name |
Symfoware Server Enterprise extended Edtion 4.0 |
NXP JCOP 4.7 SE051 |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
10.12.2010 |
27.03.2028 |
not_valid_before |
26.11.2003 |
27.03.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-23-0095534-cert.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0095534-CR3-1.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0095534_3-STLite_v2.8.pdf |
manufacturer |
Fujitsu Limited |
NXP Semiconductors |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.nxp.com/ |
security_level |
EAL4 |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
dgst |
505e2adba5d4a6cf |
9ad63933cfd37a18 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
NSCIB-CC-0095534-CR3 |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_FLR.1, AVA_VAN.5, ADV_FSP.4, ASE_TSS.2, ADV_SPM.1 |
heuristics/extracted_versions |
4.0 |
4.7 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022, NSCIB-CC-180212-CR5 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-1136-V3-2022, NSCIB-CC-180212-CR5 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/protection_profiles |
{} |
94167fd161e87d71 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
pdf_data/cert_filename |
|
NSCIB-CC-23-0095534-cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL7: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_FLR.1: 1
- ALC_FLR.3: 2
- ASE:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: kruitr
- /CreationDate: D:20230331122612+02'00'
- /Creator: Bullzip PDF Printer (11.10.0.2761)
- /ModDate: D:20230331122739+02'00'
- /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
- /Title: Microsoft Word - NSCIB-CC-23-0095534-cert.doc
- pdf_file_size_bytes: 261722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0003.pdf |
NSCIB-CC-0095534-CR3-1.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0095534-CR3
- cert_item: JCOP 4.7 SE051
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors Germany GmbH
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1040: 1
- BSI-DSZ-CC-1136-V3-2022: 2
- NL:
- CC-21-180212: 1
- NSCIB-CC-0095534-CR3: 15
- NSCIB-CC-180212-5MA1: 1
- NSCIB-CC-180212-CR5: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 6: 1
- EAL 6 augmented: 1
- EAL4: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 4
|
pdf_data/report_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 4
- SGS Brightsight: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 5
- CMAC: 3
- HMAC: 2
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
- Generic:
- Crypto Library 0.7.6: 1
- Crypto Library v0.7.7: 1
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- side channel: 1
- side-channel: 1
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- blue being provided by the composite (certified hardware and crypto library). The items in grey are out of scope. The TOE is a composite product on top of CC certified Hardware, Firmware and Crypto Library. Parts: 1
- certified hardware and crypto library). The items in grey are out of scope. The TOE is a composite product on top of CC certified Hardware, Firmware and Crypto Library: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
NSCIB-CC-0095534_3-STLite_v2.8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-2017: 2
- BSI-PP-0055: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL6: 9
- EAL6 augmented: 3
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_FSP.4: 2
- ADV_SPM.1: 3
- ADV_SPM.1.1: 1
- ALC:
- ASE:
- ASE_CCL: 2
- ASE_ECD: 2
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 5
- ASE_TSS: 2
- ASE_TSS.2: 4
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 13
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 2
- FAU_SAS: 6
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 2
- FCO_NRO.1: 1
- FCO_NRO.2: 8
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM.1: 14
- FCS_CKM.1.1: 9
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 10
- FCS_CKM.3.1: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 3
- FCS_COP.1: 18
- FCS_COP.1.1: 17
- FCS_RNG: 1
- FCS_RNG.1: 12
- FCS_RNG.1.1: 4
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 36
- FDP_ACC.1.1: 1
- FDP_ACC.2: 17
- FDP_ACC.2.1: 2
- FDP_ACC.2.2: 2
- FDP_ACF: 1
- FDP_ACF.1: 28
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_IFC: 3
- FDP_IFC.1: 33
- FDP_IFC.1.1: 1
- FDP_IFC.2: 24
- FDP_IFC.2.1: 2
- FDP_IFC.2.2: 2
- FDP_IFF: 3
- FDP_IFF.1: 36
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 4
- FDP_IFF.1.5: 3
- FDP_IFF.2.1: 1
- FDP_IFF.3.1: 1
- FDP_IFF.4.1: 1
- FDP_IFF.5.1: 1
- FDP_ITC: 2
- FDP_ITC.1: 4
- FDP_ITC.2: 15
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 14
- FDP_RIP.1.1: 1
- FDP_ROL.1: 10
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT: 2
- FDP_UIT.1: 6
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 12
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_UAU.1: 12
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 2
- FIA_UID.1: 42
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_UID.2: 2
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MSA: 7
- FMT_MSA.1: 65
- FMT_MSA.1.1: 5
- FMT_MSA.2: 1
- FMT_MSA.3: 67
- FMT_MSA.3.1: 6
- FMT_MSA.3.2: 5
- FMT_MTD.1: 1
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_SMF: 4
- FMT_SMF.1: 63
- FMT_SMF.1.1: 6
- FMT_SMR: 3
- FMT_SMR.1: 66
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 2
- FMT_SMR.2.1: 1
- FPR:
- FPR_UNO.1: 5
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 30
- FPT_FLS.1.1: 3
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV.3: 2
- FPT_RCV.3.1: 1
- FPT_RCV.3.2: 1
- FPT_RCV.3.3: 1
- FPT_TDC.1: 3
- FPT_TDC.1.2: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 18
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPS-PROVIDER: 6
- A.DELETION: 1
- A.PROCESS-SEC-IC: 5
- A.USE_: 1
- A.USE_DIAG: 5
- A.USE_KEYS: 6
- A.VERIFICATION-AUTHORITY: 6
- D:
- D.APP_: 1
- D.APP_CODE: 1
- D.APP_C_DATA: 2
- D.APP_I_: 2
- D.APP_KEYS: 4
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CONFIG_ITEM: 8
- D.CRYPTO: 2
- D.ISD_KEYS: 4
- D.JCS_DATA: 1
- D.MODULE_: 1
- D.MODULE_CODE: 1
- D.MODULE_DATA: 1
- D.PIN: 6
- D.SEC_DATA: 1
- D.VASD_KEYS: 3
- O:
- O.APPLET: 17
- O.CODE_MODULE: 16
- O.CODE_PKG: 17
- O.DELETION: 4
- O.INSTALL: 3
- O.JAVAOBJECT: 16
- O.LOAD: 4
- O.NON_SB_SFR: 4
- O.REMOTE: 1
- O.SB_SFR: 4
- OE:
- OE.APPLET: 3
- OE.APPS-PROVIDER: 4
- OE.CARD-MANAGEMENT: 3
- OE.CODE-EVIDENCE: 1
- OE.KEY-CHANGE: 5
- OE.PROCESS_SEC_IC: 4
- OE.SCP: 12
- OE.SECURITY-DOMAINS: 4
- OE.USE_DIAG: 5
- OE.USE_KEYS: 5
- OE.VERIFICATION: 1
- OE.VERIFICATION-AUTHORITY: 4
- OP:
- OP.DELETE_APPLET: 3
- OP.DELETE_MODULE: 3
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 2
- OP.INVOKE_MODULE: 4
- OP.SB_ACCESS: 4
- OP.SB_ACCESS_SFR: 4
- OSP:
- OSP.KEY-CHANGE: 5
- OSP.PROCESS-TOE: 5
- OSP.SECURE-BOX: 5
- OSP.SECURITY-DOMAINS: 5
- OSP.VERIFICATION: 3
- OT:
- OT.ALARM: 9
- OT.APPLI-AUTH: 8
- OT.CARD-: 2
- OT.CARD-CONFIGURATION: 5
- OT.CARD-MANAGEMENT: 34
- OT.CIPHER: 1
- OT.COMM_AUTH: 7
- OT.COMM_CONFIDENTIALITY: 5
- OT.COMM_INTEGRITY: 5
- OT.DOMAIN-RIGHTS: 7
- OT.FIREWALL: 1
- OT.IDENTIFICATION: 6
- OT.KEY-MNGT: 1
- OT.OPERATE: 19
- OT.PIN-MNGT: 1
- OT.RESOURCES: 3
- OT.RNG: 8
- OT.SCP: 48
- OT.SECURE_ACTIVATION_: 1
- OT.SECURE_ACTIVATION_ADDITIONAL_: 1
- OT.SECURE_ACTIVATION_ADDITIONAL_CODE: 4
- OT.SECURE_LOAD_ACODE: 16
- OT.SEC_BOX_FW: 7
- OT.SENSITIVE_RE-SULTS_INTEG: 1
- OT.SENSITIVE_RESULTS_INTEG: 3
- OT.SID: 1
- OT.SID_MODULE: 12
- OT.TOE_IDENTIFICATION: 4
- R:
- SA:
- SA.INSTALL: 1
- SA.MODULAR-DESIGN: 2
- SA.MODULE-INVOCATION: 1
- SA.SCP: 3
- T:
- T.COM_EXPLOIT: 4
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFIG: 4
- T.DELETION: 2
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 2
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 10
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.LIFE_CYCLE: 4
- T.MODULE_EXEC: 4
- T.MODULE_REPLACEMENT: 4
- T.OS_OPERATE: 4
- T.PHYSICAL: 2
- T.RESOURCES: 2
- T.RND: 4
- T.SEC_BOX_BORDER: 4
- T.SID: 5
- T.UNAUTHORIZED_CARD_MNGT: 4
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 169
- NXP Semiconductors: 28
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 3
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 6
- CMAC: 3
- HMAC: 6
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 3
- Fault Injection: 1
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 5
- SPA: 2
- physical probing: 2
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS 186-4: 2
- FIPS 197: 2
- ICAO:
- ISO:
- ISO/IEC 14443-4: 1
- ISO/IEC 14888-3: 1
- NIST:
- SCP:
- SCP01: 2
- SCP02: 2
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CMAC16: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_CMAC8: 1
- ALG_AES_CTR: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_MAC4_ISO9797_1_M1_: 1
- ALG_DES_MAC4_ISO9797_1_M2_: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_1_M1_: 1
- ALG_DES_MAC8_ISO9797_1_M2_: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_NOPAD: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 1
- ECDSA:
- ALG_ECDSA_SHA: 1
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 1
- ALG_ECDSA_SHA_384: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_256_ISO9796: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_ISO9796: 2
- ALG_RSA_SHA_ISO9796_MR: 1
- ALG_RSA_SHA_PKCS1: 2
- ALG_RSA_SHA_PKCS1_PSS: 1
- SHA:
- ALG_SHA_224: 3
- ALG_SHA_256: 2
- ALG_SHA_384: 3
- ALG_SHA_512: 2
- misc:
- LENGTH_AES_128: 5
- LENGTH_AES_192: 1
- LENGTH_AES_256: 5
- LENGTH_DES3_2KEY: 3
- LENGTH_DES3_3KEY: 1
- LENGTH_EC_FP_160: 2
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 1
- LENGTH_EC_FP_320: 2
- LENGTH_EC_FP_521: 2
- LENGTH_RSA_2048: 2
- LENGTH_SHA: 1
- LENGTH_SHA_256: 1
- LENGTH_SHA_512: 1
- PAD_ISO9796: 1
- PAD_ISO9796_MR: 1
- PAD_PKCS1_PSS: 1
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_ECDSA_PLAIN: 2
- SIG_CIPHER_RSA: 1
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.nxp.id.jcopx.security: 2
- javacard:
- javacard.framework: 1
- javacard.framework.applet: 1
- javacard.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: NXP B.V.
- /CreationDate: D:20230324110403Z
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: ASE, JCOP, Common Criteria, EAL6 augmented
- /Producer: Apache FOP Version 2.3
- /Subject: JCOP 4.7 SE051
- /Title: Security Target Lite
- pdf_file_size_bytes: 1163615
- pdf_hyperlinks: http://www.keylength.com/, https://www.docstore.nxp.com, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 120
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |