Semiconductors": 19
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20130819095646+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP J3D081_M59_DF, and J3D081_M61_DF Secure Smart Card Controller Revision 2, JCOP, NXP\"",
"/ModDate": "D:20130819095857+02\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "Common Criteria Certification",
"/Title": "Certification Report BSI-DSZ-CC-0860-2013",
"pdf_file_size_bytes": 1027140,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
},
"st_filename": "0860b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 19
},
"ECDSA": {
"ECDSA": 3
}
},
"FF": {
"DH": {
"DH": 1,
"Diffie-Hellman": 5
}
},
"RSA": {
"RSA-CRT": 1
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0707": 2,
"BSI-DSZ-CC-0860": 2,
"BSI-DSZ-CC-0864": 3
},
"NL": {
"CC-0707": 2
}
},
"cc_claims": {
"A": {
"A.APPLET": 4,
"A.DF_SECURE-": 1,
"A.DF_SECURE-VALUE": 1,
"A.DF_SECURE-VALUES": 4,
"A.DF_TERMINAL-": 1,
"A.DF_TERMINAL-SUPPORT": 4,
"A.NATIVE": 1,
"A.PPROCESS-SEC-IC": 1,
"A.PROCESS-SEC-IC": 2,
"A.PROCESS_SEC_IC": 2,
"A.USE_DIAG": 7,
"A.USE_KEY": 1,
"A.USE_KEYS": 6,
"A.VERIFICATION": 3
},
"D": {
"D.ADMIN_CONF_DATA": 3,
"D.API_DATA": 3,
"D.APP_CODE": 10,
"D.APP_C_DATA": 3,
"D.APP_I_DATA": 8,
"D.APP_KEY": 1,
"D.CRYPTO": 7,
"D.DF_CODE": 1,
"D.DF_DATA": 1,
"D.JCS_CODE": 3,
"D.JCS_DATA": 5,
"D.PERSO_CONF_DATA": 4,
"D.PIN": 12,
"D.SEC_DATA": 7
},
"O": {
"O.APPLET": 18,
"O.CIPHER": 1,
"O.CODE_": 1,
"O.CODE_PKG": 13,
"O.DF_TYPE-CONSISTENCY": 1,
"O.EXT-MEM": 1,
"O.EXT_MEM_IN": 2,
"O.EXT_MEM_INSTANCE": 8,
"O.JAVAOBJECT": 36,
"O.NON_SB_CONTENT": 1,
"O.NON_SB_SFR": 4,
"O.REMOTE_MTHD": 4,
"O.REMOTE_OBJ": 4,
"O.RMI_SERVICE": 5,
"O.ROR": 2,
"O.SB_CONTENT": 3,
"O.SB_SFR": 5,
"O.SCP": 1
},
"OE": {
"OE.APPLET": 7,
"OE.CARD-MANAGEMENT": 1,
"OE.DF_SECURE-VALUES": 4,
"OE.DF_TERMINAL-SUPPORT": 1,
"OE.NATIVE": 1,
"OE.PROCESS_SEC_IC": 6,
"OE.SCP": 2,
"OE.USE_DIAG": 9,
"OE.USE_KEYS": 7,
"OE.VERIFICATION": 20,
"OE.XYZ": 1
},
"OP": {
"OP.ARRAY_ACCESS": 4,
"OP.CREATE": 7,
"OP.CREATE_EXT_MEM_INSTANCE": 3,
"OP.DELETE_APPLET": 4,
"OP.DELETE_PCKG": 3,
"OP.DELETE_PCKG_APPLET": 3,
"OP.GET_ROR": 2,
"OP.INSTANCE_FIELD": 4,
"OP.INVK_INTERFACE": 6,
"OP.INVK_VIRTUAL": 5,
"OP.INVOKE": 3,
"OP.JAVA": 5,
"OP.PUT": 6,
"OP.READ_EXT_MEM": 3,
"OP.RET_RORD": 2,
"OP.SB_ACCESS": 3,
"OP.SB_ACCESS_SFR": 3,
"OP.THROW": 4,
"OP.TYPE_ACCESS": 4,
"OP.WRITE_EXT_MEM": 3
},
"OSP": {
"OSP.PROCESS-TOE": 5,
"OSP.VERIFICATION": 3
},
"OT": {
"OT.ALARM": 15,
"OT.CARD-": 2,
"OT.CARD-MANAGEMENT": 17,
"OT.CIPHER": 11,
"OT.DELETION": 7,
"OT.DF_AUTHENTICATION": 7,
"OT.DF_CONFIDENTIALITY": 8,
"OT.DF_DATA-": 1,
"OT.DF_DATA-ACCESS": 8,
"OT.DF_TRANSACTION": 8,
"OT.DF_TYPE-": 1,
"OT.DF_TYPE-CONSISTENCY": 5,
"OT.EXT-MEM": 14,
"OT.FIREWALL": 18,
"OT.GLOBAL_ARRAYS_CONFID": 9,
"OT.GLOBAL_ARRAYS_INTEG": 10,
"OT.IDENTIFICATION": 10,
"OT.INSTALL": 10,
"OT.KEY-": 1,
"OT.KEY-MNGT": 9,
"OT.LOAD": 9,
"OT.MF_FW": 8,
"OT.NATIVE": 9,
"OT.OBJ-DELETION": 8,
"OT.OPERATE": 21,
"OT.PIN-MNGT": 11,
"OT.REALLOCATION": 9,
"OT.REMOTE": 8,
"OT.RESOURCES": 10,
"OT.RND": 12,
"OT.SCP": 40,
"OT.SEC_BOX_FW": 11,
"OT.SID": 13,
"OT.TRANSACTION": 9,
"OT.VERIFICATION": 1,
"OT.XYZ": 1
},
"R": {
"R.JAVA": 12
},
"T": {
"T.CONFID-APPLI-DATA": 5,
"T.CONFID-JCS-CODE": 5,
"T.CONFID-JCS-DATA": 5,
"T.DELETION": 4,
"T.DF_CLONING": 6,
"T.DF_DATA-MODIFICATION": 5,
"T.DF_DATA_MODIFICATION": 1,
"T.DF_IMPERSONATE": 6,
"T.EXE-CODE": 8,
"T.EXE-CODE-REMOTE": 4,
"T.INSTALL": 4,
"T.INTEG-APPLI-": 2,
"T.INTEG-APPLI-CODE": 8,
"T.INTEG-APPLI-DATA": 8,
"T.INTEG-JCS-CODE": 5,
"T.INTEG-JCS-DATA": 5,
"T.NATIVE": 5,
"T.OBJ-DELETION": 4,
"T.OS_OPERATE": 7,
"T.PHYSICAL": 4,
"T.RESOURCES": 4,
"T.RND": 7,
"T.SEC_BOX_BORDER": 7,
"T.SID": 8
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0017": 2,
"BSI-PP-0035": 2,
"BSI-PP-0035-2007": 1,
"BSI-PP-0035-2007\u2015": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 1,
"ADV_FSP.5": 1,
"ADV_IMP.1": 1,
"ADV_INT.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 4,
"AGD_PRE": 1,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.5": 1,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_DVS.2": 8,
"ALC_LCD.1": 1,
"ALC_TAT.2": 1
},
"ASE": {
"ASE_CCL": 2,
"ASE_CCL.1": 1,
"ASE_ECD": 2,
"ASE_ECD.1": 1,
"ASE_INT": 2,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ": 2,
"ASE_REQ.2": 1,
"ASE_SPD": 2,
"ASE_SPD.1": 1,
"ASE_TSS": 2,
"ASE_TSS.1": 3,
"ASE_TSS.2": 8
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.3": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 2,
"AVA_VAN.5": 9
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 4 augmented": 2,
"EAL 5": 1,
"EAL4": 19,
"EAL4 augmented": 1,
"EAL5": 1,
"EAL5 augmented": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_ARP.1": 29,
"FAU_ARP.1.1": 1,
"FAU_GEN": 1,
"FAU_SAA.1": 2,
"FAU_SAS": 13,
"FAU_SAS.1": 5,
"FAU_SAS.1.1": 1
},
"FCO": {
"FCO_NRO": 7,
"FCO_NRO.2": 3
},
"FCS": {
"FCS_CKM.1": 46,
"FCS_CKM.1.1": 1,
"FCS_CKM.2": 10,
"FCS_CKM.2.1": 1,
"FCS_CKM.3": 7,
"FCS_CKM.3.1": 1,
"FCS_CKM.4": 47,
"FCS_CKM.4.1": 1,
"FCS_COP": 35,
"FCS_COP.1": 37,
"FCS_RNG": 3,
"FCS_RNG.1": 19,
"FCS_RNG.1.1": 2,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC": 72,
"FDP_ACC.1": 24,
"FDP_ACC.2": 9,
"FDP_ACF": 65,
"FDP_ACF.1": 44,
"FDP_IFC": 25,
"FDP_IFC.1": 17,
"FDP_IFC.2": 2,
"FDP_IFF": 20,
"FDP_IFF.1": 13,
"FDP_ITC": 10,
"FDP_ITC.1": 17,
"FDP_ITC.2": 27,
"FDP_RIP": 91,
"FDP_RIP.1": 10,
"FDP_ROL": 11,
"FDP_ROL.1": 10,
"FDP_SDI.2": 8,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1,
"FDP_UIT": 7,
"FDP_UIT.1": 2
},
"FIA": {
"FIA_AFL": 12,
"FIA_AFL.1": 2,
"FIA_ATD": 9,
"FIA_ATD.1": 2,
"FIA_UAU.1": 3,
"FIA_UAU.2": 4,
"FIA_UAU.5": 4,
"FIA_UID": 18,
"FIA_UID.1": 11,
"FIA_UID.2": 6,
"FIA_USB": 8,
"FIA_USB.1": 3
},
"FMT": {
"FMT_MSA": 146,
"FMT_MSA.1": 21,
"FMT_MSA.2": 3,
"FMT_MSA.3": 32,
"FMT_MTD": 18,
"FMT_MTD.1": 7,
"FMT_MTD.3": 1,
"FMT_REV": 1,
"FMT_SMF": 42,
"FMT_SMF.1": 29,
"FMT_SMF.1.1": 1,
"FMT_SMR": 35,
"FMT_SMR.1": 39,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPR": {
"FPR_UNO.1": 9,
"FPR_UNO.1.1": 1
},
"FPT": {
"FPT_FLS": 40,
"FPT_FLS.1": 25,
"FPT_FLS.1.1": 1,
"FPT_ITC.1": 1,
"FPT_PHP": 6,
"FPT_PHP.3": 3,
"FPT_RCV": 10,
"FPT_RCV.3": 4,
"FPT_RPL.1": 6,
"FPT_TDC.1": 11,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT": 11,
"FRU_FLT.2": 1
},
"FTP": {
"FTP_ITC": 18,
"FTP_ITC.1": 6,
"FTP_TRP.1": 8
}
},
"certification_process": {
"OutOfScope": {
"Groups marked with \u2017IT\u2018 are considered in the TOE IT environment, and groups marked with \u2017\u2014\u2017 are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG": 1,
"a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are": 1,
"out of scope": 2
}
},
"cipher_mode": {
"CBC": {
"CBC": 24
},
"ECB": {
"ECB": 5
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {
"KEX": {
"Key Exchange": 1
},
"MAC": {
"MAC": 13
}
},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA1": {
"SHA-1": 13
},
"SHA2": {
"SHA-224": 8,
"SHA-256": 14
}
}
},
"ic_data_group": {},
"javacard_api_const": {
"misc": {
"TYPE_ACCESS": 5
}
},
"javacard_packages": {
"java": {
"java.lang": 1,
"java.rmi": 2
},
"javacard": {
"javacard.framework": 4,
"javacard.framework.applet": 1,
"javacard.security": 4
},
"javacardx": {
"javacardx.crypto": 2,
"javacardx.rmi": 1,
"javacardx.security": 1
}
},
"javacard_version": {
"GlobalPlatform": {
"Global Platform 2.2.1": 1,
"GlobalPlatform 2.2.1": 2
},
"JavaCard": {
"Java Card 3.0.1": 4
}
},
"os_name": {
"JCOP": {
"JCOP 2": 149
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 21,
"RNG": 13
}
},
"side_channel_analysis": {
"FI": {
"DFA": 7,
"Fault Injection": 1,
"Physical tampering": 3,
"malfunction": 5,
"physical tampering": 1
},
"SCA": {
"DPA": 10,
"SPA": 2,
"physical probing": 3,
"side channel": 15,
"side-channel": 1,
"side-channels": 2,
"timing attack": 1,
"timing attacks": 6
}
},
"standard_id": {
"BSI": {
"AIS 20": 7,
"AIS20": 2,
"AIS31": 1
},
"CC": {
"CCMB-2009-07-004": 1
},
"FIPS": {
"FIPS 180-3": 6,
"FIPS 186-3": 5,
"FIPS 197": 2,
"FIPS 46-3": 1,
"FIPS PUB 180-3": 1,
"FIPS PUB 186-2": 1,
"FIPS PUB 186-3": 1,
"FIPS PUB 81": 2
},
"ICAO": {
"ICAO": 4
},
"ISO": {
"ISO/IEC 11770": 2,
"ISO/IEC 15946-1": 1,
"ISO/IEC 9796-": 1
},
"PKCS": {
"PKCS #1": 1,
"PKCS#1": 2,
"PKCS#3": 2,
"PKCS1": 1
},
"RFC": {
"RFC 5639": 2
},
"SCP": {
"SCP01": 1,
"SCP02": 1,
"SCP03": 2
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 24
}
},
"DES": {
"3DES": {
"3DES": 1,
"TDEA": 1,
"TDES": 2,
"Triple-DES": 7,
"TripleDES": 1
},
"DES": {
"DES": 18
}
},
"constructions": {
"MAC": {
"CBC-MAC": 7,
"CMAC": 5
}
}
},
"technical_report_id": {
"BSI": {
"BSI TR-02102": 2
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 156,
"NXP Semiconductors": 21
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "NXP Semiconductors",
"/CreationDate": "D:20130909160805Z",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/Keywords": "JCOP, ST, Security Target Lite",
"/ModDate": "D:20130909161018+02\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "Security Target Lite",
"/Title": "NXP J3D081_M59_DF, and J3D081_M61_DF Secure Smart Card Controller Revision 2",
"pdf_file_size_bytes": 1619732,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 143
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0860a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"AVA_VAN.5",
"ASE_TSS.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0860b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "3339a3481a8c49b11d7e04b5069d6c0a5a020df2b0f30c09be6cb265e73f5e13",
"txt_hash": "8c02af43a355370a0d697ef238cb1d68ceae46468ef2564074a85df239ed978a"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "d3f56db1f1556088125f12f81d8491a1dd9f487e07aed5f3e07d7596301180f7",
"txt_hash": "eacca2494caafcb405cb7b113f4405046a951e17eccbb494720fd0940fe238dc"
}
},
"status": "archived"
}