name |
ST54J / ST54K (A07) (EUCC-ANSSI-2025-03-01) |
ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration (Version 3.2.0.52) (ANSSI-CC-2025/03) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
FR |
FR |
status |
active |
active |
not_valid_after |
31.03.2030 |
12.02.2030 |
not_valid_before |
31.03.2025 |
12.02.2025 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat_EUCC_2025_03_01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_03fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-ANSSI-2025_03_01fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_03fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-EUCC-ANSSI-2025_01en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2025_03en.pdf |
manufacturer |
STMicroelectronics |
NXP Semiconductors Germany GmbH |
manufacturer_web |
https://www.st.com/ |
https://www.nxp.com |
security_level |
ALC_DVS.2, EAL5+, ALC_FLR.2, AVA_VAN.5 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
3e57eef81fcac2f1 |
cebbb4928f559572 |
heuristics/cert_id |
ANSSI-CC-2025/03 |
ANSSI-CC-2025/03 |
heuristics/cert_lab |
SERMA |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ALC_FLR.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
01, 2025, 03 |
3.2, 3.2.0.52 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
cf0f01bcd7be3e9c |
d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf |
pdf_data/cert_filename |
Certificat_EUCC_2025_03_01fr.pdf |
Certificat-ANSSI-CC-2025_03fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.2: 2
- AVA:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20250214100951+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20250214101811+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 171422
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
EUCC-ANSSI-2025_03_01fr.pdf |
ANSSI-CC-2025_03fr.pdf |
pdf_data/report_frontpage |
- FR:
- cc_security_level: Elevé / EAL5 augmenté ALC_DVS.2, ALC_FLR.2, AVA_VAN.5 Référence du rapport d’évaluation Evaluation Technical Report PEACOCK A07 Project référence PEACOCK_A07_2024_ETR_v1.1 version 1.1 11 février 2025. Fonctionnalité de sécurité du produit voir 2.2.2 Services de sécurité Résumé des menaces Inherent Information Leakage Physical Probing Malfunction due to Environmental Stress Physical Manipulation Forced Information Leakage R a p p o r t d e c e r t i f i c a t i o n E U C C - A N S S I - 2 0 2 5 - 0 3 - 0 1 S T 5 4 J / S T 5 4 K ( A 0 7 ) A N S S I - C C - C E R - F - 0 7 _ v 3 1 . 9 P a g e 6 s u r 1 7 Abuse of Functionality Deficiency of Random Numbers Masquerade the TOE Memory Access Violation Diffusion of open samples (voir chapitre 3 [ST]) Exigences de configuration du produit voir 4.2 Restrictions d’usage Hypothèses liées à l’environnement d’exploitation voir 4.2 Restrictions d’usage
- cc_version: ISO/IEC 15408-1:2009, 15408-2:2008 15408-3:2008 (Critères Communs version 3.1 révision 5) ISO/IEC 18045:2008 (CEM version 3.1 révision 5
- cert_id: EUCC-ANSSI-2025-03-01
- cert_item: ST54J / ST54K
- cert_item_version: A07 Type de produit Cartes à puce et dispositifs similaires
- cert_lab: SERMA SAFETY & SECURITY 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France Marque EUCC
- developer: STMICROELECTRONICS 190 Avenue Celestin Coq, 13106 Rousset, France Commanditaire STMICROELECTRONICS 190 Avenue Celestin Coq, 13106 Rousset, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages : “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V4-2024: 1
- FR:
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0076-2013-MA-01: 2
- other:
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
- PP-SSCD-Part4: 1
- PP-SSCD-Part5: 2
- PP-SSCD-Part6: 2
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.2: 2
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename |
Cible-EUCC-ANSSI-2025_01en.pdf |
ANSSI-Cible-CC-2025_03en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V2-2022: 1
- BSI-DSZ-CC-1136-V4-2024: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP- 0084-2014: 10
- BSI-CC-PP-0084-: 2
- BSI-CC-PP-0084-2014: 64
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2012-MA-01: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 17
- EAL5 augmented: 1
- EAL5+: 1
|
- EAL:
- EAL5: 8
- EAL5 augmented: 4
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 2
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR.2: 6
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 11
- ASE_OBJ.2: 1
- ASE_REQ: 30
- ASE_REQ.2: 1
- ASE_SPD: 8
- ASE_SPD.1: 1
- ASE_TSS: 7
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.4: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 3
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 3
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_SAR.1: 25
- FAU_SAS: 2
- FAU_SAS.1: 28
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_RNG: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.2: 12
- FDP_ACF: 1
- FDP_ACF.1: 28
- FDP_IFC.1: 17
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT.1: 10
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 14
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FIA:
- FIA_API: 2
- FIA_API.1: 6
- FIA_UAU.1: 14
- FIA_UID.1: 16
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 29
- FMT_LIM.2: 30
- FMT_MSA.1: 26
- FMT_MSA.3: 26
- FMT_SMF.1: 21
- FMT_SMR.1: 17
- FPT:
- FPT_FLS.1: 22
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FRU:
- FTP:
- FTP_ITC.1: 27
- FTP_TRP.1: 2
|
- FAU:
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 3
- FCS_CKM.4: 18
- FCS_CKM.4.1: 1
- FCS_COP: 14
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 43
- FDP_ACC.1: 15
- FDP_ACF: 30
- FDP_ACF.1: 20
- FDP_DAU: 8
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 7
- FDP_ITC: 8
- FDP_ITC.1: 7
- FDP_ITC.2: 4
- FDP_RIP: 2
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDI: 15
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_API: 4
- FIA_API.1: 15
- FIA_API.1.1: 3
- FIA_UAU: 2
- FIA_UAU.1: 10
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 2
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_EMS: 2
- FMT_MOF: 3
- FMT_MOF.1: 5
- FMT_MSA: 16
- FMT_MSA.1: 4
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 17
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA.4: 8
- FMT_MSA.4.1: 1
- FMT_MTD: 14
- FMT_MTD.1: 2
- FMT_SMF: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 11
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 2
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITC: 2
- FPT_ITC.1: 2
- FPT_PHP: 2
- FPT_PHP.1: 5
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_TST: 3
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 30
- FTP_ITC.1: 16
- FTP_ITC.1.3: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- O:
- O.C: 4
- O.RND: 4
- O.TOE-: 1
- R:
- T:
|
- A:
- A.CGA: 3
- A.CSP: 3
- A.SCA: 3
- OE:
- T:
|
pdf_data/st_keywords/vendor |
- Infineon:
- Philips:
- STMicroelectronics:
- Samsung:
|
- NXP:
- NXP: 88
- NXP Semiconductors: 30
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ........5: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 14
- Physical Probing: 4
- physical probing: 3
- side channel: 2
- other:
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 5
- SCA:
- DPA: 2
- SPA: 2
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 23
- CCMB-2017-04-003: 2
- FIPS:
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 3
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
|
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 197: 2
- FIPS PUB 46-3: 3
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation: 1
- The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 19 In the following, the TOE is denoted by “ST54J/K A07” or “TOE”. 20 Figure 1: 1
- ES) is in User NVM. 45 Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
- Security IC Embedded Software (ES) is in User NVM. 45 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 46 The user guidance documentation, part of the TOE: 1
- out of scope: 2
|
|
pdf_data/st_metadata |
- /CreationDate: D:20250401102813+02'00'
- /Creator: FrameMaker 17.0.1
- /Keywords:
- /ModDate: D:20250401102813+02'00'
- /Producer: Adobe PDF Library 17.0
- pdf_file_size_bytes: 1623496
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
- /Author: NXP B.V.
- /CreationDate: D:20250203164938+01'00'
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: Common Criteria, Security Target Lite, ChipDoc v3.2, SSCD
- /Producer: Apache FOP Version 2.3
- /Subject: ChipDoc v3.2 on JCOP 4 P71 in SSCD configuration
- /Title: Security Target Lite
- pdf_file_size_bytes: 654082
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |