Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Websense V10000 G2 Web Gateway Appliance v7.6
383-4-179
J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
NSCIB-CC-13-37761-CR2
name Websense V10000 G2 Web Gateway Appliance v7.6 J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA NL
not_valid_after 15.05.2017 05.08.2018
not_valid_before 18.01.2012 26.08.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37761-CR2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_v00.02.pdf
manufacturer Websense, Inc. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.websense.com https://www.nxp.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, ASE_TSS.2, AVA_VAN.5
dgst 2fa07c60f571d282 ef5701cc183f2e46
heuristics/cert_id 383-4-179 NSCIB-CC-13-37761-CR2
heuristics/cert_lab CANADA
heuristics/cpe_matches {} cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j2e081_m64:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 7.6 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/report_references/directly_referencing {} NSCIB-CC-13-37762-CR, BSI-DSZ-CC-0633-V2-2014
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0555-2009, NSCIB-CC-13-37762-CR
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0825-2017, BSI-DSZ-CC-0821-2014
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/protection_profiles {} 85bef5b6f16c4d33
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename websense-v76-cert-eng.pdf [CR] NSCIB-CC-13-37761-CR2.pdf
pdf_data/report_frontpage
  • NL:
  • CA:
    • cert_id: 383-4-179-CR
    • cert_lab: CANADA
  • NL:
    • cert_id: NSCIB-CC-13-37761-CR2
    • cert_item: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, and J3E041_M64 Secure Smart Card Controller Revision 3
    • cert_lab: Brightsight
    • developer: NXP Semiconductors Germany GmbH
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-179-CR: 1
  • DE:
    • BSI-DSZ-CC-0633-V2-: 1
    • BSI-DSZ-CC-0633-V2-2014: 1
    • BSI-DSZ-CC-0857: 2
    • BSI-DSZ-CC-0857-: 1
    • BSI-DSZ-CC-783: 1
    • BSI-DSZ-CC-784: 1
    • BSI-DSZ-CC-860: 1
  • NL:
    • CC-0857: 1
    • NSCIB-CC-13-37760: 1
    • NSCIB-CC-13-37761: 4
    • NSCIB-CC-13-37761-CR2: 14
    • NSCIB-CC-13-37762: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 2
    • EAL 2+: 2
    • EAL2: 1
  • EAL:
    • EAL4: 2
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 2
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
  • other:
    • JIL: 5
    • JIL-AM: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 9
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS36: 2
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 3
  • JavaCard:
    • Java Card 3.0.1: 3
pdf_data/report_metadata
  • /Author: Shawn Pinet
  • /CCEF: CGI IT Security Evaluation & Test Facility
  • /CR date: 23 December 2011
  • /CR version: 0.1
  • /Certificate date: dd month yyyy
  • /Company:
  • /CreationDate: D:20120202110905-05'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Websense, Inc.
  • /Document number: 383-4-179-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /Keywords: Internet Proxy, Web Gateway, Triton, Websense
  • /Manager:
  • /ModDate: D:20120202110951-05'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: Websense, Inc. V10000 G2 Web Gateway Appliance v7.6 Security Target
  • /ST date: 22 December 2011
  • /ST version: 1.0
  • /SourceModified: D:20120202160256
  • /Sponsor: Websense, Inc.
  • /Subject:
  • /TOE Version: 7.6
  • /TOE name and version: Websense V10000 G2 Web Gateway Appliance v7.6
  • /TOE short name: Websense V10000 G2 7.6
  • /Title: EAL 2 Evaluation of V10000 G2 v7.6
  • pdf_file_size_bytes: 85151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename websense-v76-sec-eng.pdf ST_Lite_JxE081_v00.02.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0633-: 1
    • BSI-DSZ-CC-0857: 1
    • BSI-DSZ-CC-0857-2013: 1
    • BSI-DSZ-CC-0858: 1
  • NL:
    • NSCIB-CC-13-37761: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 2
    • BSI-PP-0035: 2
    • BSI-PP-0035-2007: 1
    • BSI-PP-0035-2007“: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 4
    • EAL2 augmented: 1
    • EAL2+: 3
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 19
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 3
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 16
    • FAU_SAR: 6
    • FAU_SAR.1: 11
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ROL: 1
    • FDP_ROL.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SAE.1: 6
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 6
    • FRU_FLT.2.1: 1
    • FRU_RSA: 8
    • FRU_RSA.1: 6
  • FTA:
    • FTA_MCS.1: 1
    • FTA_MCS.2: 6
    • FTA_MCS.2.1: 1
    • FTA_MCS.2.2: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_ARP.1: 29
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 2
    • FAU_SAS: 13
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 47
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 8
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 42
    • FCS_CKM.4.1: 1
    • FCS_COP: 33
    • FCS_COP.1: 26
    • FCS_RNG: 13
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 72
    • FDP_ACC.1: 19
    • FDP_ACC.2: 9
    • FDP_ACF: 65
    • FDP_ACF.1: 39
    • FDP_IFC: 26
    • FDP_IFC.1: 17
    • FDP_IFC.2: 2
    • FDP_IFF: 19
    • FDP_IFF.1: 13
    • FDP_ITC: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 22
    • FDP_RIP: 91
    • FDP_RIP.1: 10
    • FDP_ROL: 11
    • FDP_ROL.1: 5
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 2
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU.1: 3
    • FIA_UID: 18
    • FIA_UID.1: 11
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 146
    • FMT_MSA.1: 16
    • FMT_MSA.2: 3
    • FMT_MSA.3: 27
    • FMT_MTD: 18
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_REV: 1
    • FMT_SMF: 42
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 40
    • FPT_FLS.1: 25
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 1
    • FPT_PHP: 6
    • FPT_PHP.3: 3
    • FPT_RCV: 10
    • FPT_RCV.3: 4
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT: 11
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.EXCLUSIVE: 2
    • A.INSTALL: 2
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NETWORK: 2
    • A.NOEVIL: 2
  • O:
    • O.AUDIT: 12
    • O.AUTHENTICATE: 11
    • O.DB_RESILIENCY: 7
    • O.HARMFUL_CONTENT: 8
    • O.MANAGE: 10
    • O.PROTECT: 9
    • O.QUOTA: 6
    • O.RESOURCE_CONTROL: 8
    • O.TIMESTAMP: 5
  • OE:
    • OE.NETWORK: 3
  • T:
    • T.DB_FAILURE: 2
    • T.EXTERNAL_CONTENT: 2
    • T.MASQUERADE: 2
    • T.NACCESS: 2
    • T.RESOURCE: 2
    • T.UNAUTHORIZED_ACCESS: 2
  • A:
    • A.APPLET: 4
    • A.NATIVE: 1
    • A.PPROCESS-SEC-IC: 1
    • A.PROCESS-SEC-IC: 1
    • A.PROCESS_SEC_IC: 2
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 5
    • A.VERIFICATION: 3
  • D:
    • D.ADMIN_CONF_DATA: 3
    • D.API_DATA: 3
    • D.APP_CODE: 10
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 8
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PERSO_CONF_DATA: 4
    • D.PIN: 12
    • D.SEC_DATA: 7
  • O:
    • O.APPLET: 18
    • O.CIPHER: 1
    • O.CODE_: 1
    • O.CODE_PKG: 13
    • O.EXT-MEM: 1
    • O.EXT_MEM_IN: 2
    • O.EXT_MEM_INSTANCE: 8
    • O.JAVAOBJECT: 36
    • O.NON_SB_CONTENT: 1
    • O.NON_SB_SFR: 4
    • O.REMOTE_MTHD: 4
    • O.REMOTE_OBJ: 4
    • O.RMI_SERVICE: 5
    • O.ROR: 2
    • O.SB_CONTENT: 3
    • O.SB_SFR: 5
    • O.SCP: 1
  • OE:
    • OE.APPLET: 7
    • OE.CARD-MANAGEMENT: 1
    • OE.NATIVE: 1
    • OE.PROCESS_SEC_IC: 6
    • OE.SCP: 2
    • OE.USE_DIAG: 9
    • OE.USE_KEYS: 7
    • OE.VERIFICATION: 20
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 6
    • OP.INVK_VIRTUAL: 5
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.RET_RORD: 2
    • OP.SB_ACCESS: 3
    • OP.SB_ACCESS_SFR: 3
    • OP.THROW: 4
    • OP.TYPE_ACCESS: 4
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.PROCESS-TOE: 5
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 15
    • OT.CARD-: 2
    • OT.CARD-MANAGEMENT: 17
    • OT.CIPHER: 11
    • OT.DELETION: 7
    • OT.EXT-MEM: 14
    • OT.FIREWALL: 18
    • OT.GLOBAL_ARRAYS_CONFID: 9
    • OT.GLOBAL_ARRAYS_INTEG: 10
    • OT.IDENTIFICATION: 9
    • OT.INSTALL: 10
    • OT.KEY-: 1
    • OT.KEY-MNGT: 9
    • OT.LOAD: 9
    • OT.MF_FW: 8
    • OT.NATIVE: 9
    • OT.OBJ-DELETION: 8
    • OT.OPERATE: 21
    • OT.PIN-MNGT: 11
    • OT.REALLOCATION: 9
    • OT.REMOTE: 8
    • OT.RESOURCES: 10
    • OT.RND: 13
    • OT.SCP: 40
    • OT.SEC_BOX_FW: 10
    • OT.SID: 13
    • OT.TRANSACTION: 9
    • OT.VERIFICATION: 1
    • OT.XYZ: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 5
    • T.DELETION: 4
    • T.EXE-CODE: 8
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 8
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 5
    • T.INTEG-JCS-DATA: 5
    • T.NATIVE: 5
    • T.OBJ-DELETION: 4
    • T.OS_OPERATE: 7
    • T.PHYSICAL: 4
    • T.RESOURCES: 4
    • T.RND: 7
    • T.SEC_BOX_BORDER: 7
    • T.SID: 8
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 23
    • NXP Semiconductors: 18
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 7
      • TripleDES: 1
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CBC-MAC: 7
      • CMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 19
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 13
    • SHA2:
      • SHA-2: 3
      • SHA-224: 8
      • SHA-256: 14
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 21
    • RNG: 17
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 24
  • ECB:
    • ECB: 5
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Fault Injection: 1
    • Physical tampering: 3
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 10
    • SPA: 2
    • physical probing: 3
    • side channel: 17
    • side-channel: 1
    • side-channels: 2
    • timing attack: 1
    • timing attacks: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 2
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 142
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 8
    • AIS31: 2
  • CC:
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-3: 6
    • FIPS 186-3: 5
    • FIPS 197: 2
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 9796-: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#3: 2
    • PKCS1: 1
  • RFC:
    • RFC 5639: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • GlobalPlatform 2.2.1: 2
  • JavaCard:
    • Java Card 3.0.1: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‘IT’ are considered in the TOE IT environment, and groups marked with ‘—‘ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: NXP Semiconductors
  • /CreationDate: D:20140814171823+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: JCOP, Security Target Lite, EAL5+
  • /ModDate: D:20140814173505+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1527330
  • pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 137
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different