Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RICOH MP C2503/C1803 Version:J-1.00
JISEC-CC-CRP-C0436
NXP J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60 Secure Smart Card Controller of JCOP V2.4.2 R2
BSI-DSZ-CC-0783-2013
name RICOH MP C2503/C1803 Version:J-1.00 NXP J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60 Secure Smart Card Controller of JCOP V2.4.2 R2
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 02.09.2019 01.09.2019
not_valid_before 28.08.2014 31.07.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0436_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0783a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0436_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0783b_pdf.pdf
manufacturer Ricoh Company, Ltd. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.ricoh.com/ https://www.nxp.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, ASE_TSS.2, AVA_VAN.5
dgst 63aaeb511b0dc0bf 48acce2b4800bb7a
heuristics/cert_id JISEC-CC-CRP-C0436 BSI-DSZ-CC-0783-2013
heuristics/cert_lab [] BSI
heuristics/cpe_matches cpe:2.3:h:ricoh:mp_c2503:-:*:*:*:*:*:*:* cpe:2.3:h:nxp:j2d145_m59:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3d145_m59:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3d082_m60:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j2d120_m60:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j2d082_m60:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3d120_m60:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 1.00 2.4.2
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0750-2011
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0750-2011, BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0633-2010
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0436
  • certification_date: 01.08.2014
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0436_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a digital multi-function product that conforms to the security requirement specification of “U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)”, which is a protection profile for Hardcopy devices. This product provides a secure environment for users who use the Copy, Scanner, Printer, Fax, and Document Server functions. TOE security functionality The major security functions of this TOE are as follows: - Audit Function: Enables the TOE to record information related to security events and allows users to review it. - Identification and Authentication Function: Enables the TOE to perform user identification and authentication, lockout, protected password feedback, and auto-logout. - Document Access Control Function: Enables the TOE to control the operations for user documents and user jobs. - Use-of-Feature Restriction Function: Enables the TOE to control the use of features for each user. - Network Protection Function: Enables the TOE to protect network communications using encryption. - Residual Data Overwrite Function: Enables the TOE to overwrite the residual information on the HDD using the specified pattern. - Stored Data Protection Function: Enables the TOE to protect the recorded data on the HDD using encryption. - Security Management Function: Enables the TOE administrator to control security functions. - Software Verification Function: Enables the TOE to verify the integrity of executable codes of control software so that the software can be validated as genuine software. - Fax Line Separation Function: Enables the TOE to prevent illegal intrusion from telephone lines.
    • evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
    • product: RICOH MP C2503/C1803
    • product_type: Multi Function Product
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/c0436_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0436_est.pdf
    • toe_version: J-1.00
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.09.2019
  • supplier: RICOH COMPANY, LTD.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0436_it3477.html
  • toe_japan_name: RICOH MP C2503/C1803 J-1.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles 43ce79b420f23a00 85bef5b6f16c4d33
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename c0436_erpt.pdf 0783a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0783-2013
    • cert_item: NXP J3D145_M59, J2D145_M59, J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60 Secure Smart Card Controller of JCOP V2.4.2 R2
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0436-01: 1
    • Certification No. C0436: 1
  • DE:
    • BSI-DSZ-CC-0645-2010: 1
    • BSI-DSZ-CC-0645-2011: 1
    • BSI-DSZ-CC-0750: 1
    • BSI-DSZ-CC-0750-2010: 1
    • BSI-DSZ-CC-0750-2011: 1
    • BSI-DSZ-CC-0783-2013: 24
    • BSI-DSZ-CC-0784: 1
    • BSI-DSZ-CC-0860: 1
    • BSI-DSZ-CC-645: 1
  • FR:
    • ANSSI-CC-PP-2010/03: 4
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
  • EAL:
    • EAL 4: 3
    • EAL 5: 7
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 7
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 1
    • AGD_PRE: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 2
    • T.DOC: 2
    • T.FUNC: 1
    • T.PROT: 1
  • OE:
