| name |
Solera DeepSee Software v6.5.0 and Solera DeepSee Central Manager v6.5.0 |
NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3 |
| category |
Detection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
CA |
DE |
| status |
archived |
archived |
| not_valid_after |
19.04.2018 |
01.09.2019 |
| not_valid_before |
12.10.2012 |
25.05.2011 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/solera-v650-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0730a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/solera-v650-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0730b_pdf.pdf |
| manufacturer |
Solera Networks, Inc. |
NXP Semiconductors Germany GmbH Business Line Identification |
| manufacturer_web |
https://www.soleranetworks.com/ |
https://www.nxp.com |
| security_level |
ALC_FLR.2, EAL3+ |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
0ca5a53f90bf0626 |
749c19baf65c3e87 |
| heuristics/cert_id |
383-4-190 |
BSI-DSZ-CC-0730-2011 |
| heuristics/cert_lab |
CANADA |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ALC_FLR.2, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, AVA_VLA.4, ASE_SPD.1, APE_INT.1, ATE_COV.2, AVA_MSU.3, APE_REQ.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
6.5.0 |
3 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0798-2012 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011 |
| heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012 |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0439-2008 |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0798-2012 |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0404-2007 |
| heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012 |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0404-2007 |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
solera-v650-cert-eng.pdf |
0730a_pdf.pdf |
| pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-190-CR
- cert_lab: CANADA
|
- DE:
- cert_id: BSI-DSZ-CC-0730-2011
- cert_item: NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- CA:
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0404-2007: 2
- BSI-DSZ-CC-0674-2011: 2
- BSI-DSZ-CC-0710-2010: 5
- BSI-DSZ-CC-0730-2011: 24
- NL:
- CC-0404-2007: 1
- CC-0674-2011: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 3: 4
- EAL 3 augmented: 2
- EAL 3+: 2
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 3
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 3
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 21
- NXP Semiconductors: 20
|
| pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 198: 1
- ISO:
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 3
- AIS 38: 1
- AIS36: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 1
- FIPS 46-3: 2
- PKCS:
|
| pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / P5CD020V0B / P5CC021V0B / P5CD012V0B, BSI-DSZ-CC-0710-2010, Version 1.0, 24.11.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B: 1
- Controller Revision 3, BSI-DSZ-CC-0730-2011, Version 3, 18.05.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
- J3A040 and J2A040 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
- J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.1, 12.05.2011, JCOP V2.4.1 Secure Smart Card: 1
- Report for NXP J3A040 and J2A040 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A040 and J2A040 Secure Smart: 1
|
| pdf_data/report_metadata |
- /Author: User
- /CCEF: CGI Security Evaluation and Test Facility
- /CR date: 10 December 2012
- /CR version: 0.6.0
- /Certificate date: 10 December 2012
- /Comments:
- /Company:
- /CreationDate: D:20130116131124-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: Solera Networks
- /Document number: 383-4-190-CR
- /ETR title, version, date: Solera DeepSee Software v6.5.0 and Solera DeepSee Central Manager v 6.5.0 ETR
- /Evaluation completion date: 12 October 2012
- /Keywords:
- /Manager:
- /ModDate: D:20130116131224-05'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ST Title: Solera DeepSee Software v6.5.0 and Solera DeepSee Central Manager v6.5.0 Security Target
- /ST date: dd month yyyy
- /ST version: ST version
- /Sponsor: Solera Networks
- /Subject:
- /TOE Version: 6.5.0
- /TOE name and version: Solera DeepSee Software v6.5.0 and Solera DeepSee Central Manager v6.5.0
- /TOE short name: Solera DeepSee
- /Title: EAL 3+ Evaluation of Solera DeepSee Software v6.5.0 and Solera DeepSee Central Manager v6.5.0
- pdf_file_size_bytes: 57203
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110629115407+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A040 and J2A040 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, JCOP 2.4.1, CC"
- /ModDate: D:20110629120130+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0730-2011
- pdf_file_size_bytes: 995280
- pdf_hyperlinks: https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
| pdf_data/st_filename |
solera-v650-sec-eng.pdf |
0730b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0404-2007: 1
- BSI-DSZ-CC-0404-2007-MA-06: 1
- BSI-DSZ-CC-0710: 3
- BSI-DSZ-CC-0730: 2
- BSI-DSZ-CC-404: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 3
- BSI-PP-0035: 3
- BSI-PP-0035-2007: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL5: 17
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 3
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 2
- AVA_VAN.4: 3
- AVA_VAN.5: 8
- AVA_VLA.4: 3
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.3: 6
- FAU_SAR.3.1: 1
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 3
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 9
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 9
- FIA_UAU.2.1: 1
- FIA_UID.1: 12
- FIA_UID.2: 12
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FTA:
- FTA_TAB.1: 6
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP: 18
- FAU_ARP.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_SAA.1: 20
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS: 10
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 28
- FCS_COP.1.1: 14
- FCS_LIM.1: 1
- FCS_LIM.2: 1
- FCS_RND.1: 2
- FCS_RND.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACF: 20
- FDP_ACF.1: 21
- FDP_ACF.1.1: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 18
- FDP_IFF: 5
- FDP_IFF.1: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT: 9
- FDP_ITT.1: 8
- FDP_RIP: 10
- FDP_RIP.1: 15
- FDP_ROL: 5
- FDP_ROL.1: 5
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 7
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_UAU: 10
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.4: 1
- FIA_UID: 13
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA: 41
- FMT_MSA.1: 10
- FMT_MSA.2: 3
- FMT_MSA.3: 12
- FMT_MTD: 6
- FMT_MTD.1: 1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 6
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT.1: 3
- FPT_FLS: 25
- FPT_FLS.1: 9
- FPT_ITT: 9
- FPT_ITT.1: 9
- FPT_PHP: 7
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_RCV: 6
- FPT_RCV.3: 8
- FPT_RCV.4: 2
- FPT_RVM.1: 6
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FRU_FLT: 6
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FTP:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.DEPLOY: 2
- A.LOCATE: 2
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.PROTECT: 2
- A.TRUSTED_ADMIN: 2
- O:
- O.ACCESS: 8
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.CRYPTO: 6
- O.SECURECOMMS: 6
- O.TIME: 3
- O.TOE_ADMIN: 6
- O.USER_AUTHEN: 8
- OE:
- OE.DEPLOY: 5
- OE.PHYSICAL: 5
- OE.PROTECT: 7
- OE.TRUSTED_ADMIN: 11
- T:
- T.ADMIN_ERROR: 2
- T.AUDIT_COMPROMISE: 2
- T.DATA_COMPROMISE: 2
- T.MASQUERADE: 2
- T.PACKET_LOSS: 2
- T.TAMPERING: 2
|
- A:
- A.NATIVE: 7
- A.NO-: 2
- A.NO-DELETION: 6
- A.NO-INSTALL: 5
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 7
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 3
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 15
- D.SEC_DATA: 5
- O:
- O.AES: 2
- O.ALARM: 5
- O.CARD-: 1
- O.CARD-MANAGEMENT: 10
- O.CIPHER: 12
- O.CONFIG: 1
- O.COPY: 1
- O.ECC: 2
- O.FAULT_PROTECT: 5
- O.FIREWALL: 9
- O.HW_AES: 2
- O.IDENTIFICATION: 6
- O.KEY-MNGT: 10
- O.MEM_ACCESS: 3
- O.MF_FW: 6
- O.OPERATE: 16
- O.OS_DECEIVE: 7
- O.PHYSICAL: 8
- O.PIN-MNGT: 5
- O.PROTECT_DATA: 10
- O.REALLOCATION: 4
- O.RESOURCES: 11
- O.REUSE: 2
- O.RND: 13
- O.RSA: 1
- O.SCP: 36
- O.SHA: 2
- O.SHRD_VAR_CON: 1
- O.SHRD_VAR_CONFID: 9
- O.SHRD_VAR_INTE: 1
- O.SHRD_VAR_INTEG: 3
- O.SID: 13
- O.SIDE_CHANNEL: 6
- O.TRANSACTION: 4
- O.XYZ: 1
- OE:
- OE.CARD-MANAGEMENT: 2
- OE.NATIVE: 5
- OE.NO-DELETION: 4
- OE.NO-INSTALL: 7
- OE.SCP: 5
- OE.USE_DIAG: 5
- OE.USE_KEY: 2
- OE.USE_KEYS: 4
- OE.VERIFICATION: 9
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 7
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 5
- OP.PUT: 5
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.PRO: 1
- OSP.PROCESS-TOE: 3
- R:
- T:
- T.ACCES: 1
- T.ACCESS_DAT: 1
- T.ACCESS_DATA: 2
- T.CONFID: 2
- T.CONFID-: 1
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.EXE-CODE: 11
- T.FAULT: 7
- T.INTEG-: 3
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 3
- T.INTEG-JCS-: 4
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKA: 1
- T.LEAKAGE: 6
- T.OS: 2
- T.OS_DE: 1
- T.OS_DECEIVE: 6
- T.OS_OP: 1
- T.OS_OPERATE: 5
- T.PHYSIC: 1
- T.PHYSICAL: 4
- T.RESOU: 1
- T.RESOURCES: 5
- T.RND: 6
- T.SID: 12
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 120
- NXP Semiconductors: 13
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Malfunction: 7
- Physical tampering: 4
- malfunction: 5
- physical tampering: 3
- SCA:
- DPA: 5
- Leak-Inherent: 7
- SPA: 4
- physical probing: 4
- side channel: 2
- side-channel: 1
- timing attack: 2
- timing attacks: 2
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-3: 1
- FIPS 186-2: 1
- FIPS 198: 1
- FIPS PUB 197: 1
- PKCS:
|
- BSI:
- FIPS:
- FIPS 180-3: 3
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 180-3: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 1
- GlobalPlatform 2.1.1: 2
- JavaCard:
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 4. TOE Groups Overview Group Description Scope NXP Semiconductors JCOP 2: 1
- out of scope: 1
|
| pdf_data/st_metadata |
|
- /Author: NXP Semiconductors
- /CreationDate: D:20110513095203
- /Creator: Microsoft® Office Word 2007
- /Keywords: Common Criteria Evaluation, NXP J3A040, J2A040, Revision 3, JavaCard
- /ModDate: D:20110513095203
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Evaluation
- /Title: Security Target Lite
- pdf_file_size_bytes: 1914693
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 116
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |