name |
FM1280 V05 |
NXP J3A128 and J3A095 Secure Smart Card Controller Revision 3 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
DE |
status |
archived |
archived |
not_valid_after |
02.07.2023 |
01.09.2019 |
not_valid_before |
02.07.2018 |
15.04.2011 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-109%20C%20v%202.0.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-109%20Certification%20Report%20Fudan%20EAL5plus%20v2.0_rev.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0731a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/FM1280%20EAL5plus%20ST%20lite%20v2.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0731b_pdf.pdf |
manufacturer |
Shanghai Fudan Microelectronics Group Co., Ltd. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://eng.fmsh.com |
https://www.nxp.com |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
29eab60d2793d1a1 |
eae2ae41a23c2d00 |
heuristics/cert_id |
SERTIT-109 |
BSI-DSZ-CC-0731-2011 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 |
heuristics/extracted_versions |
- |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0744-2011 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0675-2011 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0744-2011 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0675-2011, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 02.07.2018
- developer: Shanghai Fudan Microelectronics Group Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-109
- certification_date: 02.07.2018
- description: The TOE is a Dual Interface Smart Card Chip with IC Dedicated Software. It provides TDES, RSA, AES, ECC,True Random Number Generator and other security features. It can be widely and easily applied in various security fields such as banking and financial market, social security card, transport card, small-amount payment and security identification, etc. The TOE supports the following communication interfaces: - ISO/IEC 14443 TYPE A contactless interface - ISO/IEC 7816 contact interface - GPIO - SPI - I2C - UART
- developer: Shanghai Fudan Microelectronics Group Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135331-1607953855/SERTIT/Sertifikater/2018/109/SERTIT-109%20C%20v%202.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135325-1607953847/SERTIT/Sertifikater/2018/109/FM1280%20EAL5%2B%20ST%20lite.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135328-1607953852/SERTIT/Sertifikater/2018/109/SERTIT-109%20Certification%20Report%20Fudan%20EAL5%2B%20v2.0_rev.pdf'})], 'maintenance': [frozendict({'href': 'https://sertit.no/getfile.php/135322-1607953843/SERTIT/Sertifikater/2018/109/SERTIT-109%20MR%20Maintenance%20Report%20v1.0-.pdf'})]})
- evaluation_facility: Brightsight B.V.
- expiration_date: 02.07.2023
- level: EAL 5, ALC_DVS.2, ATE_DPT.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: V05
- protection_profile: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, BSI-CC-PP-0084-2014
- sponsor: Shanghai Fudan Microelectronics Group Co., Ltd.
- product: FM1280
- url: https://sertit.no/certified-products/product-archive/fm1280
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0744-2011 |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0645-2010 |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0744-2011 |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0645-2010 |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
{} |
pdf_data/cert_filename |
SERTIT-109 C v 2.0.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- pdf_file_size_bytes: 2830569
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
SERTIT-109 Certification Report Fudan EAL5plus v2.0_rev.pdf |
0731a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0731-2011
- cert_item: NXP J3A128 and J3A095 Secure Smart Card Controller Revision 3
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0645-2010: 4
- BSI-DSZ-CC-0675-2011: 2
- BSI-DSZ-CC-0731-2011: 24
- BSI-DSZ-CC-0750-2011: 5
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 5: 22
- EAL 5 augmented: 1
- EAL1: 1
- EAL4: 1
- EAL5: 1
- EAL5+: 1
- EAL7: 1
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 3
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 3
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 4
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_COP.1: 8
- FCS_RNG.1: 4
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDC.1: 4
- FDP_SDI.2: 3
- FMT:
- FMT_LIM.1: 2
- FMT_LIM.2: 2
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 23
- NXP Semiconductors: 20
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 15408: 8
- ISO/IEC 7816: 2
|
- BSI:
- AIS 20: 2
- AIS 25: 2
- AIS 26: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 3
- AIS 36: 3
- AIS 38: 1
- AIS36: 1
- FIPS:
- FIPS 180-1: 3
- FIPS 197: 1
- FIPS 46-3: 2
- PKCS:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- / P5CD128V0A, MSO / P5CC128V0A, MSO, BSI-DSZ-CC-0750-2011, Version 6.0, 04.03.2011, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0645-2010 for NXP Secure PKI Smart Card Controllers: 1
- Controller Rev. 3, BSI-DSZ-CC-0731-2011, Version 2, 14.04.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
- J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.0, 09.03.2011, JCOP V2.4.1 Secure Smart Card: 1
- J3A128 and J3A095 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
- for NXP J3A128 and J3A095 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A128 and J3A095 Secure Smart: 1
|
pdf_data/report_metadata |
- /Author: Ulrich Isachsen
- /CreationDate: D:20190319130354+01'00'
- /Creator: Microsoft® Word 2013
- /Keywords: ugradert
- /ModDate: D:20190319130354+01'00'
- /Producer: Microsoft® Word 2013
- /Title: tittel
- pdf_file_size_bytes: 423796
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110418151756+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A128 and J3A095 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, CC"
- /ModDate: D:20110418152051+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0731-2011
- pdf_file_size_bytes: 994773
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
FM1280 EAL5plus ST lite v2.0.pdf |
0731b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0645-2010: 1
- BSI-DSZ-CC-0731: 2
- BSI-DSZ-CC-0750: 1
- BSI-DSZ-CC-645: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0084-2014: 1
|
- BSI:
- BSI-PP-0002: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0017: 3
- BSI-PP-0035: 3
- BSI-PP-0035-2007: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 1
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL5: 17
- EAL5 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 3
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 3
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 10
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.4: 3
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.4: 9
- FCS_COP.1: 28
- FCS_COP.1.1: 4
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 7
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 13
- FDP_ITC.2: 5
- FDP_ITT.1: 6
- FDP_SDC.1: 7
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 2
- FMT_MSA.3: 3
- FPT:
- FPT_FLS.1: 6
- FPT_ITT.1: 6
- FPT_PHP.3: 5
- FRU:
|
- FAU:
- FAU_ARP: 18
- FAU_ARP.1: 1
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_SAA.1: 20
- FAU_SAA.1.1: 1
- FAU_SAA.1.2: 1
- FAU_SAS: 10
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP: 52
- FCS_COP.1: 28
- FCS_COP.1.1: 14
- FCS_LIM.1: 1
- FCS_LIM.2: 1
- FCS_RND.1: 2
- FCS_RND.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 24
- FDP_ACC.1: 10
- FDP_ACC.2: 4
- FDP_ACF: 20
- FDP_ACF.1: 21
- FDP_ACF.1.1: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC.1: 5
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC: 17
- FDP_IFC.1: 18
- FDP_IFF: 5
- FDP_IFF.1: 11
- FDP_ITC.1: 9
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_ITT: 9
- FDP_ITT.1: 8
- FDP_RIP: 10
- FDP_RIP.1: 15
- FDP_ROL: 5
- FDP_ROL.1: 5
- FDP_SDI.2: 5
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 7
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_UAU: 10
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.4: 1
- FIA_UID: 13
- FIA_UID.1: 2
- FIA_UID.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FMT_MSA: 41
- FMT_MSA.1: 10
- FMT_MSA.2: 3
- FMT_MSA.3: 12
- FMT_MTD: 6
- FMT_MTD.1: 1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_SMF.1: 13
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 6
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_AMT.1: 3
- FPT_FLS: 25
- FPT_FLS.1: 9
- FPT_ITT: 9
- FPT_ITT.1: 9
- FPT_PHP: 7
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 5
- FPT_RCV: 6
- FPT_RCV.3: 8
- FPT_RCV.4: 2
- FPT_RVM.1: 6
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 2
- FRU:
- FRU_FLT: 6
- FRU_FLT.1: 1
- FRU_FLT.2: 8
- FTP:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 5
- O.ECC: 5
- O.MEM_ACCCESS: 1
- O.MEM_ACCESS: 4
- O.RND: 3
- O.RSA: 5
- O.TDES: 6
- T:
|
- A:
- A.NATIVE: 7
- A.NO-: 2
- A.NO-DELETION: 6
- A.NO-INSTALL: 5
- A.USE_DIAG: 6
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 7
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 3
- D.APP_I_DATA: 7
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.JAVA_OBJECT: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PIN: 15
- D.SEC_DATA: 5
- O:
- O.AES: 2
- O.ALARM: 5
- O.CARD-: 1
- O.CARD-MANAGEMENT: 10
- O.CIPHER: 12
- O.CONFIG: 1
- O.COPY: 1
- O.ECC: 2
- O.FAULT_PROTECT: 5
- O.FIREWALL: 9
- O.HW_AES: 2
- O.IDENTIFICATION: 6
- O.KEY-MNGT: 10
- O.MEM_ACCESS: 3
- O.MF_FW: 6
- O.OPERATE: 16
- O.OS_DECEIVE: 7
- O.PHYSICAL: 8
- O.PIN-MNGT: 5
- O.PROTECT_DATA: 10
- O.REALLOCATION: 4
- O.RESOURCES: 11
- O.REUSE: 2
- O.RND: 13
- O.RSA: 1
- O.SCP: 35
- O.SHA: 2
- O.SHRD_VAR_CON: 1
- O.SHRD_VAR_CONFID: 9
- O.SHRD_VAR_INTE: 1
- O.SHRD_VAR_INTEG: 3
- O.SID: 13
- O.SIDE_CHANNEL: 6
- O.TRANSACTION: 4
- O.XYZ: 1
- OE:
- OE.CARD-MANAGEMENT: 2
- OE.NATIVE: 5
- OE.NO-DELETION: 4
- OE.NO-INSTALL: 7
- OE.SCP: 5
- OE.USE_DIAG: 5
- OE.USE_KEY: 2
- OE.USE_KEYS: 4
- OE.VERIFICATION: 9
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 3
- OP.CREATE: 7
- OP.INSTANCE_FIELD: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 3
- OP.JAVA: 5
- OP.PUT: 5
- OP.THROW: 3
- OP.TYPE_ACCESS: 3
- OSP:
- OSP.PRO: 1
- OSP.PROCESS-TOE: 3
- R:
- T:
- T.ACCES: 1
- T.ACCESS_DAT: 1
- T.ACCESS_DATA: 2
- T.CONFID: 2
- T.CONFID-: 1
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.EXE-CODE: 11
- T.FAULT: 7
- T.INTEG-: 3
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 1
- T.INTEG-APPLI-DATA: 3
- T.INTEG-JCS-: 4
- T.INTEG-JCS-CODE: 4
- T.INTEG-JCS-DATA: 3
- T.LEAKA: 1
- T.LEAKAGE: 6
- T.OS: 2
- T.OS_DE: 1
- T.OS_DECEIVE: 6
- T.OS_OP: 1
- T.OS_OPERATE: 5
- T.PHYSIC: 1
- T.PHYSICAL: 4
- T.RESOU: 1
- T.RESOURCES: 5
- T.RND: 6
- T.SID: 12
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 121
- NXP Semiconductors: 13
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 16
- Triple-DES: 7
- DES:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 5
- fault injection: 1
- malfunction: 4
- SCA:
- Leak-Inherent: 5
- Physical Probing: 2
- physical probing: 2
|
- FI:
- DFA: 3
- Malfunction: 7
- Physical tampering: 4
- malfunction: 5
- physical tampering: 3
- SCA:
- DPA: 5
- Leak-Inherent: 7
- SPA: 4
- physical probing: 4
- side channel: 2
- side-channel: 1
- timing attack: 2
- timing attacks: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 4
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-67: 1
- PKCS:
|
- BSI:
- FIPS:
- FIPS 180-1: 1
- FIPS 180-3: 2
- FIPS 197: 1
- FIPS 46-3: 2
- FIPS PUB 180-3: 1
- ICAO:
- ISO:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.1.1: 1
- GlobalPlatform 2.1.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 4. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: FMSH
- /CreationDate: D:20180606084137+08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20180606084137+08'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 677458
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
- /Author: NXP Semiconductors
- /CreationDate: D:20110331110726
- /Creator: Microsoft® Office Word 2007
- /Keywords: Common Criteria Evaluation, NXP J3A128, J2A095, Revision 3, JavaCard
- /ModDate: D:20110331110726
- /Producer: Microsoft® Office Word 2007
- /Subject: Common Criteria Evaluation
- /Title: Security Target Lite
- pdf_file_size_bytes: 1915852
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 116
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |