name |
EPSON LM-C400/AM-C550/AM-C400 with FAX Ver.1.00 |
NXP JCOP 4 SE050M |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
active |
active |
not_valid_after |
19.11.2029 |
23.01.2028 |
not_valid_before |
19.11.2024 |
23.01.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_eimg.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0075446_2-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0075446-CR2-1.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0832_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0075446_2-STLite.pdf |
manufacturer |
SEIKO EPSON CORPORATION |
NXP Semiconductors |
manufacturer_web |
https://www.epson.com/ |
https://www.nxp.com/ |
security_level |
EAL2, ALC_FLR.2 |
EAL6+, ALC_FLR.1, ASE_TSS.2 |
dgst |
353b43f9ad2ee96e |
3de62dddbbcc880b |
heuristics/cert_id |
JISEC-CC-CRP-C0832 |
NSCIB-CC-0075446-CR2 |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ALC_DEL.1, ADV_TDS.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 |
ADV_FSP.4, AVA_VAN.5, ASE_TSS.2, ADV_SPM.1, ALC_FLR.1, AGD_OPE.1 |
heuristics/extracted_versions |
1.00 |
4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022, NSCIB-CC-180212-CR5 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-1136-V2-2022, NSCIB-CC-180212-CR5 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0832
- certification_date: 01.11.2024
- claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- enhanced:
- assurance_level: EAL2 Augmented by ALC_FLR.2
- cc_version: 3.1 Release5
- cert_id: JISEC-CC-CRP-C0832
- cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
- evaluation_facility: Information Technology Security Center, Evaluation Department
- expiration_date: 19.11.2029
- product: EPSON LM-C400/AM-C550/AM-C400 with FAX
- product_type: Multifunction Peripheral
- protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
- report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/s6ckaf000002jdrz-att/c0832_est.pdf
- toe_version: 1.00
- vendor: SEIKO EPSON CORPORATION
- expiration_date: 01.11.2029
- supplier: SEIKO EPSON CORPORATION
- toe_japan_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0832_it4873.html
- toe_overseas_name: EPSON LM-C400 / AM-C550 / AM-C400 with FAX 1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/protection_profiles |
43ce79b420f23a00 |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
c0832_eimg.pdf |
NSCIB-CC-23-0075446_2-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author: Information-technology Promotion Agency,Japan
- /CreationDate: D:20250109162218+09'00'
- /Creator: Word 用 Acrobat PDFMaker 17
- /ModDate: D:20250130161540+09'00'
- /Producer: Adobe PDF Library 17.11.238
- /Subject:
- /Title: C0832_Certificate_01
- pdf_file_size_bytes: 234858
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 2
|
- /CreationDate: D:20230208150245+01'00'
- /Creator: C458-M&S
- /ModDate: D:20230208150245+01'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S23020815020
- pdf_file_size_bytes: 96232
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0832_erpt.pdf |
NSCIB-CC-0075446-CR2-1.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0075446-CR2
- cert_item: JCOP 4 SE050M
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- JISEC-CC-CRP-C0832-01-2024: 1
|
- DE:
- BSI-DSZ-CC-1040: 1
- BSI-DSZ-CC-1136-V3-2022: 2
- NL:
- CC-20-180212: 1
- NSCIB-CC-0075446-CR2: 15
- NSCIB-CC-180212-5MA1: 1
- NSCIB-CC-180212-CR5: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 6
- NXP Semiconductors: 4
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 5
- CMAC: 3
- HMAC: 2
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
|
- BSI:
- AIS 20: 1
- AIS 36: 1
- AIS20: 1
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- certified hardware and crypto library). The items in light-grey are out of scope. The TOE is a composite product on top of CC certified Hardware, Firmware and Crypto Library: 1
- out of scope: 1
- provided by the composite (certified hardware and crypto library). The items in light-grey are out of scope. The TOE is a composite product on top of CC certified Hardware, Firmware and Crypto Library. Part: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20250109170129+09'00'
- /Creator: Word 用 Acrobat PDFMaker 20
- /ModDate: D:20250130161123+09'00'
- /Producer: Adobe PDF Library 20.5.172
- /Title:
- pdf_file_size_bytes: 438507
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 33
|
|
pdf_data/st_filename |
c0832_est.pdf |
NSCIB-CC-0075446_2-STLite.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136: 1
- BSI-DSZ-CC-1136-V3-2022: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-2017: 2
- BSI-PP-0055: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 3
- EAL 2 augmented: 1
|
- EAL:
- EAL6: 9
- EAL6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_FSP.4: 2
- ADV_SPM.1: 4
- AGD:
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 5
- ASE_TSS: 2
- ASE_TSS.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 16
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC.1: 30
- FDP_ACC.1.1: 2
- FDP_ACF.1: 24
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 6
- FDP_ACF.1.4: 2
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 6
- FIA_UAU.7.1: 1
- FIA_UID.1: 24
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 2
- FMT_MSA.3: 24
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 2
- FMT_SMF.1: 26
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 12
- FPT_FDI_EXP.1.1: 2
- FPT_STM.1: 11
- FPT_STM.1.1: 1
- FPT_TST.1: 7
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP.1: 21
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAS: 7
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 8
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM.1: 20
- FCS_CKM.1.1: 8
- FCS_CKM.2: 13
- FCS_CKM.3: 11
- FCS_CKM.4: 18
- FCS_CKM.4.1: 2
- FCS_COP.1: 17
- FCS_COP.1.1: 22
- FCS_RNG: 1
- FCS_RNG.1: 14
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 50
- FDP_ACC.1.1: 1
- FDP_ACC.2: 22
- FDP_ACC.2.1: 3
- FDP_ACC.2.2: 3
- FDP_ACF: 1
- FDP_ACF.1: 37
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 5
- FDP_IFC: 2
- FDP_IFC.1: 50
- FDP_IFC.1.1: 2
- FDP_IFC.2: 21
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF: 2
- FDP_IFF.1: 40
- FDP_IFF.1.1: 4
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 4
- FDP_IFF.1.4: 5
- FDP_IFF.1.5: 4
- FDP_ITC: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 19
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 78
- FDP_RIP.1.1: 9
- FDP_ROL.1: 16
- FDP_ROL.1.1: 2
- FDP_ROL.1.2: 2
- FDP_SDI.1: 2
- FDP_SDI.2: 12
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT: 1
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 17
- FIA_ATD.1.1: 2
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 1
- FIA_UID.1: 46
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FIA_USB.1: 11
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MSA: 5
- FMT_MSA.1: 79
- FMT_MSA.1.1: 8
- FMT_MSA.2: 4
- FMT_MSA.2.1: 1
- FMT_MSA.3: 80
- FMT_MSA.3.1: 9
- FMT_MSA.3.2: 8
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_SMF: 3
- FMT_SMF.1: 76
- FMT_SMF.1.1: 7
- FMT_SMR: 2
- FMT_SMR.1: 86
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FPR:
- FPT:
- FPT_FLS.1: 53
- FPT_FLS.1.1: 5
- FPT_PHP.3: 7
- FPT_RCV.2: 1
- FPT_RCV.3: 7
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_RCV.3.4: 1
- FPT_TDC.1: 8
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 11
- D.DOC: 42
- D.FUNC: 26
- D.PROT: 8
- O:
- O.AUDIT: 5
- O.AUDIT_ACCESS: 4
- O.AUDIT_STORAGE: 4
- O.CONF: 10
- O.DOC: 10
- O.FUNC: 5
- O.INTERFACE: 5
- O.PROT: 5
- O.SOFTWARE: 5
- O.USER: 11
- OE:
- OE.ADMIN: 6
- OE.AUDIT: 3
- OE.AUDIT_ACCESS: 2
- OE.AUDIT_STORAGE: 2
- OE.INTERFACE: 3
- OE.PHISICAL: 1
- OE.PHYSICAL: 2
- OE.USER: 12
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- A:
- A.APPLET: 4
- A.APPS-PROVIDER: 6
- A.DELETION: 1
- A.PROCESS-SEC-IC: 5
- A.USE_: 1
- A.USE_DIAG: 5
- A.USE_KEYS: 6
- A.VERIFICATION: 3
- A.VERIFICATION-AUTHORITY: 6
- D:
- D.API_: 1
- D.API_DATA: 2
- D.APP_: 2
- D.APP_CODE: 5
- D.APP_C_: 1
- D.APP_C_DATA: 4
- D.APP_I_: 2
- D.APP_I_DATA: 4
- D.APP_KEYS: 10
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CONFIG_ITEM: 8
- D.CRYPTO: 6
- D.ISD_KEYS: 4
- D.JCS_: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.MODULE_: 1
- D.MODULE_CODE: 5
- D.MODULE_DATA: 2
- D.PIN: 11
- D.SEC_DATA: 6
- D.VASD_KEYS: 3
- O:
- O.APPLET: 19
- O.CODE_MODULE: 16
- O.CODE_PKG: 18
- O.DELETION: 4
- O.INSTALL: 3
- O.JAVAOBJECT: 61
- O.LOAD: 5
- O.NON_SB_SFR: 4
- O.REMOTE: 1
- O.SB_SFR: 4
- OE:
- OE.APPLET: 10
- OE.APPS-PROVIDER: 4
- OE.CARD-MANAGEMENT: 3
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 18
- OE.KEY-CHANGE: 5
- OE.PROCESS_SEC_IC: 4
- OE.SCP: 12
- OE.SECURITY-DOMAINS: 4
- OE.USE_DIAG: 5
- OE.USE_KEYS: 5
- OE.VERIFICATION: 28
- OE.VERIFICATION-AUTHORITY: 4
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_MODULE: 3
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE_MODULE: 4
- OP.JAVA: 5
- OP.PUT: 4
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.SB_ACCESS: 4
- OP.SB_ACCESS_SFR: 4
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.KEY-CHANGE: 5
- OSP.PROCESS-TOE: 5
- OSP.SECURE-BOX: 5
- OSP.SECURITY-DOMAINS: 5
- OSP.VERIFICATION: 3
- OT:
- OT.ALARM: 15
- OT.APPLI-AUTH: 11
- OT.CARD-: 2
- OT.CARD-CONFIGURATION: 5
- OT.CARD-MANAGEMENT: 33
- OT.CIPHER: 6
- OT.COMM_AUTH: 7
- OT.COMM_CONFIDENTIALITY: 5
- OT.COMM_INTEGRITY: 5
- OT.DOMAIN-RIGHTS: 7
- OT.FIREWALL: 9
- OT.GLOBAL_ARRAYS_CONFID: 5
- OT.GLOBAL_ARRAYS_INTEG: 4
- OT.IDENTIFICATION: 6
- OT.KEY-MNGT: 4
- OT.NATIVE: 9
- OT.OBJ-DELETION: 3
- OT.OPERATE: 31
- OT.PIN-MNGT: 6
- OT.REALLOCATION: 5
- OT.RESOURCES: 4
- OT.RNG: 8
- OT.SCP: 49
- OT.SEC_BOX_FW: 6
- OT.SENSITIVE_RE-SULTS_INTEG: 1
- OT.SENSITIVE_RESULTS_INTEG: 3
- OT.SID: 13
- OT.SID_MODULE: 12
- OT.TRANSACTION: 4
- R:
- SA:
- SA.ALARM: 1
- SA.CIPHER: 1
- SA.CONFID-APPLI-DATA: 1
- SA.CONFID-JCS-CODE: 1
- SA.CONFID-JCS-DATA: 1
- SA.EXE-: 1
- SA.EXE-APPLI-CODE: 2
- SA.EXE-JCS-: 1
- SA.FIREWALL: 1
- SA.INSTALL: 3
- SA.INTEG-APPLI-CODE: 2
- SA.INTEG-APPLI-DATA: 2
- SA.INTEG-APPLI-DATA-PHYS: 1
- SA.INTEG-JCS-CODE: 1
- SA.INTEG-JCS-DATA: 1
- SA.KEY-MNGT: 1
- SA.MODULAR-: 1
- SA.MODULAR-DESIGN: 2
- SA.MODULE-INVOCATION: 1
- SA.NATIVE: 3
- SA.OBJ-DELETION: 2
- SA.OPERATE: 1
- SA.PIN-MNGT: 3
- SA.RESOURCES: 2
- SA.SCP: 4
- SA.SID: 2
- SA.TRANSACTION: 1
- SA.VERIFICATION: 1
- T:
- T.COM_EXPLOIT: 4
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFIG: 4
- T.DELETION: 2
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 2
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 6
- T.INTEG-APPLI-DATA: 12
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.LIFE_CYCLE: 4
- T.MODULE_EXEC: 4
- T.MODULE_REPLACEMENT: 4
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.OS_OPERATE: 4
- T.PHYSICAL: 2
- T.RESOURCES: 2
- T.RND: 4
- T.SEC_BOX_BORDER: 3
- T.SID: 9
- T.UNAUTHORIZED_CARD_MNGT: 4
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 195
- NXP Semiconductors: 28
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 3
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 6
- CMAC: 3
- HMAC: 6
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 1
- Physical Tampering: 2
- malfunction: 3
- physical tampering: 2
- SCA:
- DPA: 6
- SPA: 2
- physical probing: 3
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 2
- FIPS 197: 2
- ICAO:
- ISO:
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- NIST:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_: 1
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CMAC16: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_CMAC8: 1
- ALG_AES_CMAC_128: 1
- ALG_AES_CTR: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_MAC_128_ISO9797_1_M2_ALG3: 1
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC8_: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- EC:
- ALG_EC_SVDP_: 1
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 1
- ECDSA:
- ALG_ECDSA_SHA_: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_ISO9796: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 2
- ALG_RSA_SHA_ISO9796_MR: 1
- ALG_RSA_SHA_PKCS1: 2
- ALG_RSA_SHA_PKCS1_PSS: 1
- SHA:
- ALG_SHA_224: 2
- ALG_SHA_256: 2
- ALG_SHA_384: 3
- ALG_SHA_512: 2
- misc:
- LENGTH_AES_128: 4
- LENGTH_AES_192: 4
- LENGTH_AES_256: 1
- LENGTH_DES3_2KEY: 2
- LENGTH_DES3_3KEY: 2
- LENGTH_EC_: 1
- LENGTH_EC_FP_160: 3
- LENGTH_EC_FP_192: 2
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 4
- LENGTH_EC_FP_320: 3
- LENGTH_EC_FP_384: 3
- LENGTH_EC_FP_521: 3
- LENGTH_RSA_1024: 1
- LENGTH_RSA_2048: 2
- LENGTH_RSA_4096: 2
- LENGTH_SHA: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 1
- LENGTH_SHA_384: 1
- LENGTH_SHA_512: 1
- PAD_ISO9796: 1
- PAD_ISO9796_MR: 1
- PAD_PKCS1_PSS: 1
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_ECDSA_PLAIN: 2
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.nxp.id.jcopx.security: 2
- javacard:
- javacard.framework: 2
- javacard.framework.applet: 1
- javacard.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20241209132032+09'00'
- /Creator: Microsoft® Word for Microsoft 365
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_ContentBits: 2
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Enabled: true
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_Method: Standard
- /MSIP_Label_549229e1-d9eb-40cf-aa20-8039fe5d6144_SiteId: 3ce358ea-700e-4f0f-bb37-fd0b7c21366c
- /ModDate: D:20250130161243+09'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 1302442
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 71
|
- /Author: NXP B.V.
- /CreationDate: D:20230113152112Z
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: ASE, JCOP, Common Criteria, EAL6 augmented
- /Producer: Apache FOP Version 2.3
- /Subject: JCOP 4 SE050M
- /Title: Security Target Lite for JCOP 4 SE050M
- pdf_file_size_bytes: 1498563
- pdf_hyperlinks: http://www.keylength.com/, mailto:[email protected], https://www.docstore.nxp.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 147
|
state/cert/convert_garbage |
False |
True |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |