name |
Huawei iTrustee 5.0 |
NXP Secure Smart Card Controller P60x144/080PVA |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NL |
DE |
status |
archived |
archived |
not_valid_after |
19.12.2024 |
01.09.2019 |
not_valid_before |
19.12.2019 |
26.07.2012 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cert%20019-016828.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-19-0016828-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0666a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20CC%20Huawei%20iTrustee%20Software%20V5.0%20Security%20Target%20V6.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0666b_pdf.pdf |
manufacturer |
Huawei Technologies Co., Ltd. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.huawei.com |
https://www.nxp.com |
security_level |
AVA_TEE.2, EAL2 |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
dgst |
5d570a7228cacac4 |
94696d7b03c0bcc4 |
heuristics/cert_id |
NSCIB-CC-19-0016828-CR |
BSI-DSZ-CC-0666-2012 |
heuristics/cert_lab |
|
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_TDS.1, AVA_TEE.2, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, APE_CCL.1, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
5.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0845-2012 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0831, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0817-V2-2016, BSI-DSZ-CC-0886-2013, NSCIB-CC-11-31801-CR3, ANSSI-CC-2015/37, BSI-DSZ-CC-0808-V2-2016, ANSSI-CC-2016/04, BSI-DSZ-CC-0919-V2-2021, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0809-V2-2016, ANSSI-CC-2016/03, BSI-DSZ-CC-0831-V3-2021, BSI-DSZ-CC-0885-2013, BSI-DSZ-CC-0831-V8-2024, ANSSI-CC-2015/41, ANSSI-CC-2015/39, BSI-DSZ-CC-0918-V7-2025, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0957-2015, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0919-V3-2023, NSCIB-CC-11-31801-CR4, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0808-V3-2017, ANSSI-CC-2015/38, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0809-V3-2017, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0831-V9-2024, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0809-2013, BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0918-V6-2024, BSI-DSZ-CC-0817-2013, BSI-DSZ-CC-0831-V6-2023, ANSSI-CC-2015/40, BSI-DSZ-CC-0918-V4-2022, ANSSI-CC-2015/15, BSI-DSZ-CC-0808-2013 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
cert 019-016828.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL2: 2
- EAL2 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 1
- Huawei Technologies Co: 1
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20191223131613+01'00'
- /Creator: NL-ARN-SAL-C
- /ModDate: D:20191223133219+01'00'
- /Producer: KONICA MINOLTA bizhub C300i
- pdf_file_size_bytes: 76186
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
NSCIB-CC-19-0016828-CR.pdf |
0666a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- NL:
- cert_id: NSCIB-CC-0016828-CR
- cert_item: Huawei iTrustee v5.0
- cert_lab: Brightsight
- developer: Huawei Technologies Co., Ltd
|
- DE:
- cert_id: BSI-DSZ-CC-0666-2012
- cert_item: NXP Secure Smart Card Controller P60x144/080PVA
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- NL:
|
pdf_data/report_keywords/cc_cert_id |
- NL:
- CC-19-0016828: 1
- NSCIB-CC-0016828-CR: 12
|
- DE:
- BSI-DSZ-CC-0666: 1
- BSI-DSZ-CC-0666-2012: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL2: 4
- EAL2 augmented: 2
- EAL2+: 1
- EAL4: 1
|
- EAL:
- EAL 4: 3
- EAL 5: 3
- EAL 6: 4
- EAL 6 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_SPM.1: 2
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 2
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 3
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR: 1
- ALC_FLR.1: 6
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 3
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 18
- Huawei Technologies Co: 4
|
- NXP:
- NXP: 28
- NXP Semiconductors: 27
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- other:
- JIL: 1
- reverse engineering: 1
|
- FI:
- SCA:
- physical probing: 1
- side channel: 1
- timing attacks: 1
- other:
- JIL: 4
- reverse engineering: 1
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 1.2, 13 April 2012 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 1.1: 1
- 9] Evaluation Technical Report BSI-DSZ-CC-0666, Version 1.11, 25 July 2012, T- Systems GEI GmbH, (confidential document) [10] ETR for composite evaluation according to AIS 36 for the Product NXP Secure Smart Card: 1
- Configuration List for the hardware platform, NXP Semiconductors, Rev 1.6, June 15th , 2012 (confidential document) [12] Product Data Sheet, SmartMX2 family P60D080/144 and P60C080/144, NXP Semiconductors, Business: 1
- February 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D144PVA Configuration List for the firmware, NXP: 1
- Identification, Rev. 3.3, 24 February 2012 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors: 1
- List, NXP Semiconductors, Rev 00.01, February 1st , 2012 (confidential document) [21] Order Entry Form, P60D144, Release 0.7, Date: 22.09.2011, OEF ID: 1250, NXP Semiconnductors: 1
- P60x144/080PVA, Version 1.3, 11 July 2012, T-Systems GEI GmbH (confidential document) 8 specifically • AIS 20, Version 2, 19 September 2011, Funktionalitätsklassen und: 1
- Rev 0.2, December 14th , 2011 (confidential document) [19] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Appendix of the Configuration List: 1
- Rev. 1.2, 10 April 2012 (confidential document) [15] Wafer and delivery specification, SmartMX2 family P60D080/144 VA and P60C080/144 VA, NXP: 1
- Rev. 3.2, 28 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors: 1
- Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] Guidance and Operation Manual, NXP Secure Smart Card Controller P60x0880VA/P60x144VA, NXP: 1
- Version 1.37, 14 May 2012, NXP Secure Smart Card Controller P60x144/080PVA, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
- composite evaluation, NXP Semiconductors, Rev 01.00, March 28th , 2012 (confidential document) [20] NXP Secure Smart Card Controller P60x144eVA / P60x080eVA Customer specific Appendix of the: 1
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20191223171225+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report_NSCIB-CC-19-0016828-CR.pdf
- pdf_file_size_bytes: 305591
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20120810084544+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Security Controller, Smart Card, EAL 6, NXP, P60"
- /ModDate: D:20120830082746+02'00'
- /Producer: LibreOffice 3.5
- /Subject: Certification
- /Title: Certification Report BSI-DSZ-CC-0666-2012
- pdf_file_size_bytes: 697184
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
[ST] CC Huawei iTrustee Software V5.0 Security Target V6.0.pdf |
0666b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 36
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- AVA:
- AVA_TEE: 4
- AVA_TEE.2: 17
- AVA_VAN: 2
- AVA_VAN.2: 5
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 4
- ALC_CMC.4: 3
- ALC_CMC.5: 4
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_ARP.1: 10
- FAU_ARP.1.1: 1
- FAU_GEN.1: 2
- FAU_SAA.1: 2
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 9
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 17
- FCS_COP.1.1: 1
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 9
- FDP_ACF: 24
- FDP_ACF.1: 12
- FDP_IFC: 18
- FDP_IFC.1: 5
- FDP_IFC.2: 3
- FDP_IFF: 19
- FDP_IFF.1: 8
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT: 9
- FDP_ITT.1: 2
- FDP_RIP: 8
- FDP_RIP.1: 2
- FDP_ROL: 8
- FDP_ROL.1: 3
- FDP_SDI.2: 17
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UID.1: 1
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 10
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 47
- FMT_MSA.1: 5
- FMT_MSA.3: 10
- FMT_SMF.1: 23
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 15
- FPT_FLS.1.1: 1
- FPT_INI.1: 1
- FPT_ITT: 1
- FPT_STM: 1
- FPT_TEE.1: 8
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.4: 3
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FCS_RNG.1: 7
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 36
- FDP_ACC.1.1: 2
- FDP_ACF.1: 32
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_FLS.1: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_ITT.1: 14
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 4
- FMT_MSA.1: 25
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 13
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.INTEGRATION: 5
- A.PROTECTION_AFTER_DELILVERY: 1
- A.PROTECTION_AFTER_DELIVER: 1
- A.PROTECTION_AFTER_DELIVERY: 3
- A.ROLLBACK: 5
- A.SECUREBOOT: 5
- A.SECURE_HARDWARE_PLATFO: 1
- A.SECURE_HARDWARE_PLATFORM: 4
- A.TA_DEVELOPMENT: 5
- O:
- O.CA_TA_IDENTIFICATION: 11
- O.INITIALIZATION: 22
- O.INSTANCE_TIME: 1
- O.KEYS_USAGE: 14
- O.OPERATION: 34
- O.RNG: 1
- O.RUNTIME_CONFIDENTIALITY: 22
- O.RUNTIME_INTEGRITY: 24
- O.TA_AUTHENTICITY: 17
- O.TA_ISOLATION: 21
- O.TEE_DATA_PROTECTION: 18
- O.TEE_ID: 1
- O.TEE_ISOLATION: 16
- O.TRUSTED_STORAGE: 26
- OE:
- OE.INITIALIZATION: 26
- OE.INSTANCE_TIME: 6
- OE.INSTANC_TIME: 1
- OE.INTEGRATION_CONFIGURATI: 3
- OE.INTEGRATION_CONFIGURATION: 12
- OE.PROTECTION_AFTER_DELIVE: 3
- OE.PROTECTION_AFTER_DELIVERY: 8
- OE.RNG: 7
- OE.ROLLBACK: 9
- OE.SECRETS: 6
- OE.TA_DEVELOPMENT: 7
- OE.TEE_ID: 11
- OE.TRUSTED_HARDWARE: 24
- OP:
- OP.EXTRACT_KEY: 4
- OP.LOAD: 3
- OP.STORE: 4
- OP.USE_KEY: 4
- OSP:
- OSP: 1
- OSP.INTEGRATION_CONFIGURAT: 1
- OSP.INTEGRATION_CONFIGURATION: 4
- OSP.SECRETS: 5
- T:
- T.ABUSE_FUNCT: 15
- T.CLONE: 12
- T.FLASH_DUMP: 6
- T.IMPERSONATION: 8
- T.PERTURBATION: 14
- T.RAM: 11
- T.RNG: 9
- T.ROGUE_CODE_EXECUTION: 15
- T.SPY: 9
- T.STORAGE_CORRUPTION: 12
- T.TEE_FIRMWARE_DOWNGRADE: 8
|
- O:
- O.CUST_RECONFIG: 5
- O.EEPROM_INTEGRITY: 5
- O.FM_FW: 9
- O.HW_AES: 7
- O.INTEGRITY_CHK: 7
- O.MEM_ACCESS: 9
- O.RND: 3
- O.SFR_ACCESS: 9
- T:
|
pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 157
- Huawei Technologies Co: 77
|
- NXP:
- NXP: 102
- NXP Semiconductors: 27
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 3
- TDES: 1
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA224: 4
- SHA384: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- fault injection: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 3
- FIPS 197: 1
- FIPS 46: 1
- FIPS 81: 1
- FIPS PUB 180-4: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- PKCS:
- PKCS #1: 2
- PKCS #3: 1
- PKCS1: 2
- RFC:
- RFC 1321: 2
- RFC 2202: 1
- RFC 3610: 1
- RFC 4231: 1
- RFC2119: 1
|
- BSI:
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 14443: 16
- ISO/IEC 18092: 2
- ISO/IEC 7816: 24
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- design and development. Delivering image of iTrustee to device manufacturer. The other phases are out of scope of this ST. The TOE doesn’t provides TA management. CC Huawei iTustee Software Security Target 2: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Alternative descriptive title: Security Target Lite
- /Author: NXP Semiconductors
- /CertificationID: BSI-DSZ-CC-0666
- /Company: NXP Semiconductors GmbH Germany
- /Copyright date: 2012
- /CreationDate: D:20120514120203+02'00'
- /Creator: Acrobat PDFMaker 9.0 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Document identifier:
- /Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA
- /ModDate: D:20120830083036+02'00'
- /Modification date: 14-May-2012
- /Producer: Adobe PDF Library 9.0
- /Product name title: <not applicable>
- /Revision: Rev. 1.37
- /Security status: <Security status>
- /SourceModified: D:20120514095955
- /Specification status: Evaluation documentation Public
- /Subject: P60D144PVA
- /Template date: 29 January 2010
- /Template version: 2.9.0
- /Title: Security Target Lite
- /docpath: C:\localdata\SysArch\projects\id_smx21\work02\data\id_smx21_lib\id_smx21\DOCUMENTS\project_docu\Evaluation\Procedure_P60D144\ASE
- /list_of_authors: Thomas Rottschaefer
- /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\99_prj_mgmt\Templates\V2.9.0_R1
- /relBiblioPath: ..\..\Bibliography.doc
- /test_sec_row_naming: manufacturer area
- /text_cert_body_long: Bundesamt fuer Sicherheit in der Informationstechnik
- /text_cert_body_short: BSI
- /text_developer_long: NXP Semiconductors, Business Unit Identification
- /text_developer_short: NXP
- /text_product_cfgC080: P60C080PVA
- /text_product_cfgC144: P60C144PVA
- /text_product_cfgD080: P60D080PVA
- /text_product_cfgD144: P60D144PVA
- /text_product_cfgD144_nameplate: 9050B
- /text_product_letter: A
- /text_product_long: NXP Secure Smart Card Controller P60x144/080P
- /text_product_minor: VA
- /text_product_short: P60x144/080PVA
- /text_sponsor_long: NXP Semiconductors, Business Unit Identification
- /text_sponsor_short: NXP
- pdf_file_size_bytes: 656626
- pdf_hyperlinks: mailto:[email protected]
|