name |
LEO V2 |
J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
NL |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
16.10.2018 |
not_valid_before |
19.07.2012 |
16.10.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-37fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37762-CR.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-37en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_DF_00.03.pdf |
manufacturer |
Ingenico Healthcare/e-ID |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.ingenico.com |
https://www.nxp.com |
security_level |
ADV_FSP.4, ALC_FLR.3, AVA_VAN.3, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 |
ASE_TSS.2, ALC_DVS.2, EAL4+, AVA_VAN.5 |
dgst |
33537b8a859fdc32 |
0f76ffd0c75b9402 |
heuristics/cert_id |
ANSSI-CC-2012/37 |
NSCIB-CC-13-37762-CR |
heuristics/cert_lab |
SERMA |
|
heuristics/cpe_matches |
{} |
cpe:2.3:h:nxp:j3e016_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66_df:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:* |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
CVE-2021-3011 |
heuristics/direct_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
- |
3 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2016/53 |
NSCIB-CC-13-37761-CR2, NSCIB-CC-13-37760-CR2 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0707-2012 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2016/53 |
OCSI/CERT/CCL/09/2022/RC, BSI-DSZ-CC-0914-2014, OCSI/CERT/SYS/02/2016/RC, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0911-2014, BSI-DSZ-CC-0912-2014, OCSI/CERT/SYS/04/2015/RC, OCSI/CERT/SYS/06/2016/RC, OCSI/CERT/SYS/03/2016/RC, BSI-DSZ-CC-0821-2014, OCSI/CERT/SYS/05/2015/RC, NSCIB-CC-13-37760-CR2, OCSI/CERT/CCL/05/2021/RC, OCSI/CERT/CCL/06/2021/RC, BSI-DSZ-CC-0825-2017, NSCIB-CC-13-37761-CR2, OCSI/CERT/SYS/05/2016/RC |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0707-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
86afa36bc4e78466 |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2012-01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
ANSSI-CC_2012-37fr.pdf |
[CR] NSCIB-CC-13-37762-CR.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: EAL3 Augmenté ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_FLR.3, ALC_TAT.1 et AVA.VAN.3
- cc_version: CC version 3.1 révision 3
- cert_id: ANSSI-CC-2012/37
- cert_item: LEO V2
- cert_item_version: Référence PPD001-003-AXY, Version PK08.12
- cert_lab: SERMA Technologies 30 avenue Gustave Eiffel, 33608 Pessac France
- developer: Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France Commanditaire Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP LSCIHM], version v1.6 Lecteur sécurisé de carte avec interface homme machine
- NL:
|
- FR:
- NL:
- cert_id: NSCIB-CC-13-37762-CR
- cert_item: NXP J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF,J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
- cert_lab: Brightsight
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2011-31: 1
- ANSSI-CC-2012/37: 14
- ANSSI-CC-PP-2012/01: 1
|
- DE:
- BSI-DSZ-CC-0707: 2
- BSI-DSZ-CC-0707-2012: 1
- BSI-DSZ-CC-0864: 1
- BSI-DSZ-CC-783: 1
- BSI-DSZ-CC-784: 1
- BSI-DSZ-CC-860: 1
- NL:
- NSCIB-CC-13-37761: 1
- NSCIB-CC-13-37762: 6
- NSCIB-CC-13-37762-CR: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 3+: 1
- EAL 5: 1
- EAL 7: 1
- EAL3: 2
- EAL4: 2
- ITSEC:
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 3
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_FSP.4: 2
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- ADV_TDS.3: 2
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_FLR: 2
- ALC_FLR.3: 2
- ALC_LCD: 1
- ALC_TAT: 1
- ALC_TAT.1: 2
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 3
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 21
- NXP Semiconductors: 3
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
- BSI:
- ICAO:
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 2
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20120720163953+02'00'
- /Creator: PDFCreator Version 0.9.0
- /Keywords:
- /ModDate: D:20120727112114+02'00'
- /Producer: AFPL Ghostscript 8.53
- /Subject:
- /Title:
- pdf_file_size_bytes: 124103
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
|
pdf_data/st_filename |
ANSSI-CC-cible_2012-37en.pdf |
ST_Lite_JxE081_DF_00.03.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0707: 3
- BSI-DSZ-CC-0864: 3
- NL:
- CC-0707: 2
- NSCIB-CC-13-37762: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0017: 2
- BSI-PP-0035: 2
- BSI-PP-0035-2007: 1
- BSI-PP-0035-2007―: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL3: 2
- EAL3 augmented: 1
- EAL3+: 19
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 1
- EAL4: 20
- EAL4 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 2
- ADV_IMP.1: 2
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.3: 3
- ALC_LCD.1: 1
- ALC_TAT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 2
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 4
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 3
- ASE_TSS.2: 7
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 8
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 2
- FDP_IFC.1.1: 3
- FDP_IFF.1: 2
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_PHP.1.1: 2
- FDP_PHP.1.2: 2
- FDP_RIP: 1
- FDP_RIP.2: 1
- FDP_RIP.2.1: 3
- FMT:
- FPT:
- FPT_PHP: 1
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1.1: 3
|
- FAU:
- FAU_ARP.1: 29
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 2
- FAU_SAS: 13
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCO:
- FCS:
- FCS_CKM.1: 46
- FCS_CKM.1.1: 1
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 47
- FCS_CKM.4.1: 1
- FCS_COP: 35
- FCS_COP.1: 37
- FCS_RNG: 17
- FCS_RNG.1: 21
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 72
- FDP_ACC.1: 24
- FDP_ACC.2: 9
- FDP_ACF: 65
- FDP_ACF.1: 44
- FDP_IFC: 26
- FDP_IFC.1: 17
- FDP_IFC.2: 2
- FDP_IFF: 19
- FDP_IFF.1: 13
- FDP_ITC: 10
- FDP_ITC.1: 17
- FDP_ITC.2: 27
- FDP_RIP: 91
- FDP_RIP.1: 10
- FDP_ROL: 11
- FDP_ROL.1: 10
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 12
- FIA_AFL.1: 2
- FIA_ATD: 9
- FIA_ATD.1: 2
- FIA_UAU.1: 3
- FIA_UAU.2: 4
- FIA_UAU.5: 4
- FIA_UID: 18
- FIA_UID.1: 11
- FIA_UID.2: 6
- FIA_USB: 8
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 146
- FMT_MSA.1: 21
- FMT_MSA.2: 3
- FMT_MSA.3: 32
- FMT_MTD: 18
- FMT_MTD.1: 7
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 42
- FMT_SMF.1: 29
- FMT_SMF.1.1: 1
- FMT_SMR: 35
- FMT_SMR.1: 39
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 40
- FPT_FLS.1: 25
- FPT_FLS.1.1: 1
- FPT_ITC.1: 1
- FPT_PHP: 6
- FPT_PHP.3: 3
- FPT_RCV: 10
- FPT_RCV.3: 4
- FPT_RPL.1: 6
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 18
- FTP_ITC.1: 6
- FTP_TRP.1: 8
|
pdf_data/st_keywords/cc_claims |
- A:
- A.USER: 5
- A.USER_DIS: 2
- A.USER_KEYPAD: 1
- A.USER_PIN: 2
- A.USER_UNOBSERVED: 2
- A.USER_USAGE: 1
- O:
- O.HARD_EVIDENT: 7
- O.REVEAL: 5
- O.SIGNAL: 3
- OE:
- OE.MANUAL: 3
- OE.PRIVATE: 2
- OP:
- OP.D_CONTROL: 1
- OP.P_ENTRY: 2
- OP.P_VERIFY: 1
- OSP:
- T:
- T.DIS: 1
- T.PIN_DISCLOSE: 1
- T.PIN_DISCLOSEE: 1
- T.PIN_MODIFY: 2
|
- A:
- A.APPLET: 4
- A.DF_SECURE-: 1
- A.DF_SECURE-VALUE: 1
- A.DF_SECURE-VALUES: 4
- A.DF_TERMINAL-: 1
- A.DF_TERMINAL-SUPPORT: 4
- A.NATIVE: 1
- A.PPROCESS-SEC-IC: 1
- A.PROCESS-SEC-IC: 2
- A.PROCESS_SEC_IC: 2
- A.USE_DIAG: 7
- A.USE_KEY: 1
- A.USE_KEYS: 6
- A.VERIFICATION: 3
- D:
- D.ADMIN_CONF_DATA: 3
- D.API_DATA: 3
- D.APP_CODE: 10
- D.APP_C_DATA: 3
- D.APP_I_DATA: 8
- D.APP_KEY: 1
- D.CRYPTO: 7
- D.DF_CODE: 1
- D.DF_DATA: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PERSO_CONF_DATA: 4
- D.PIN: 12
- D.SEC_DATA: 7
- O:
- O.APPLET: 18
- O.CIPHER: 1
- O.CODE_: 1
- O.CODE_PKG: 13
- O.DF_TYPE-CONSISTENCY: 1
- O.EXT-MEM: 1
- O.EXT_MEM_IN: 2
- O.EXT_MEM_INSTANCE: 8
- O.JAVAOBJECT: 36
- O.NON_SB_CONTENT: 1
- O.NON_SB_SFR: 4
- O.REMOTE_MTHD: 4
- O.REMOTE_OBJ: 4
- O.RMI_SERVICE: 5
- O.ROR: 2
- O.SB_CONTENT: 3
- O.SB_SFR: 5
- O.SCP: 1
- OE:
- OE.APPLET: 7
- OE.CARD-MANAGEMENT: 1
- OE.DF_SECURE-VALUES: 4
- OE.DF_TERMINAL-SUPPORT: 1
- OE.NATIVE: 1
- OE.PROCESS_SEC_IC: 6
- OE.SCP: 2
- OE.USE_DIAG: 9
- OE.USE_KEYS: 7
- OE.VERIFICATION: 20
- OE.XYZ: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_INSTANCE: 3
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 6
- OP.INVK_VIRTUAL: 5
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.READ_EXT_MEM: 3
- OP.RET_RORD: 2
- OP.SB_ACCESS: 3
- OP.SB_ACCESS_SFR: 3
- OP.THROW: 4
- OP.TYPE_ACCESS: 4
- OP.WRITE_EXT_MEM: 3
- OSP:
- OSP.PROCESS-TOE: 5
- OSP.VERIFICATION: 3
- OT:
- OT.ALARM: 15
- OT.CARD-: 2
- OT.CARD-MANAGEMENT: 17
- OT.CIPHER: 10
- OT.DELETION: 6
- OT.DF_AUTHENTICATION: 7
- OT.DF_CONFIDENTIALITY: 7
- OT.DF_DATA-: 1
- OT.DF_DATA-ACCESS: 7
- OT.DF_TRANSACTION: 7
- OT.DF_TYPE-: 1
- OT.DF_TYPE-CONSISTENCY: 5
- OT.EXT-MEM: 13
- OT.FIREWALL: 17
- OT.GLOBAL_ARRAYS_CONFID: 9
- OT.GLOBAL_ARRAYS_INTEG: 9
- OT.IDENTIFICATION: 10
- OT.INSTALL: 9
- OT.KEY-: 1
- OT.KEY-MNGT: 9
- OT.LOAD: 9
- OT.MF_FW: 8
- OT.NATIVE: 9
- OT.OBJ-DELETION: 8
- OT.OPERATE: 20
- OT.PIN-MNGT: 10
- OT.REALLOCATION: 9
- OT.REMOTE: 8
- OT.RESOURCES: 9
- OT.RND: 11
- OT.SCP: 37
- OT.SEC_BOX_FW: 10
- OT.SID: 13
- OT.TRANSACTION: 8
- OT.VERIFICATION: 1
- OT.XYZ: 1
- R:
- T:
- T.CONFID-APPLI-DATA: 5
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 5
- T.DELETION: 4
- T.DF_CLONING: 6
- T.DF_DATA-MODIFICATION: 5
- T.DF_DATA_MODIFICATION: 1
- T.DF_IMPERSONATE: 6
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 4
- T.INTEG-APPLI-: 2
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 5
- T.NATIVE: 5
- T.OBJ-DELETION: 4
- T.OS_OPERATE: 7
- T.PHYSICAL: 4
- T.RESOURCES: 4
- T.RND: 7
- T.SEC_BOX_BORDER: 7
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 158
- NXP Semiconductors: 22
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDEA: 1
- TDES: 2
- Triple-DES: 7
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 8
- SHA-256: 14
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 7
- Fault Injection: 1
- Physical tampering: 3
- fault injection: 1
- malfunction: 5
- physical tampering: 1
- SCA:
- DPA: 10
- SPA: 2
- physical probing: 3
- side channel: 17
- side-channel: 1
- side-channels: 2
- timing attack: 1
- timing attacks: 6
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- FIPS:
- FIPS 180-3: 6
- FIPS 186-3: 5
- FIPS 197: 2
- FIPS 46-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-2: 1
- FIPS PUB 186-3: 1
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 11770: 2
- ISO/IEC 15946-1: 1
- ISO/IEC 9796-: 1
- PKCS:
- PKCS #1: 1
- PKCS#1: 2
- PKCS#3: 2
- PKCS1: 1
- RFC:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 2
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform 2.2.1: 1
- GlobalPlatform 2.2.1: 2
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.applet: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 2
- javacardx.rmi: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- Workstation. The PC may be a Microsoft Windows, Mac or Linux OS powered. The security of the PC is out of scope of the TOE. As a Personal Identification Number (also known and referred as ‘PIN’) is required for: 1
- entry functionality can be activated from a software application loaded in the PC (not provided and out of scope of this TOE), and used in conjunction with a secure smartcard (not provided and out of scope of: 1
- not provided and out of scope of this TOE: 2
- out of scope: 3
|
- OutOfScope:
- Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
- /Author: NXP Semiconductors
- /CreationDate: D:20130813120145Z
- /Creator: Microsoft® Office Word 2007
- /Keywords: JCOP, ST, Security Target Lite
- /ModDate: D:20130813120256+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Security Target Lite
- /Title: NXP J3E081_M64_DF, J3E081_M66_DF, J3E041_M66_DF, J3E016_M66_DF, J3E041_M64_DF and J3E016_M64_DF Secure Smart Card Controller Revision 3
- pdf_file_size_bytes: 1629614
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 144
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |