Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
iTrustee on Kirin 980
ANSSI-CC-2020/67
NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
BSI-DSZ-CC-0707-2012
name iTrustee on Kirin 980 NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
category Trusted Computing ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme FR DE
status active archived
not_valid_after 30.07.2025 01.09.2019
not_valid_before 30.07.2020 13.08.2012
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2020_67.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2020_67fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0707a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2020_67en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0707b_pdf.pdf
manufacturer Huawei Technologies Co. Ltd. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.huawei.com https://www.nxp.com
security_level EAL2+ ALC_DVS.2, AVA_VAN.5, EAL4+, ASE_TSS.2, ATE_DPT.2
dgst 00a165c01f329ac3 f8c46366b632c04b
heuristics/cert_id ANSSI-CC-2020/67 BSI-DSZ-CC-0707-2012
heuristics/cert_lab THALES BSI
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, AVA_TEE.2, ASE_ECD.1, ALC_DEL.1, ADV_TDS.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 AVA_VAN.5, ADV_ARC.1, ATE_COV.2, AGD_OPE.1, ADV_IMP.1, ALC_FLR.3, APE_SPD.1, ASE_TSS.2, ASE_REQ.2, ADV_SPM.1, APE_REQ.2, ALC_TAT.1, APE_INT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_INT.3, ADV_TDS.3, ALC_DEL.1, APE_CCL.1, ATE_DPT.2, ASE_OBJ.2, ADV_FSP.4, ASE_INT.1, APE_ECD.1, ASE_SPD.1, ATE_FUN.1, APE_OBJ.2, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 980 -
heuristics/report_references/directly_referenced_by {} NSCIB-CC-13-37762-CR, BSI-DSZ-CC-0860-2013, BSI-DSZ-CC-0864-2012
heuristics/report_references/indirectly_referenced_by {} OCSI/CERT/SYS/05/2016/RC, NSCIB-CC-13-37760-CR2, BSI-DSZ-CC-0911-2014, OCSI/CERT/SYS/06/2016/RC, OCSI/CERT/SYS/05/2015/RC, OCSI/CERT/SYS/02/2016/RC, OCSI/CERT/SYS/04/2015/RC, NSCIB-CC-13-37761-CR2, BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0860-2013, NSCIB-CC-13-37762-CR, OCSI/CERT/SYS/03/2016/RC, OCSI/CERT/CCL/09/2022/RC, OCSI/CERT/CCL/05/2021/RC, BSI-DSZ-CC-0914-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/CCL/06/2021/RC
heuristics/protection_profiles 5956bec789a2f3ad f6d23054061d72ba
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-profil_PP-2014_01.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf
pdf_data/cert_filename certificat-2020_67.pdf
pdf_data/cert_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/67: 2
    • ANSSI-CC-PP-2014/01-M01: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2014/01-M01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 3
pdf_data/cert_keywords/cc_sar
  • AVA:
    • AVA_TEE.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Huawei:
    • Huawei: 1
    • Huawei Technologies: 2
pdf_data/cert_keywords/eval_facility
  • Thales:
    • THALES/CNES: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate: D:20200805112010+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200805112010+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 495597
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename anssi-cc-2020_67fr.pdf 0707a_pdf.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL 2 augmenté AVA_TEE.2
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2020/67
    • cert_item: iTrustee on Kirin 980
    • cert_item_version: Version 3.0
    • cert_lab: THALES / CNES 290 allée du Lac, 31670 Labège, France
    • developer: Huawei Technologies France 18 quai du Point du Jour, 92659 Boulogne Billancourt Cedex Huawei Central Software Building Q27, No. 156 Beiqing Rd, Shi- Chuang-Ke-Ji-Shi-Fan-Yuan, Hai-Dian District, Beijing 100095 P.R.China Hisilicon No. 1599, Xinjinqiao Rd, Pudong Distrinct, Shanghai, 201206, P.R.China Commanditaire Huawei Technologies France 18 quai du Point du Jour, 92659 Boulogne Billancourt Cedex
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Trusted Execution Environement Référence GPD_SPE_021, version 1.2.1 certifié ANSSI-CC-PP-2014/01-M01 le 13 décembre 2016
  • DE:
  • FR:
  • DE:
    • cert_id: BSI-DSZ-CC-0707-2012
    • cert_item: NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2020/67: 17
    • ANSSI-CC-PP-2014/01: 1
    • ANSSI-CC-PP-2014/01-M01: 2
  • DE:
    • BSI-DSZ-CC-0707: 1
    • BSI-DSZ-CC-0707-2012: 20
    • BSI-DSZ-CC-S-0003: 1
  • NL:
    • CC-0707: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2014/01: 1
    • ANSSI-CC-PP-2014/01-M01: 2
  • BSI:
    • BSI-CC-PP- 0035-2007: 1
    • BSI-CC-PP-0035-2007: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL2: 3
    • EAL4: 1
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 2
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_TEE: 1
    • AVA_TEE.2: 4
    • AVA_VAN: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 5
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 2
  • R:
    • R.O: 2
pdf_data/report_keywords/vendor
  • Huawei:
    • Huawei: 11
    • Huawei Technologies: 3
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 20
  • Philips:
    • Philips: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DES: 4
    • DES:
      • DES: 5
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
    • side channel: 1
  • other:
    • JIL: 4
    • reverse engineering: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/tee_name
  • other:
    • TEE: 9
    • iTrustee: 20
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • NIST:
    • NIST SP 800-90A: 3
  • BSI:
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 3
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
  • FIPS:
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 7816: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Card Controllers P5Cx081V1D/P5CD041V1D/P5 CD021V1D/P5CD016V1D with DESFire EV1, T-Systems GEI GmbH (confidential document) [10] ETR for composition, NXP P5CD081V1D Secure Smart Card Controller, BSI-DSZ- CC-0707, T-Systems: 1
    • Controllers, Revision 1.3, NXP Semiconductors, Business Unit Identification, October 24th, 2011 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
    • GmbH, Version 1.2, 08.06.2012 (confidential document) [11] Data Sheet P5CD016/021/041/051 and P5Cx081 family, Secure dual interface and contact PKI: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20200805112204+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20200805112204+02'00'
  • /Producer: Acrobat Distiller 11.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 267925
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20120828082855+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcards: Controller, Operating System, NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20120829085126+02'00'
  • /Producer: LibreOffice 3.5
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0707-2012
  • pdf_file_size_bytes: 954555
  • pdf_hyperlinks: https://www.bsi.bund.dea/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierung
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename anssi-cible-cc-2020_67en.pdf 0707b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0707: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL4: 29
    • EAL4 augmented: 1
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP.1: 3
    • ADV_FSP.2: 14
    • ADV_TDS.1: 9
  • AGD:
    • AGD_OPE.1: 8
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 4
  • AVA:
    • AVA_TEE: 4
    • AVA_TEE.2: 16
    • AVA_VAN: 2
    • AVA_VAN.2: 6
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 4
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP: 12
    • FCS_COP.1: 21
    • FCS_RNG: 3
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 26
    • FDP_ACC.1: 9
    • FDP_ACF: 22
    • FDP_ACF.1: 11
    • FDP_IFC: 18
    • FDP_IFC.1: 6
    • FDP_IFC.2: 2
    • FDP_IFF: 17
    • FDP_IFF.1: 7
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_ITT: 15
    • FDP_ITT.1: 3
    • FDP_RIP: 7
    • FDP_RIP.1: 1
    • FDP_ROL: 7
    • FDP_ROL.1: 2
    • FDP_SDI: 1
    • FDP_SDI.2: 15
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_UID.1: 1
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 43
    • FMT_MSA.1: 4
    • FMT_MSA.3: 7
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 13
    • FPT_FLS.1.1: 1
    • FPT_INI: 4
    • FPT_INI.1: 13
    • FPT_INI.1.1: 2
    • FPT_INI.1.2: 2
    • FPT_INI.1.3: 2
    • FPT_ITT: 10
    • FPT_ITT.1: 1
    • FPT_STM: 5
    • FPT_STM.1: 2
    • FPT_TEE.1: 6
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FAU:
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 25
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 48
    • FDP_ACC.1.1: 3
    • FDP_ACF.1: 38
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 15
    • FDP_ITC.1: 7
    • FDP_ITC.2: 14
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 6
    • FDP_ROL.1: 6
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MDT.1: 1
    • FMT_MSA.1: 34
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 26
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
    • FPT_RPL.1: 7
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT.2: 7
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 10
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.PROTECTIO: 1
    • A.PROTECTION_AFTER_DELILVERY: 1
    • A.PROTECTION_AFTER_DELIVERY: 2
    • A.ROLLBACK: 4
    • A.TA_DEVEL: 1
    • A.TA_DEVELOPMENT: 3
  • O:
    • O.CA_TA_IDENTIFICATIO: 1
    • O.CA_TA_IDENTIFICATION: 8
    • O.INITIALIZATION: 24
    • O.INSTANCE_TIME: 7
    • O.KEYS_USAGE: 13
    • O.OPERATION: 32
    • O.RNG: 8
    • O.ROLLBACK_PROTECTION: 1
    • O.RUNTIME_CONFIDENTI: 1
    • O.RUNTIME_CONFIDENTIALITY: 22
    • O.RUNTIME_INTEGRITY: 24
    • O.TA_AUTHENTICITY: 16
    • O.TA_ISOLATION: 19
    • O.TA_PERSISTENT_TIME: 1
    • O.TEE_DATA_PROTECTI: 2
    • O.TEE_DATA_PROTECTIO: 1
    • O.TEE_DATA_PROTECTION: 16
    • O.TEE_ID: 7
    • O.TEE_ISOLATION: 14
    • O.TRUSTED_STORAGE: 26
  • OE:
    • OE.INTEGRATION_CONFIGURATION: 8
    • OE.PROTECTION_AFTER_DELIVERY: 8
    • OE.ROLLBACK: 6
    • OE.SECRETS: 4
    • OE.TA_DEVELOPMENT: 6
    • OE.TEE_ID: 3
  • OP:
    • OP.EXTRACT_KEY: 4
    • OP.LOAD: 3
    • OP.STORE: 4
    • OP.USE_KEY: 4
  • OSP:
    • OSP.INTEGRA: 1
    • OSP.INTEGRATION_CONFIGURATION: 3
    • OSP.SECRETS: 4
  • T:
    • T.ABUSE_FUNCT: 12
    • T.CLONE: 10
    • T.FLASH_DUMP: 4
    • T.IMPERSONATION: 6
    • T.PERTURBATION: 12
    • T.RAM: 8
    • T.RNG: 7
    • T.ROGUE_CODE_EXECUTI: 1
    • T.ROGUE_CODE_EXECUTION: 11
    • T.SPY: 7
    • T.STORAGE_CORRUPTION: 9
    • T.TEE_FIRMWARE_DOWNG: 1
    • T.TEE_FIRMWARE_DOWNGRADE: 5
  • O:
    • O.AUTHENTICATION: 8
    • O.CONFIDENTIALITY: 6
    • O.DATA-ACCESS: 8
    • O.HW-AES: 7
    • O.MEM-ACCESS: 10
    • O.MF-FW: 8
    • O.RND: 3
    • O.SFR-: 1
    • O.SFR-ACCESS: 7
    • O.TRANSACTION: 6
    • O.TYPE-: 1
    • O.TYPE-CONSISTENCY: 5
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • Huawei:
    • Huawei: 24
    • Huawei Technologies Co: 74
  • Thales:
    • Thales: 1
  • NXP:
    • NXP: 104
    • NXP Semiconductors: 23
  • Philips:
    • Philips: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CMAC: 6
      • HMAC: 8
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 30
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 11
    • DES:
      • DEA: 2
      • DES: 22
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
  • RSA:
    • RSA 2048: 1
    • RSA2048: 2
  • ECC:
    • ECC:
      • ECC: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 4
    • SHA2:
      • SHA224: 4
      • SHA256: 4
      • SHA384: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 27
  • RNG:
    • RND: 5
    • RNG: 3
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • CCM:
    • CCM: 1
  • CTR:
    • CTR: 2
  • GCM:
    • GCM: 1
  • OFB:
    • OFB: 1
  • XTS:
    • XTS: 3
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side-channels: 1
  • FI:
    • Malfunction: 10
    • fault injection: 4
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 14
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/tee_name
  • other:
    • TEE: 336
    • iTrustee: 93
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 1
  • FIPS:
    • FIPS 180-4: 3
    • FIPS 197: 2
    • FIPS 46: 1
    • FIPS 81: 1
  • PKCS:
    • PKCS #1: 3
    • PKCS #3: 1
    • PKCS1: 2
  • RFC:
    • RFC 2202: 1
    • RFC 3610: 1
    • RFC 4231: 2
  • CC:
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 4
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 4
    • FIPS PUB 81: 1
  • ISO:
    • ISO/IEC 14443: 16
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Huawei Technologies Co.,Ltd.
  • /CreationDate: D:20191108172443+01'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20191108172443+01'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Technical Document
  • /Title: Huawei iTrustee V3.0 on Kirin 980 Security Target
  • pdf_file_size_bytes: 1854064
  • pdf_hyperlinks: mailto:[email protected], http://www.huawei.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
  • /Alternative descriptive title: Security Target Lite
  • /Author: NXP Semiconductors
  • /CertificationID: BSI-DSZ-CC-0707
  • /Comments:
  • /Company: NXP Semiconductors
  • /Copyright date: 2011
  • /CreationDate: D:20111025074953+02'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Descriptive title: Security Target Lite
  • /Division: NXP Semiconductors
  • /Document identifier: xxx
  • /Keywords: Evaluation Documentation; CC; Security Target Lite; P5CD081V1D with DESFire EV1, P5CD081; NXP Secure Smart Card Controller; BSI_DSZ-CC-0707
  • /ModDate: D:20111025075009+02'00'
  • /Modification date: 24 October 2011
  • /Producer: Adobe PDF Library 9.0
  • /Revision: Rev. 1.1
  • /Security status: Public
  • /SourceModified: D:20111025054903
  • /Specification status: Evaluation documentation
  • /Subject:
  • /Template date: 31 March 2009
  • /Template revision: 2
  • /Template version: 2.8.3B
  • /Title: Security Target Lite
  • /docpath: D:\Aufgaben\2010\NXP_P5CD081V1A_Desfire
  • /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\99_prj_mgmt\Templates
  • /relBiblioPath: V:\DESFireEV1\ProjectManagement\90_Common_Criteria\SecurityTargetEvaluation\Bibliography.doc
  • /status:
  • /text_developer_long: NXP Semiconductors, Business Unit Identification
  • /text_developer_short: NXP
  • /text_product_cfgCD016: P5CD016V1D
  • /text_product_cfgCD021: P5CD021V1D
  • /text_product_cfgCD041: P5CD041V1D
  • /text_product_cfgCD081: P5CD081V1D
  • /text_product_cfgCN081: P5CN081V1D
  • /text_product_letter: D
  • /text_product_long: NXP Secure Smart Card Controllers P5CD016V1D / P5CD021V1D / P5CD041V1D / P5Cx081V1D with DESFire EV1
  • /text_product_minor: V1D
  • /text_product_short: P5CD081V1D with DESFire EV1
  • pdf_file_size_bytes: 667836
  • pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different