Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ZTE Mobile Switching Center Server / intelligent Controller Extensive
SERTIT-031
NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
BSI-DSZ-CC-0675-2011
name ZTE Mobile Switching Center Server / intelligent Controller Extensive NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NO DE
not_valid_before 26.09.2011 06.04.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-031-MSCS-CR_v.1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0675a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]ZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0675b_pdf.pdf
manufacturer ZTE Corporation NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://wwwen.zte.com.cn/global/index.html https://www.nxp.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 33c4e1b761d69973 cabd9ee16cc158db
heuristics/cert_id SERTIT-031 BSI-DSZ-CC-0675-2011
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:h:nxp:j2a081:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3a041:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:3a081:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions - 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0674-2011
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • category: Network and Network-Related Devices and Systems
  • certification_date: 26.09.2011
  • developer: ZTE Corporation
  • enhanced:
    • category: Network and Network-Related Devices and Systems
    • cert_id: SERTIT-031
    • certification_date: 26.09.2011
    • description: SERTIT-031 C
    • developer: ZTE Corporation
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134758-1607950847/SERTIT/Sertifikater/2011/31/%5BST%5DZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134761-1607950851/SERTIT/Sertifikater/2011/31/SERTIT-031-MSCS-CR_v.1.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 2, ALC_FLR.2
    • mutual_recognition: CCRA
    • product: ZXWN MSCS / ZXUN iCX v4.10.13, ZXUN LIG v3.10.22
    • sponsor: ZTE Corporation
  • product: ZTE Mobile Switching Center Server / intelligent Controller Extensive
  • url: https://sertit.no/certified-products/product-archive/zte-mobile-switching-center-server-intelligent-controller-extensive
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0555-2009
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0555-2009
pdf_data/report_filename SERTIT-031-MSCS-CR_v.1.0.pdf 0675a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0675-2011
    • cert_item: NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-031: 20
  • DE:
    • BSI-DSZ-CC-0555-2009: 2
    • BSI-DSZ-CC-0633-2010: 5
    • BSI-DSZ-CC-0674-2011: 2
    • BSI-DSZ-CC-0675-2011: 24
  • NL:
    • CC-0555-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
    • EAL1: 1
    • EAL2: 1
    • EAL2+: 21
    • EAL7: 1
  • EAL:
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 1
    • FAU_GEN.3: 4
    • FAU_SAR.1: 3
    • FAU_STG.1: 3
    • FAU_STG.4: 3
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
    • FDP_ITT.1: 1
  • FIA:
    • FIA_AFL.1: 3
    • FIA_SOS.1: 3
    • FIA_UAU.2: 3
    • FIA_UID.2: 3
  • FMT:
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FTA:
    • FTA_MCS.1: 3
    • FTA_SSL.3: 3
  • FTP:
    • FTP_ITC.1: 2
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 22
    • NXP Semiconductors: 20
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 2
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
    • AIS36: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#1: 3
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • / P5CD041V1A / P5CD021V1A / P5CD016V1A, BSI-DSZ-CC-0633-2010, Version 2.0, 11.11.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0555-2009 for NXP Smart Card Controller P5CD081V1A and its: 1
    • Card Controller Rev. 3, BSI-DSZ-CC-0675-2011, Version 4, 06.04.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • J2A081 and J3A041 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
    • J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.0, 09.03.2011, JCOP V2.4.1 Secure Smart Card: 1
    • NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A081, J2A081 and J3A041 Secure: 1
pdf_data/report_metadata
  • /CreationDate: D:20110913105701Z
  • /ModDate: D:20110914144300+02'00'
  • pdf_file_size_bytes: 921683
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110414105710+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, CC"
  • /ModDate: D:20110414105851+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0675-2011
  • pdf_file_size_bytes: 997076
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename [ST]ZXWN_MSCS_ZXUN_iCX_Security_Target_V1.1.pdf 0675b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0555-2009: 1
    • BSI-DSZ-CC-0633: 3
    • BSI-DSZ-CC-0675: 2
    • BSI-DSZ-CC-555: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
    • BSI-PP-0035: 3
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL5: 17
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 5
    • FAU_GEN.3: 14
    • FAU_GEN.3.1: 4
    • FAU_GEN.3.2: 4
    • FAU_GEN.3.3: 1
    • FAU_SAR.1: 8
    • FAU_SAR.1.1: 3
    • FAU_SAR.1.2: 3
    • FAU_STG.1: 8
    • FAU_STG.1.1: 3
    • FAU_STG.1.2: 3
    • FAU_STG.4: 8
    • FAU_STG.4.1: 3
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 1
    • FDP_ACC.2: 12
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_ITT.1: 5
    • FDP_ITT.1.1: 1
  • FIA:
    • FIA_AFL.1: 22
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_SOS.1: 17
    • FIA_SOS.1.1: 3
    • FIA_UAU: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 3
    • FIA_UID: 3
    • FIA_UID.2: 20
    • FIA_UID.2.1: 3
  • FMT:
    • FMT_MSA: 1
    • FMT_SMF.1: 19
    • FMT_SMF.1.1: 3
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_ITC.1: 2
    • FPT_SMF.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_MCS.1: 11
    • FTA_MCS.1.1: 3
    • FTA_MCS.1.2: 3
    • FTA_SMR.1: 1
    • FTA_SSL.3: 17
    • FTA_SSL.3.1: 3
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
  • FAU:
    • FAU_ARP: 18
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 5
    • FAU_SAA.1: 20
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS: 10
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 4
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 28
    • FCS_COP.1.1: 14
    • FCS_LIM.1: 1
    • FCS_LIM.2: 1
    • FCS_RND.1: 2
    • FCS_RND.2: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 24
    • FDP_ACC.1: 10
    • FDP_ACC.2: 4
    • FDP_ACF: 20
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 5
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 17
    • FDP_IFC.1: 18
    • FDP_IFF: 5
    • FDP_IFF.1: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT: 9
    • FDP_ITT.1: 8
    • FDP_RIP: 10
    • FDP_RIP.1: 15
    • FDP_ROL: 5
    • FDP_ROL.1: 5
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 7
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UAU: 10
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.4: 1
    • FIA_UID: 13
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA: 41
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 12
    • FMT_MTD: 6
    • FMT_MTD.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 6
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT.1: 3
    • FPT_FLS: 25
    • FPT_FLS.1: 9
    • FPT_ITT: 9
    • FPT_ITT.1: 9
    • FPT_PHP: 7
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 5
    • FPT_RCV: 6
    • FPT_RCV.3: 8
    • FPT_RCV.4: 2
    • FPT_RVM.1: 6
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT: 6
    • FRU_FLT.1: 1
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.TRUSTED_SYSTEMS: 2
  • O:
    • O.AUDITING_CUS: 2
    • O.AUDITING_LIG: 2
    • O.AUDITING_OMM: 2
    • O.PROTECT_COM-: 1
    • O.PROTECT_COMMUNICATION: 2
    • O.SEPARATE_USERS: 3
  • OE:
    • OE.CLIENT_SECURITY: 3
    • OE.PROTECT_COM-: 3
    • OE.PROTECT_COMMUNICATION: 2
    • OE.SERVER_SECURITY: 2
    • OE.TIME: 3
    • OE.TRUSTED_SYSTEMS: 2
  • OSP:
    • OSP.USERS: 2
  • T:
    • T.AUTHORISED: 2
    • T.PHYSICAL_ATTACK: 2
    • T.UNAUTHORISED: 2
    • T.UNKNOWN_: 1
    • T.UNKNOWN_USER: 1
  • A:
    • A.NATIVE: 7
    • A.NO-: 2
    • A.NO-DELETION: 6
    • A.NO-INSTALL: 5
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 6
    • A.VERIFICATION: 7
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 9
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 7
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JAVA_OBJECT: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 15
    • D.SEC_DATA: 5
  • O:
    • O.AES: 2
    • O.ALARM: 5
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 10
    • O.CIPHER: 12
    • O.CONFIG: 1
    • O.COPY: 1
    • O.ECC: 2
    • O.FAULT_PROTECT: 5
    • O.FIREWALL: 9
    • O.HW_AES: 2
    • O.IDENTIFICATION: 6
    • O.KEY-MNGT: 10
    • O.MEM_ACCESS: 3
    • O.MF_FW: 6
    • O.OPERATE: 16
    • O.OS_DECEIVE: 7
    • O.PHYSICAL: 8
    • O.PIN-MNGT: 5
    • O.PROTECT_DATA: 10
    • O.REALLOCATION: 4
    • O.RESOURCES: 11
    • O.REUSE: 2
    • O.RND: 13
    • O.RSA: 1
    • O.SCP: 36
    • O.SHA: 2
    • O.SHRD_VAR_CON: 1
    • O.SHRD_VAR_CONFID: 9
    • O.SHRD_VAR_INTE: 1
    • O.SHRD_VAR_INTEG: 3
    • O.SID: 13
    • O.SIDE_CHANNEL: 6
    • O.TRANSACTION: 4
    • O.XYZ: 1
  • OE:
    • OE.CARD-MANAGEMENT: 2
    • OE.NATIVE: 5
    • OE.NO-DELETION: 4
    • OE.NO-INSTALL: 7
    • OE.SCP: 5
    • OE.USE_DIAG: 5
    • OE.USE_KEY: 2
    • OE.USE_KEYS: 4
    • OE.VERIFICATION: 9
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 5
    • OP.PUT: 5
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.PRO: 1
    • OSP.PROCESS-TOE: 3
  • R:
    • R.JAVA: 5
  • T:
    • T.ACCES: 1
    • T.ACCESS_DAT: 1
    • T.ACCESS_DATA: 2
    • T.CONFID: 2
    • T.CONFID-: 1
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.EXE-CODE: 11
    • T.FAULT: 7
    • T.INTEG-: 3
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 3
    • T.INTEG-JCS-: 4
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.LEAKA: 1
    • T.LEAKAGE: 6
    • T.OS: 2
    • T.OS_DE: 1
    • T.OS_DECEIVE: 6
    • T.OS_OP: 1
    • T.OS_OPERATE: 5
    • T.PHYSIC: 1
    • T.PHYSICAL: 4
    • T.RESOU: 1
    • T.RESOURCES: 5
    • T.RND: 6
    • T.SID: 12
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 120
    • NXP Semiconductors: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 6
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 22
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 8
      • SHA-256: 7
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 20
    • RNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 7
    • Physical tampering: 4
    • malfunction: 5
    • physical tampering: 3
  • SCA:
    • DPA: 5
    • Leak-Inherent: 7
    • SPA: 4
    • physical probing: 4
    • side channel: 2
    • side-channel: 1
    • timing attack: 2
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 117
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 6
  • FIPS:
    • FIPS 180-3: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 180-3: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • com:
    • com.cn: 3
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Objects: • LI Information: Information that directly relates: 1
    • out of scope: 1
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. NXP Semiconductors JCOP 2.4.1 R3 Security Target Lite PUBLIC INFORMATION: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Administrator
  • /CreationDate: D:20110819155419+02'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20110819155419+02'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Title: Microsoft Word - ZXWN MSCS ZXUN iCX Security Target V1.1.doc
  • pdf_file_size_bytes: 263195
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Author: NXP Semiconductors
  • /CreationDate: D:20110331110331
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria Evaluation, NXP J3A081, J2A081, J3A041, Revision 3, JavaCard
  • /ModDate: D:20110331110331
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1915131
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 116
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different