NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2,JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2

CSV information

Status active
Valid from 29.08.2025
Valid until 29.08.2030
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Netherlands N.V.
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL4, AVA_VAN.5, ALC_DVS.2, ALC_FLR.2
Protection profiles

Heuristics summary

Certificate ID: NSCIB-CC-3110-2025-08-2500053-01-CR

Certificate

Extracted keywords

Operating System name
JCOP 8, JCOP 9
Vendor
NXP, NXP Semiconductors

Security level
EAL2, EAL4, EAL4 augmented
Security Assurance Requirements (SAR)
ALC_FLR.3, ALC_DVS.2, ALC_FLR.2, AVA_VAN.5
Protection profiles
BSI-CC-PP-0099-V3-2024, BSI-CCPP-0100-V2-2025
Evaluation facilities
TÜV Informationstechnik

Standards
ISO/IEC 15408-1, ISO/IEC 18045:2022

File metadata

Author V T
Creation date D:20250829195038+01'00'
Modification date D:20250829195038+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, SEED, HMAC, CBC-MAC
Asymmetric Algorithms
ECDH, ECDSA, EdDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Block cipher modes
ECB, CBC, CTR, CFB, GCM

JavaCard versions
Java Card 3.1, GlobalPlatform 2.3.1
Operating System name
JCOP 8, JCOP 9, JCOP9
Trusted Execution Environments
SE
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmented
Claims
A.PROCESS-SEC-IC, A.USE_DIAG, A.USE_KEYS, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.TRUSTED-GUESTOS, A.APPSPROVIDER
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ADV_COMP.1, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, ATE_COMP.1, AVA_VAN.5, AVA_VAN, AVA_COMP.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.2, ASE_ECD.1
Protection profiles
BSI-CC-PP- 0100-V2-2025, BSI-CC-PP-0099-V3-2024, BSI-CCPP-0100-V2-2025
Certificates
NSCIB-2200030-02-CR, NSCIB-CC-2200030-02
Evaluation facilities
TÜV Informationstechnik, Deutsche Telekom Security

Side-channel analysis
JIL, JIL-AAPS, JIL-COMP
Certification process
out of scope, algorithms, protocols and implementations: ECDAA, Korean SEED, MIFARE and FeliCa, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have

Standards
AIS31, ISO/IEC 17065, ISO/IEC 17025

File metadata

Title Certification Report - EUCC
Author sjon
Creation date D:20250829200815+01'00'
Modification date D:20250829200815+01'00'
Pages 22
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID EUCC-3110-2025-08-2500053-01-CR
Certified item NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2, JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2
Certification lab TÜV Informationstechnik GmbH
Developer NXP Semiconductors Netherlands N.V

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, 3DES, TDES, TripleDES, HMAC, CBC-MAC, CMAC
Asymmetric Algorithms
RSA 1024, RSA-CRT, ECDH, ECDSA, EdDSA, ECC, DH, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Randomness
TRNG, RND, RNG
Libraries
Crypto Library ..................................................10
Elliptic Curves
P-256, NIST P-256, brainpoolP256r1, Curve25519, Ed25519, Ed448
Block cipher modes
ECB, CBC, CTR, CFB, GCM, CCM, XTS

JavaCard versions
Java Card 3.1, JC3.1, GlobalPlatform 2.3.1
JavaCard API constants
ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_CBC_PKCS5, ALG_DES_ECB_PKCS5, ALG_DES_CBC_PKCS7, ALG_DES_ECB_PKCS7, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_NOPAD, ALG_DES_MAC4_PKCS5, ALG_DES_MAC8_PKCS5, ALG_DES_CMAC8, ALG_RSA_NOPAD, ALG_RSA_PKCS1, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_ISO9797_M2_STANDARD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_ECB_PKCS5, ALG_AES_CBC_PKCS7, ALG_AES_ECB_PKCS7, ALG_AES_CBC_ISO9797_STANDARD, ALG_AES_CFB, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC8, ALG_AES_CMAC16, ALG_AES_CMAC16_STANDARD, ALG_AES_CMAC_128, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA_224, ALG_XDH, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_AES_CMAC8, SIG_CIPHER_AES_CMAC16, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_DES_CMAC8, PAD_PKCS1_OAEP, TYPE_ACCESS, LENGTH_DES3_2KEY, LENGTH_DES3_3KEY, LENGTH_AES_128, LENGTH_AES_192, LENGTH_AES_256, LENGTH_EC_FP_128, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_FP_528, LENGTH_EC_FP_384, LENGTH_SHA, LENGTH_SHA_224, LENGTH_SHA_256, LENGTH_SHA_384, LENGTH_SHA_512, LENGTH_RSA_1024, FRP256V1
Operating System name
JCOP 8, JCOP 9, JCOP9, JCOP8
Trusted Execution Environments
SE
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL4 augmented
Claims
D.UPDATE_IMAGE, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.PIN, D.APSD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.CARD_MNGT_DATA, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG_ITEM, D.RESTRICTED_MODE_, D.TOE_IDENTIFIER, D.SEC_, D.APP_I_, D.APP_C_, D.APP_, D.RESTRICTED_MODE_STATE, D.TOE_IDENTIFICATION, D.UPDATE_, D.TOE_, D.PROFILE_, O.REMOTE, O.BIO-MNGT, O.EXT-MEM, O.SENSITIVE_ARRAYS_INTEG, O.SENSITIVE_RESULTS_INTEG, O.LOAD, O.INSTALL, O.DELETION, O.APPLET, O.CODE_CAP_FILE, O.JAVAOBJECT, O.APPLET_LOADED, O.APPLET_CURRENT, O.APPLET_, O.CODE_CAP_, T.RND, T.CONFID-UPDATE-IMAGE, T.INTEG-UPDATE-IMAGE, T.UNAUTH-LOAD-UPDATE-IMAGE, T.INTERRUPT-OSU, T.CONFIG, T.COM_EXPLOIT, T.LIFE_CYCLE, T.UNAUTHORIZED_CARD_MNGT, T.INTEG-APPLI-DATA, T.RESTRICTED-MODE, T.CONFID-CONT, T.INTEG-CONT, T.EXE-CONT, T.CONT-DOS, T.CONT-SID, T.INTEG-CODE, T.RESTRICTED-, T.INSTALL, T.DELETION, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.INTEG-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-JCS-DATA, T.INTEG-APPLI-CODE, T.EXE-CODE, T.NATIVE, T.SID, T.INTEG-APPLI-, T.RESOURCES, T.UNAUTHORIZED_CARD_, T.OBJ-DELETION, T.PHYSICAL, T.UNAUTH-LOAD-UPDATE-, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-IC, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.TRUSTED-GUESTOS, A.DELETION, A.CAP_FILE, A.VERIFICATION, A.VERIFICATION-, R.JAVA, OT.IDENTIFICATION, OT.CONFID-UPDATE-IMAGE, OT.AUTH-LOAD-UPDATE-IMAGE, OT.SECURE_LOAD_ACODE, OT.SECURE_AC_ACTIVATION, OT.TOE_IDENTIFICATION, OT.CARD-CONFIGURATION, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OT.DOMAIN-RIGHTS, OT.APPLI-AUTH, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.CONT_SEP, OT.CONT_PRIV, OT.CONT_DOS, OT.RND, OT.SCP, OT.CARD-MANAGEMENT, OT.INSTALL, OT.LOAD, OT.DELETION, OT.SENSITIVE_RESULTS_INTEG, OT.FIREWALL, OT.SID, OT.GLOBAL_ARRAYS_, OT.ARRAY_VIEW_CONFID, OT.ARRAY_VIEW_INTEG, OT.SENSITIVE_RESULTS_, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.ALARM, OT.CIPHER, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.COMM_, OT.CONFID-UPDATE-, OT.AUTH-LOAD-UPDATE-, OT.SECURE_LOAD_, OT.SECURE_AC_, OT.ARRAY_VIEWS_CONFID, OT.ARRAY_VIEWS_INTEG, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.CONT-SEP, OT.CONT-PRIV, OT.CONT-DOS, OT.SECURE-CHANNELS, OT.INTERNALSECURE-, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_T_ALOAD, OP.ARRAY_T_ASTORE, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_CAP_FILE, OP.DELETE_CAP_FILE_, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.ARRAY_, OP.THROW, OP.TYPE_ACCESS, OP.PUT, OP.READ_CONFIG_ITEM, OP.MODIFY_CONFIG_ITEM, OP.USE_CONFIG_ITEM, OP.TRIGGER_UPDATE, OP.CONT_ACCESS, OP.PUTFIELD, OP.PUTSTATIC, OP.DELETE_CAP_FILE_APPLET, OE.USE_DIAG, OE.USE_KEYS, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.PROCESS_SEC_IC, OE.CONFID-UPDATE-IMAGE, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.TRUSTED-GUESTOS, OE.IC, OE.RE, OE.VERIFICATION-, OE.CONFID-UPDATE-, OE.CODE-, SA.CONFID-UPDATE-, SA.CONFID-APPLI-DATA, SA.CONFID-JCS-CODE, SA.CONFID-JCS-DATA, SA.INTEG-UPDATE-IMAGE, SA.INTEG-APPLI-CODE, SA.INTEG-APPLI-DATA, SA.INTEG-JCS-CODE, SA.EXE-APPLI-CODE, SA.EXE-JCS-CODE, SA.NATIVE, SA.FIREWALL, SA.VERIFICATION, SA.CARD-MANAGEMENT, SA.INSTALL, SA.SID, SA.OBJ-DELETION, SA.DELETION, SA.ALARM, SA.OPERATE, SA.RESOURCES, SA.CIPHER, SA.KEY-MNGT, SA.PIN-MNGT, SA.SCP, SA.TRANSACTION, SA.CONFIG-APPLET, SA.OSU, SA.RM, SA.CONTEXT-SEPARATION, SA.INTEG-JCS-DATA, SA.EXE-JCS-, SA.CONFID-UPDATE-IMAGE, SA.KEY-, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.VERIFICATION
Security Assurance Requirements (SAR)
AGD_OPE.1, ALC_DVS.2, ALC_FLR.2, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FCO_NRO, FCO_NRO.2, FCO_NRO.1, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.1, FCS_COP.1, FCS_RNG.1, FCS_CKM.2, FCS_CKM.5, FCS_RBG.1, FCS_CKM.6, FCS_CKM.1.1, FCS_CKM.6.1, FCS_CKM.6.2, FCS_COP.1.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2.1, FCS_CKM.3, FCS_CKM.3.1, FCS_RNG.2, FDP_ACF.1, FDP_IFC, FDP_IFF, FDP_ACC, FDP_ACF, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1, FDP_UIT, FDP_UIT.1, FDP_ROL.1, FDP_ACC.1, FDP_ACC.2, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ROL.1.2, FDP_ROL.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ACC.1.1, FDP_IFC.2.1, FDP_IFC.2.2, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_ATD.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_SMF, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_EMS.1, FPT_EMS.1.1, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0084, BSI-CC-PP-0099-V3-2024, BSI-CC-PP-0084-2014, BSI-CC-PP-0100-V2-2025
Certificates
NSCIB-CC-2200030-02

Side-channel analysis
physical probing, side channel, side-channel, DPA, SPA, timing attacks, timing attack, Physical Tampering, physical tampering, malfunction, DFA, Fault Injection, JIL

Standards
FIPS 140-3, FIPS 197, FIPS PUB 186-3, AIS20, AIS31, AIS 20, RFC 5639, RFC 8032, RFC 7748, ISO/IEC 7816, SCP03, SCP80, SCP81, CCMB-2022-11-001, CCMB-2022-11-002, CCMB-2022-11-003, CCMB-2022-11-004, CCMB-2022-11-005, CCMB-2022-11-006
Technical reports
BSI TR-03111

File metadata

Title Security Target Lite
Subject NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Series - Secure Element
Keywords NXP, ASE, JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented
Author NXP B.V.
Creation date D:20250826111917+02'00'
Pages 163
Creator DITA Open Toolkit 3.7 - NDF 08012025
Producer Apache FOP Version 2.6

References

Outgoing

Heuristics

Certificate ID: NSCIB-CC-3110-2025-08-2500053-01-CR

Extracted SARs

ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_COMP.1, ALC_DEL.1, ALC_DVS.2, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_SPD.1, ATE_COMP.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_COMP.1, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2 NSCIB-CC-2200043-05-CR Compare
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2 NSCIB-CC-2300100-01-CR Compare
NXP JCOP 8.x/9.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1, JCOP 9.0 R1.07.0.1 NSCIB-CC-2200041-03-CR Compare
NXP JCOP 8.x with eUICC extension on SN300 B2 Secure Element, version JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2 NSCIB-CC-2200043-04-CR Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2, JCOP 7.3 R1.07.0.2 NSCIB-CC-3110-2025-08-2500052-01-CR Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1 NSCIB-CC-2200041-02-CR Compare
NXP JCOP 7.x on SN300 Secure Element, versions JCOP 7.0 R1.62.0.1, JCOP 7.1 R1.04.0.1 and JCOP 7.2 R1.09.0.1 NSCIB-CC-2300065-02-CR Compare
NXP JCOP8.x on SE310 A0 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1 NSCIB-CC-2200042-02-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, version JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
NXP JCOP 7.x on SN300 Secure Element, version JCOP 7.0 R1.62.0.1 and JCOP 7.1 R1.04.0.1 NSCIB-CC-2300065-01-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210" NSCIB-CC-2300044-02-CR Compare
NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1 NSCIB-CC-2300099-01-CR Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210" NSCIB-CC-2300044-01-CR Compare
NXP JCOP 7.0 with eUICC extension on SN300 Secure Element, JCOP 7.0 R1.64.0.2 NSCIB-CC-0441505-CR2 Compare
NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1 NSCIB-CC-2300174-01-CR Compare
NXP JCOP8.x on SE310 A0 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200042-01-CR Compare
NXP JCOP 7.0 on SN300 Secure Element, JCOP 7.0 R1.62.0.1 NSCIB-CC-0441502-CR Compare
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 NSCIB-CC-0428888-CR2 Compare
NCR E10 New Generation FCR 2.0 (FCR Application Version 2.0, OpenSSL Version 1.0.2d Secure-IC firmware and hardware crypto library Version 0.0.6) 21.0.03/TSE-CCCS-48 Compare
NPCT6xx TPM 2.0 Hardware version FB5C85D and FB5C85E, Firmware version 1.3.0.1, 1.3.1.0 and 1.3.2.8 ANSSI-CC-2017/55 Compare
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. None Compare
NXP SN300 B2 Series - Secure Element version SN300_SE B2.1.001 JB NSCIB-CC-2200030-02-CR Compare
NXP SN300 B2 Series - Secure Element version SN300_SE B2.1.001 JB NSCIB-CC-2200030-01-CR Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
Showing 5 out of 27.

Scheme data ?

Cert Id NSCIB-CC-2200043-02-CR
Certification Date 11.08.2023
Status Issued
Product NXP JCOP 8.x with eUICC extension on SN300 B2 Secure Element, version JCOP 8.0 R1.39.0.2
Developer NXP Semiconductors N.V.
Evaluation Facility TÜV Informationstechnik
Level EAL4 + ALC_DVS.2 and AVA_VAN.5
Cert Link https://trustcb.com/download/?wpdmdl=3180
Report Link https://trustcb.com/download/?wpdmdl=3177
Target Link https://trustcb.com/download/?wpdmdl=3178

References

Loading...

Updates

  • 01.09.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2,JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500053-01_Cert.pdf",
  "dgst": "bd0366b614a5912f",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-3110-2025-08-2500053-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL4",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_COMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_COMP",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "9.1",
        "8.2",
        "8.1",
        "1.06.0.2",
        "1.39.0.2",
        "1.07.0.2",
        "8.0",
        "9.0"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "fdb8a517d5d22602",
        "5a8556c83f510b57"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2200030-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2200030-02-CR"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2200043-02-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=3180",
      "certification_date": "2023-08-11",
      "developer": "NXP Semiconductors N.V.",
      "evaluation_facility": "T\u00dcV Informationstechnik",
      "level": "EAL4 + ALC_DVS.2 and AVA_VAN.5",
      "product": "NXP JCOP 8.x with eUICC extension on SN300 B2 Secure Element, version JCOP 8.0 R1.39.0.2",
      "report_link": "https://trustcb.com/download/?wpdmdl=3177",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=3178"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2200030-02-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2200030-01-CR",
          "NSCIB-CC-2200030-02-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Netherlands N.V.",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2,JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2",
  "not_valid_after": "2030-08-29",
  "not_valid_before": "2025-08-29",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "EUCC-3110-2025-08-2500053-01_Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-V3-2024": 1,
          "BSI-CCPP-0100-V2-2025": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL4": 1,
          "EAL4 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 8": 4,
          "JCOP 9": 2
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 1,
          "ISO/IEC 18045:2022": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "V T",
      "/CreationDate": "D:20250829195038+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20250829195038+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "pdf_file_size_bytes": 307319,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nxp.com%2Fproducts%2Fwireless-connectivity%2Fnfc-hf%2Fnfc-enabled-digital-wallet%3ANFC-ENABLED-DIGITAL-WALLET\u0026data=05%7C02%7Czhazira.toleukhanova%40nxp.com%7Cbedab5c552f74771e93208ddda45e748%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C638906715942707209%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C\u0026sdata=s4Wgh%2FL%2BsESD3XkxuCqKRGHwsNIm22eBcGtqPbmSmsw%3D\u0026reserved=0",
          "file:///G:/Shared%20drives/Certifications/Certifications/EUCC/2500052%20NXP%20JCOP%207.x_eUICC_SN300%20B1.1/Cert%20docs/superceded/www.trustcb.com",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "EUCC-3110-2025-08-2500053-01_CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "EUCC-3110-2025-08-2500053-01-CR",
        "cert_item": "NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2, JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2",
        "cert_lab": " T\u00dcV Informationstechnik GmbH",
        "developer": "NXP Semiconductors Netherlands N.V"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 2
          },
          "EdDSA": {
            "EdDSA": 4
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2200030-02-CR": 1,
          "NSCIB-CC-2200030-02": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPS-PROVIDER": 2,
          "A.APPSPROVIDER": 1,
          "A.PROCESS-SEC-IC": 2,
          "A.TRUSTED-GUESTOS": 2,
          "A.USE_DIAG": 2,
          "A.USE_KEYS": 2,
          "A.VERIFICATION-AUTHORITY": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP- 0100-V2-2025": 1,
          "BSI-CC-PP-0099-V3-2024": 1,
          "BSI-CCPP-0100-V2-2025": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_COMP.1": 1,
          "ADV_FSP.4": 1,
          "ADV_IMP.1": 1,
          "ADV_TDS.3": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.4": 1,
          "ALC_CMS.4": 1,
          "ALC_COMP.1": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 12,
          "ALC_FLR.2": 11,
          "ALC_LCD.1": 1,
          "ALC_TAT.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_SPD.1": 1
        },
        "ATE": {
          "ATE_COMP.1": 1,
          "ATE_COV.2": 1,
          "ATE_DPT.1": 1,
          "ATE_FUN.1": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_COMP.1": 1,
          "AVA_VAN": 1,
          "AVA_VAN.5": 15
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 4": 2,
          "EAL 4 augmented": 2,
          "EAL4": 9,
          "EAL4 augmented": 9,
          "EAL4+": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "algorithms, protocols and implementations: ECDAA, Korean SEED, MIFARE and FeliCa, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 2
        },
        "ECB": {
          "ECB": 1
        },
        "GCM": {
          "GCM": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 1
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "DeutscheTelekom": {
          "Deutsche Telekom Security": 1
        },
        "TUV": {
          "T\u00dcV Informationstechnik": 4
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.3.1": 1
        },
        "JavaCard": {
          "Java Card 3.1": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 8": 84,
          "JCOP 9": 46,
          "JCOP9": 1
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1,
          "JIL-COMP": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2,
          "ISO/IEC 17065": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 3
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "Triple-DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1,
            "HMAC": 1
          }
        },
        "miscellaneous": {
          "SEED": {
            "SEED": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "IBM": {
          "SE": 1
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 20,
          "NXP Semiconductors": 5
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "sjon",
      "/CreationDate": "D:20250829200815+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20250829200815+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report - EUCC",
      "pdf_file_size_bytes": 560597,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://eur01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.nxp.com%2Fproducts%2Fwireless-connectivity%2Fnfc-hf%2Fnfc-enabled-digital-wallet%3ANFC-ENABLED-DIGITAL-WALLET\u0026data=05%7C02%7Czhazira.toleukhanova%40nxp.com%7Cbedab5c552f74771e93208ddda45e748%7C686ea1d3bc2b4c6fa92cd99c5c301635%7C0%7C0%7C638906715942707209%7CUnknown%7CTWFpbGZsb3d8eyJFbXB0eU1hcGkiOnRydWUsIlYiOiIwLjAuMDAwMCIsIlAiOiJXaW4zMiIsIkFOIjoiTWFpbCIsIldUIjoyfQ%3D%3D%7C0%7C%7C%7C\u0026sdata=s4Wgh%2FL%2BsESD3XkxuCqKRGHwsNIm22eBcGtqPbmSmsw%3D\u0026reserved=0",
          "https://trustcb.com/common-criteria/eucc/",
          "mailto:[email protected]",
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "mailto:[email protected]",
          "[email protected]",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 22
    },
    "st_filename": "EUCC-3110-2025-08-2500053-01_ST_lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 13
          },
          "ECDH": {
            "ECDH": 6
          },
          "ECDSA": {
            "ECDSA": 9
          },
          "EdDSA": {
            "EdDSA": 11
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-CC-2200030-02": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.APPS-PROVIDER": 5,
          "A.CAP_FILE": 3,
          "A.DELETION": 1,
          "A.PROCESS-SEC-IC": 4,
          "A.TRUSTED-GUESTOS": 4,
          "A.USE_DIAG": 5,
          "A.USE_KEYS": 5,
          "A.VERIFICATION": 2,
          "A.VERIFICATION-": 1,
          "A.VERIFICATION-AUTHORITY": 4
        },
        "D": {
          "D.API_DATA": 3,
          "D.APP_": 1,
          "D.APP_CODE": 6,
          "D.APP_C_": 1,
          "D.APP_C_DATA": 4,
          "D.APP_I_": 1,
          "D.APP_I_DATA": 6,
          "D.APP_KEYS": 7,
          "D.APSD_KEYS": 4,
          "D.CARD_MNGT_DATA": 3,
          "D.CONFIG_ITEM": 7,
          "D.CRYPTO": 4,
          "D.ISD_KEYS": 4,
          "D.JCS_CODE": 6,
          "D.JCS_DATA": 9,
          "D.PIN": 9,
          "D.PROFILE_": 1,
          "D.RESTRICTED_MODE_": 1,
          "D.RESTRICTED_MODE_STATE": 1,
          "D.SEC_": 1,
          "D.SEC_DATA": 5,
          "D.TOE_": 1,
          "D.TOE_IDENTIFICATION": 1,
          "D.TOE_IDENTIFIER": 3,
          "D.UPDATE_": 1,
          "D.UPDATE_IMAGE": 25,
          "D.VASD_KEYS": 3
        },
        "O": {
          "O.APPLET": 14,
          "O.APPLET_": 1,
          "O.APPLET_CURRENT": 1,
          "O.APPLET_LOADED": 2,
          "O.BIO-MNGT": 1,
          "O.CODE_CAP_": 1,
          "O.CODE_CAP_FILE": 11,
          "O.DELETION": 3,
          "O.EXT-MEM": 1,
          "O.INSTALL": 2,
          "O.JAVAOBJECT": 57,
          "O.LOAD": 3,
          "O.REMOTE": 1,
          "O.SENSITIVE_ARRAYS_INTEG": 1,
          "O.SENSITIVE_RESULTS_INTEG": 1
        },
        "OE": {
          "OE.APPS-PROVIDER": 4,
          "OE.CAP_FILE": 5,
          "OE.CARD-MANAGEMENT": 3,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 12,
          "OE.CONFID-UPDATE-": 2,
          "OE.CONFID-UPDATE-IMAGE": 2,
          "OE.IC": 3,
          "OE.KEY-CHANGE": 5,
          "OE.PROCESS_SEC_IC": 4,
          "OE.RE": 7,
          "OE.SCP": 16,
          "OE.SECURITY-DOMAINS": 4,
          "OE.TRUSTED-GUESTOS": 4,
          "OE.USE_DIAG": 5,
          "OE.USE_KEYS": 5,
          "OE.VERIFICATION": 17,
          "OE.VERIFICATION-": 2,
          "OE.VERIFICATION-AUTHORITY": 2
        },
        "OP": {
          "OP.ARRAY_": 1,
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 3,
          "OP.ARRAY_LENGTH": 3,
          "OP.ARRAY_T_ALOAD": 3,
          "OP.ARRAY_T_ASTORE": 3,
          "OP.CONT_ACCESS": 7,
          "OP.CREATE": 7,
          "OP.DELETE_APPLET": 4,
          "OP.DELETE_CAP_FILE": 3,
          "OP.DELETE_CAP_FILE_": 1,
          "OP.DELETE_CAP_FILE_APPLET": 2,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.JAVA": 5,
          "OP.MODIFY_CONFIG_ITEM": 1,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.READ_CONFIG_ITEM": 1,
          "OP.THROW": 5,
          "OP.TRIGGER_UPDATE": 4,
          "OP.TYPE_ACCESS": 5,
          "OP.USE_CONFIG_ITEM": 1
        },
        "OSP": {
          "OSP.KEY-CHANGE": 4,
          "OSP.PROCESS-TOE": 4,
          "OSP.SECURITY-DOMAINS": 4,
          "OSP.VERIFICATION": 2
        },
        "OT": {
          "OT.ALARM": 14,
          "OT.APPLI-AUTH": 8,
          "OT.ARRAY_VIEWS_CONFID": 2,
          "OT.ARRAY_VIEWS_INTEG": 2,
          "OT.ARRAY_VIEW_CONFID": 1,
          "OT.ARRAY_VIEW_INTEG": 1,
          "OT.ATTACK-COUNTER": 5,
          "OT.AUTH-LOAD-UPDATE-": 2,
          "OT.AUTH-LOAD-UPDATE-IMAGE": 3,
          "OT.CARD-CONFIGURATION": 5,
          "OT.CARD-MANAGEMENT": 22,
          "OT.CIPHER": 4,
          "OT.COMM_": 2,
          "OT.COMM_AUTH": 6,
          "OT.COMM_CONFIDENTIALITY": 3,
          "OT.COMM_INTEGRITY": 6,
          "OT.CONFID-UPDATE-": 2,
          "OT.CONFID-UPDATE-IMAGE": 3,
          "OT.CONT-DOS": 1,
          "OT.CONT-PRIV": 1,
          "OT.CONT-SEP": 1,
          "OT.CONT_DOS": 4,
          "OT.CONT_PRIV": 6,
          "OT.CONT_SEP": 8,
          "OT.DELETION": 1,
          "OT.DOMAIN-RIGHTS": 7,
          "OT.FIREWALL": 10,
          "OT.GLOBAL_ARRAYS_": 6,
          "OT.GLOBAL_ARRAYS_CONFID": 1,
          "OT.GLOBAL_ARRAYS_INTEG": 1,
          "OT.IDENTIFICATION": 5,
          "OT.INSTALL": 1,
          "OT.INTERNALSECURE-": 1,
          "OT.KEY-MNGT": 4,
          "OT.LOAD": 1,
          "OT.NATIVE": 6,
          "OT.OBJ-DELETION": 3,
          "OT.OPERATE": 20,
          "OT.PIN-MNGT": 4,
          "OT.REALLOCATION": 4,
          "OT.RESOURCES": 5,
          "OT.RESTRICTED-MODE": 6,
          "OT.RND": 5,
          "OT.SCP": 34,
          "OT.SECURE-CHANNELS": 1,
          "OT.SECURE_AC_": 2,
          "OT.SECURE_AC_ACTIVATION": 3,
          "OT.SECURE_LOAD_": 1,
          "OT.SECURE_LOAD_ACODE": 6,
          "OT.SENSITIVE_RESULTS_": 2,
          "OT.SENSITIVE_RESULTS_INTEG": 3,
          "OT.SID": 8,
          "OT.TOE_IDENTIFICATION": 5,
          "OT.TRANSACTION": 4
        },
        "R": {
          "R.JAVA": 12
        },
        "SA": {
          "SA.ALARM": 2,
          "SA.CARD-MANAGEMENT": 1,
          "SA.CIPHER": 2,
          "SA.CONFID-APPLI-DATA": 2,
          "SA.CONFID-JCS-CODE": 1,
          "SA.CONFID-JCS-DATA": 2,
          "SA.CONFID-UPDATE-": 1,
          "SA.CONFID-UPDATE-IMAGE": 1,
          "SA.CONFIG-APPLET": 1,
          "SA.CONTEXT-SEPARATION": 1,
          "SA.DELETION": 1,
          "SA.EXE-APPLI-CODE": 3,
          "SA.EXE-JCS-": 1,
          "SA.EXE-JCS-CODE": 2,
          "SA.FIREWALL": 2,
          "SA.INSTALL": 1,
          "SA.INTEG-APPLI-CODE": 3,
          "SA.INTEG-APPLI-DATA": 2,
          "SA.INTEG-JCS-CODE": 2,
          "SA.INTEG-JCS-DATA": 1,
          "SA.INTEG-UPDATE-IMAGE": 2,
          "SA.KEY-": 1,
          "SA.KEY-MNGT": 1,
          "SA.NATIVE": 3,
          "SA.OBJ-DELETION": 2,
          "SA.OPERATE": 1,
          "SA.OSU": 1,
          "SA.PIN-MNGT": 2,
          "SA.RESOURCES": 2,
          "SA.RM": 1,
          "SA.SCP": 5,
          "SA.SID": 3,
          "SA.TRANSACTION": 1,
          "SA.VERIFICATION": 3
        },
        "T": {
          "T.COM_EXPLOIT": 4,
          "T.CONFID-APPLI-DATA": 5,
          "T.CONFID-CONT": 4,
          "T.CONFID-JCS-CODE": 4,
          "T.CONFID-JCS-DATA": 4,
          "T.CONFID-UPDATE-IMAGE": 4,
          "T.CONFIG": 4,
          "T.CONT-DOS": 4,
          "T.CONT-SID": 4,
          "T.DELETION": 3,
          "T.EXE-CODE": 7,
          "T.EXE-CODE-REMOTE": 1,
          "T.EXE-CONT": 4,
          "T.INSTALL": 3,
          "T.INTEG-APPLI-": 1,
          "T.INTEG-APPLI-CODE": 8,
          "T.INTEG-APPLI-DATA": 12,
          "T.INTEG-CODE": 1,
          "T.INTEG-CONT": 3,
          "T.INTEG-JCS-CODE": 3,
          "T.INTEG-JCS-DATA": 4,
          "T.INTEG-UPDATE-IMAGE": 4,
          "T.INTERRUPT-OSU": 4,
          "T.LIFE_CYCLE": 4,
          "T.NATIVE": 4,
          "T.OBJ-DELETION": 2,
          "T.PHYSICAL": 2,
          "T.RESOURCES": 3,
          "T.RESTRICTED-": 1,
          "T.RESTRICTED-MODE": 3,
          "T.RND": 5,
          "T.SID": 8,
          "T.UNAUTH-LOAD-UPDATE-": 1,
          "T.UNAUTH-LOAD-UPDATE-IMAGE": 3,
          "T.UNAUTHORIZED_CARD_": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-V3-2024": 2,
          "BSI-CC-PP-0100-V2-2025": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "AGD": {
          "AGD_OPE.1": 2
        },
        "ALC": {
          "ALC_DVS.2": 3,
          "ALC_FLR.2": 3
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_ECD": 1,
          "ASE_INT": 2,
          "ASE_REQ": 3,
          "ASE_SPD": 2,
          "ASE_TSS": 2
        },
        "AVA": {
          "AVA_VAN.5": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 5,
          "EAL4 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 14,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS": 4,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 2
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 6,
          "FCO_NRO.2.1": 2,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 2
        },
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 5,
          "FCS_CKM.2": 6,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.3": 3,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.5": 9,
          "FCS_CKM.6": 7,
          "FCS_CKM.6.1": 5,
          "FCS_CKM.6.2": 4,
          "FCS_COP.1": 12,
          "FCS_COP.1.1": 18,
          "FCS_RBG.1": 1,
          "FCS_RNG.1": 15,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2,
          "FCS_RNG.2": 1
        },
        "FDP": {
          "FDP_ACC": 1,
          "FDP_ACC.1": 53,
          "FDP_ACC.1.1": 2,
          "FDP_ACC.2": 24,
          "FDP_ACC.2.1": 5,
          "FDP_ACC.2.2": 4,
          "FDP_ACF": 1,
          "FDP_ACF.1": 40,
          "FDP_ACF.1.1": 7,
          "FDP_ACF.1.2": 8,
          "FDP_ACF.1.3": 7,
          "FDP_ACF.1.4": 9,
          "FDP_IFC": 2,
          "FDP_IFC.1": 46,
          "FDP_IFC.1.1": 2,
          "FDP_IFC.2": 24,
          "FDP_IFC.2.1": 3,
          "FDP_IFC.2.2": 3,
          "FDP_IFF": 3,
          "FDP_IFF.1": 37,
          "FDP_IFF.1.1": 5,
          "FDP_IFF.1.2": 7,
          "FDP_IFF.1.3": 7,
          "FDP_IFF.1.4": 7,
          "FDP_IFF.1.5": 6,
          "FDP_ITC": 1,
          "FDP_ITC.1": 9,
          "FDP_ITC.2": 17,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 2,
          "FDP_RIP.1": 66,
          "FDP_RIP.1.1": 9,
          "FDP_ROL.1": 15,
          "FDP_ROL.1.1": 2,
          "FDP_ROL.1.2": 3,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 8,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2,
          "FDP_UIT": 1,
          "FDP_UIT.1": 4,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 6,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 19,
          "FIA_UAU.1.1": 4,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 9,
          "FIA_UAU.4.1": 3,
          "FIA_UID": 1,
          "FIA_UID.1": 61,
          "FIA_UID.1.1": 7,
          "FIA_UID.1.2": 5,
          "FIA_UID.2": 3,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 4,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MSA": 7,
          "FMT_MSA.1": 75,
          "FMT_MSA.1.1": 11,
          "FMT_MSA.2": 3,
          "FMT_MSA.2.1": 2,
          "FMT_MSA.3": 71,
          "FMT_MSA.3.1": 11,
          "FMT_MSA.3.2": 10,
          "FMT_MTD.1": 7,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 5,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 75,
          "FMT_SMF.1.1": 8,
          "FMT_SMR": 2,
          "FMT_SMR.1": 96,
          "FMT_SMR.1.1": 7,
          "FMT_SMR.1.2": 7
        },
        "FPR": {
          "FPR_UNO.1": 7,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS.1": 3,
          "FPT_EMS.1.1": 3,
          "FPT_FLS.1": 34,
          "FPT_FLS.1.1": 8,
          "FPT_PHP.3": 4,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 5,
          "FPT_RCV.3.1": 2,
          "FPT_RCV.3.2": 2,
          "FPT_RCV.3.3": 2,
          "FPT_RCV.3.4": 1,
          "FPT_TDC.1": 5,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 2
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 4
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 6
        },
        "CCM": {
          "CCM": 40
        },
        "CFB": {
          "CFB": 5
        },
        "CTR": {
          "CTR": 5
        },
        "ECB": {
          "ECB": 3
        },
        "GCM": {
          "GCM": 7
        },
        "XTS": {
          "XTS": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library ..................................................10": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 1
        },
        "Curve": {
          "Curve25519": 1
        },
        "Edwards": {
          "Ed25519": 1,
          "Ed448": 1
        },
        "NIST": {
          "NIST P-256": 1,
          "P-256": 1
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 3
          },
          "SHA2": {
            "SHA-224": 3,
            "SHA-256": 4,
            "SHA-384": 3,
            "SHA-512": 3
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_CBC_NOPAD": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD": 2,
            "ALG_AES_BLOCK_128_ECB_NOPAD": 1,
            "ALG_AES_CBC_ISO9797_M1": 1,
            "ALG_AES_CBC_ISO9797_M2": 1,
            "ALG_AES_CBC_ISO9797_M2_STANDARD": 1,
            "ALG_AES_CBC_ISO9797_STANDARD": 1,
            "ALG_AES_CBC_PKCS5": 1,
            "ALG_AES_CBC_PKCS7": 2,
            "ALG_AES_CFB": 1,
            "ALG_AES_CMAC16": 1,
            "ALG_AES_CMAC16_STANDARD": 1,
            "ALG_AES_CMAC8": 1,
            "ALG_AES_CMAC_128": 1,
            "ALG_AES_ECB_ISO9797_M1": 1,
            "ALG_AES_ECB_ISO9797_M2": 1,
            "ALG_AES_ECB_PKCS5": 1,
            "ALG_AES_ECB_PKCS7": 2,
            "ALG_AES_MAC_128_NOPAD": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 1,
            "ALG_DES_CBC_ISO9797_M2": 1,
            "ALG_DES_CBC_NOPAD": 1,
            "ALG_DES_CBC_PKCS5": 1,
            "ALG_DES_CBC_PKCS7": 1,
            "ALG_DES_CMAC8": 1,
            "ALG_DES_ECB_ISO9797_M1": 1,
            "ALG_DES_ECB_ISO9797_M2": 2,
            "ALG_DES_ECB_NOPAD": 1,
            "ALG_DES_ECB_PKCS5": 1,
            "ALG_DES_ECB_PKCS7": 1,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_M1": 1,
            "ALG_DES_MAC4_ISO9797_M2": 1,
            "ALG_DES_MAC4_PKCS5": 1,
            "ALG_DES_MAC8_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_M1": 1,
            "ALG_DES_MAC8_ISO9797_M2": 1,
            "ALG_DES_MAC8_NOPAD": 1,
            "ALG_DES_MAC8_PKCS5": 1
          },
          "EC": {
            "ALG_EC_SVDP_DH": 1,
            "ALG_EC_SVDP_DHC": 1,
            "ALG_EC_SVDP_DHC_KDF": 1,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_KDF": 1,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 2
          },
          "ECDSA": {
            "ALG_ECDSA_SHA_224": 1,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 1,
            "ALG_ECDSA_SHA_512": 1
          },
          "HMAC": {
            "ALG_HMAC_SHA_256": 1,
            "ALG_HMAC_SHA_384": 1,
            "ALG_HMAC_SHA_512": 1
          },
          "RSA": {
            "ALG_RSA_NOPAD": 1,
            "ALG_RSA_PKCS1": 1,
            "ALG_RSA_PKCS1_OAEP": 1,
            "ALG_RSA_SHA_224_PKCS1": 1,
            "ALG_RSA_SHA_224_PKCS1_PSS": 1,
            "ALG_RSA_SHA_256_PKCS1": 1,
            "ALG_RSA_SHA_256_PKCS1_PSS": 1,
            "ALG_RSA_SHA_384_PKCS1": 1,
            "ALG_RSA_SHA_384_PKCS1_PSS": 1,
            "ALG_RSA_SHA_512_PKCS1": 1,
            "ALG_RSA_SHA_512_PKCS1_PSS": 1,
            "ALG_RSA_SHA_ISO9796": 1,
            "ALG_RSA_SHA_ISO9796_MR": 1,
            "ALG_RSA_SHA_PKCS1": 1
          },
          "SHA": {
            "ALG_SHA_224": 1,
            "ALG_SHA_256": 3,
            "ALG_SHA_384": 3,
            "ALG_SHA_512": 3
          },
          "XDH": {
            "ALG_XDH": 1
          }
        },
        "curves": {
          "FRP256V1": 2
        },
        "misc": {
          "LENGTH_AES_128": 4,
          "LENGTH_AES_192": 4,
          "LENGTH_AES_256": 4,
          "LENGTH_DES3_2KEY": 4,
          "LENGTH_DES3_3KEY": 4,
          "LENGTH_EC_FP_128": 2,
          "LENGTH_EC_FP_160": 1,
          "LENGTH_EC_FP_192": 2,
          "LENGTH_EC_FP_224": 2,
          "LENGTH_EC_FP_256": 3,
          "LENGTH_EC_FP_384": 1,
          "LENGTH_EC_FP_528": 2,
          "LENGTH_RSA_1024": 1,
          "LENGTH_SHA": 1,
          "LENGTH_SHA_224": 1,
          "LENGTH_SHA_256": 2,
          "LENGTH_SHA_384": 1,
          "LENGTH_SHA_512": 2,
          "PAD_PKCS1_OAEP": 1,
          "SIG_CIPHER_AES_CMAC128": 1,
          "SIG_CIPHER_AES_CMAC16": 1,
          "SIG_CIPHER_AES_CMAC8": 1,
          "SIG_CIPHER_DES_CMAC8": 1,
          "SIG_CIPHER_ECDSA": 1,
          "SIG_CIPHER_RSA": 1,
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.nxp.id.jcopx.security": 1
        },
        "java": {
          "java.rmi": 1
        },
        "javacard": {
          "javacard.framework": 1,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 1,
          "javacardx.security": 1
        },
        "org": {
          "org.globalplatform": 1
        }
      },
      "javacard_version": {
        "GlobalPlatform": {
          "GlobalPlatform 2.3.1": 1
        },
        "JavaCard": {
          "JC3.1": 1,
          "Java Card 3.1": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 8": 421,
          "JCOP 9": 49,
          "JCOP8": 9,
          "JCOP9": 14
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 10,
          "RNG": 17
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Fault Injection": 1,
          "Physical Tampering": 2,
          "malfunction": 2,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 3,
          "side channel": 2,
          "side-channel": 1,
          "timing attack": 1,
          "timing attacks": 2
        },
        "other": {
          "JIL": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 2,
          "AIS20": 2,
          "AIS31": 1
        },
        "CC": {
          "CCMB-2022-11-001": 2,
          "CCMB-2022-11-002": 2,
          "CCMB-2022-11-003": 2,
          "CCMB-2022-11-004": 2,
          "CCMB-2022-11-005": 2,
          "CCMB-2022-11-006": 2
        },
        "FIPS": {
          "FIPS 140-3": 1,
          "FIPS 197": 2,
          "FIPS PUB 186-3": 1
        },
        "ISO": {
          "ISO/IEC 7816": 4
        },
        "RFC": {
          "RFC 5639": 1,
          "RFC 7748": 1,
          "RFC 8032": 1
        },
        "SCP": {
          "SCP03": 1,
          "SCP80": 1,
          "SCP81": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 19
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1,
            "TDES": 2,
            "Triple-DES": 4,
            "TripleDES": 1
          },
          "DES": {
            "DES": 5
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 3,
            "HMAC": 10
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI TR-03111": 1
        }
      },
      "tee_name": {
        "IBM": {
          "SE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 625,
          "NXP Semiconductors": 24
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20250826111917+02\u002700\u0027",
      "/Creator": "DITA Open Toolkit 3.7 - NDF 08012025",
      "/Keywords": "NXP, ASE, JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented",
      "/Producer": "Apache FOP Version 2.6",
      "/Subject": "NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Series - Secure Element",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1112467,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.nxp.com",
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 163
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V3b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500053-01_CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL4",
      "ALC_DVS.2",
      "AVA_VAN.5",
      "ALC_FLR.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500053-01_ST_lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "dc7830102704366ee338eeeba1dc40f9cc744b7b98a02d8db802a08cc7e192e7",
      "txt_hash": "8710b57ed27e94e4d5315a9116d4709ca4fc0f38d5495ca8dde02829d22d877b"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "ac004a63a868676685d72575218dd6ebd8a46cf8c4c16a400c761d4293aa5acf",
      "txt_hash": "093385d06bdcf955fb2d58500e96072893c2d3c3236e2fe6fbbbcf6116b7cba9"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "c139a84953fa60486026e8e51c29df5ce4941664aeef4aa81c9ada9b10b26550",
      "txt_hash": "40ca88e49e4735e7f7467452e42b1f22d3f8374d0f5687bf7a512a2f264c63b9"
    }
  },
  "status": "active"
}