    • OE.PROCESS_SEC_IC: 1
    • OE.USE_DIAG: 1
    • OE.USE_KEYS: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 27
    • NXP Semiconductors: 21
pdf_data/report_keywords/eval_facility
  • ECSEC:
    • ECSEC Laboratory: 3
  • BrightSight:
    • Brightsight: 8
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • TDES: 3
      • Triple-DES: 4
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 4
      • CMAC: 2
  • miscellaneous:
    • SEED:
      • SEED: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 6
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 4
  • TLS:
    • SSL:
      • SSL: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 6
  • ECB:
    • ECB: 4
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • side-channel: 1
  • other:
    • JIL: 6
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 3
    • AIS 37: 1
    • AIS 38: 1
  • FIPS:
    • FIPS 00: 1
    • FIPS 180-3: 1
    • FIPS 46-3: 3
  • PKCS:
    • PKCS #1: 3
    • PKCS#3: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform (version 2.2.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • / P5CD041V0B / P5CD021V0B / P5CD016V0B, 12 August 2012, Brightsight (confidential document) 13 Please note that [6] and [8] contain incorrect references to older versions of the document 27: 1
    • 2013, Doc.No. 209431, NXP Semiconductors Germany GmbH (confidential document) 12 specifically • AIS 25, Version 7, Anwendung der CC auf Integrierte Schaltungen including JIL: 1
    • Card Controller, NXP Semiconductors Germany GmbH (confidential document) [11] Administrator manual JCOP V2.4.2 Revision 2 secure smart card controller, Rev. 3.1, 15: 1
    • GmbH (confidential document) [14] Product hardware data sheet JCOP V2.4.2 Revision 2 J3D145, J2D145 and J5D145 secure smart: 1
    • J3D120_M60, J3D082_M60, J2D120_M60, J2D082_M60, Secure Smart Card Controller, Brightsight (confidential document) [10] Configuration list for the TOE, Version 1.3, NXP J3D145 J2D145 J3D145 J2D145 J3D145DF Secure: 1
    • MSO; P5CD128V0A, MSO and P5CC128V0A, MSO, Version 1.33, 29 September 2011, T-Systems GmbH (confidential document) [18] ETR for composition, BSI-DSZ-CC-0750, Crypto Library V2.7 on P5CD145V0B / P5CC145V0B : 1
    • Secure Smart Card Controller Revision 2 Security Target, NXP Semiconductors Germany GmbH (confidential document) [7] Java Card System - Open Configuration Protection Profile, Version 2.6, 19 April 2010: 1
    • controller, Rev. 3.0, 17 October 2011, Doc.No. 209330, NXP Semiconductors Germany GmbH (confidential document) [15] Certification Report, BSI-DSZ-CC-0645-2010 for NXP Secure PKI Smart Card Controllers: 1
    • smart card controller, Rev. 3.3, 27 February 2013, Doc.No. 209233, NXP Semiconductors Germany GmbH (confidential document) [13] UM Secure Box JCOP V2.4.2, Rev. 3.3, 28 February 2013, Doc.No. 22113313 , NXP Semiconductors: 1
pdf_data/report_metadata
  • /CreationDate: D:20141020154720+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20141020154808+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 318787
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 36
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20130819094717+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP JxD145 Secure Smart Card Controller Revision 2 incl. following configurations J2D145 & J3D145, JCOP, NXP"
  • /ModDate: D:20130819095111+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0783-2013
  • pdf_file_size_bytes: 1060648
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
pdf_data/st_filename c0436_est.pdf 0783b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0645: 2
    • BSI-DSZ-CC-0750: 3
    • BSI-DSZ-CC-0783: 2
    • BSI-DSZ-CC-645: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 2
    • BSI-PP-0035: 2
    • BSI-PP-0035-2007: 1
    • BSI-PP-0035-2007―: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL5: 20
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 3
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 12
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 8
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 7
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 3
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 31
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 39
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 20
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 23
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 29
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 8
    • FPT_FDI_EXP.1: 11
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 21
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 4
  • FAU:
    • FAU_ARP.1: 29
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 2
    • FAU_SAS: 13
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 47
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 7
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 42
    • FCS_CKM.4.1: 1
    • FCS_COP: 36
    • FCS_COP.1: 27
    • FCS_RNG: 3
    • FCS_RNG.1: 19
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 72
    • FDP_ACC.1: 19
    • FDP_ACC.2: 9
    • FDP_ACF: 65
    • FDP_ACF.1: 39
    • FDP_IFC: 25
    • FDP_IFC.1: 17
    • FDP_IFC.2: 2
    • FDP_IFF: 20
    • FDP_IFF.1: 13
    • FDP_ITC: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 22
    • FDP_RIP: 91
    • FDP_RIP.1: 10
    • FDP_ROL: 11
    • FDP_ROL.1: 5
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 2
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU.1: 3
    • FIA_UID: 18
    • FIA_UID.1: 11
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 147
    • FMT_MSA.1: 16
    • FMT_MSA.2: 3
    • FMT_MSA.3: 27
    • FMT_MTD: 18
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_REV: 1
    • FMT_SMF: 43
    • FMT_SMF.1: 25
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 40
    • FPT_FLS.1: 25
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 1
    • FPT_PHP: 6
    • FPT_PHP.3: 3
    • FPT_RCV: 10
    • FPT_RCV.3: 4
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT: 11
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 5
    • A.ADMIN: 10
    • A.USER: 4
  • D:
    • D.DOC: 6
    • D.FUNC: 6
  • O:
    • O.AUDIT: 9
    • O.CONF: 18
    • O.DOC: 18
    • O.FUNC: 9
    • O.INTERFACE: 9
    • O.PROT: 9
    • O.RCGATE: 13
    • O.SOFTWARE: 9
    • O.STORAGE: 14
    • O.USER: 21
  • OE:
    • OE.ADMIN: 8
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_ACCESS_AUTHORIZED: 1
    • OE.AUDIT_STORAGE: 3
    • OE.INTERFACE: 4
    • OE.PHYSICAL: 4
    • OE.USER: 21
  • T:
    • T.CONF: 10
    • T.DOC: 14
    • T.FUNC: 7
    • T.PROT: 5
  • A:
    • A.APPLET: 4
    • A.NATIVE: 1
    • A.PPROCESS-SEC-IC: 1
    • A.PROCESS-SEC-IC: 1
    • A.PROCESS_SEC_IC: 2
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 5
    • A.VERIFICATION: 3
  • D:
    • D.ADMIN_CONF_DATA: 3
    • D.API_DATA: 3
    • D.APP_CODE: 10
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 8
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PERSO_CONF_DATA: 4
    • D.PIN: 12
    • D.SEC_DATA: 7
  • O:
    • O.APPLET: 18
    • O.CIPHER: 1
    • O.CODE_: 1
    • O.CODE_PKG: 13
    • O.EXT-MEM: 1
    • O.EXT_MEM_IN: 2
    • O.EXT_MEM_INSTANCE: 8
    • O.JAVAOBJECT: 36
    • O.NON_SB_CONTENT: 1
    • O.NON_SB_SFR: 4
    • O.REMOTE_MTHD: 4
    • O.REMOTE_OBJ: 4
    • O.RMI_SERVICE: 5
    • O.ROR: 2
    • O.SB_CONTENT: 3
    • O.SB_SFR: 5
    • O.SCP: 1
  • OE:
    • OE.APPLET: 6
    • OE.CARD-MANAGEMENT: 1
    • OE.NATIVE: 1
    • OE.PROCESS_SEC_IC: 5
    • OE.SCP: 2
    • OE.USE_DIAG: 8
    • OE.USE_KEYS: 7
    • OE.VERIFICATION: 20
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 6
    • OP.INVK_VIRTUAL: 5
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.RET_RORD: 2
    • OP.SB_ACCESS: 3
    • OP.SB_ACCESS_SFR: 3
    • OP.THROW: 4
    • OP.TYPE_ACCESS: 4
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.PROCESS-TOE: 5
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 15
    • OT.CARD-: 2
    • OT.CARD-MANAGEMENT: 17
    • OT.CIPHER: 11
    • OT.DELETION: 7
    • OT.EXT-MEM: 14
    • OT.FIREWALL: 18
    • OT.GLOBAL_ARRAYS_CONFID: 9
    • OT.GLOBAL_ARRAYS_INTEG: 10
    • OT.IDENTIFICATION: 10
    • OT.INSTALL: 10
    • OT.KEY-: 1
    • OT.KEY-MNGT: 9
    • OT.LOAD: 9
    • OT.MF_FW: 8
    • OT.NATIVE: 9
    • OT.OBJ-DELETION: 8
    • OT.OPERATE: 21
    • OT.PIN-MNGT: 11
    • OT.REALLOCATION: 9
    • OT.REMOTE: 8
    • OT.RESOURCES: 10
    • OT.RND: 12
    • OT.SCP: 40
    • OT.SEC_BOX_FW: 11
    • OT.SID: 13
    • OT.TRANSACTION: 9
    • OT.VERIFICATION: 1
    • OT.XYZ: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 5
    • T.DELETION: 4
    • T.EXE-CODE: 8
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 8
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 5
    • T.INTEG-JCS-DATA: 5
    • T.NATIVE: 5
    • T.OBJ-DELETION: 4
    • T.OS_OPERATE: 7
    • T.PHYSICAL: 4
    • T.RESOURCES: 4
    • T.RND: 7
    • T.SEC_BOX_BORDER: 7
    • T.SID: 8
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 146
    • NXP Semiconductors: 18
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 5
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 7
      • TripleDES: 1
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CBC-MAC: 7
      • CMAC: 5
  • miscellaneous:
    • SEED:
      • SEED: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 19
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 5
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 13
    • SHA2:
      • SHA-224: 8
      • SHA-256: 14
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 10
  • TLS:
    • SSL:
      • SSL3.0: 1
    • TLS:
      • TLS1.0: 2
pdf_data/st_keywords/randomness
  • TRNG:
    • TRNG: 1
  • RNG:
    • RND: 21
    • RNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 24
  • ECB:
    • ECB: 5
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • FI:
    • DFA: 7
    • Fault Injection: 1
    • Physical tampering: 3
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 10
    • SPA: 2
    • physical probing: 3
    • side channel: 15
    • side-channel: 1
    • side-channels: 2
    • timing attack: 1
    • timing attacks: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 2
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 139
pdf_data/st_keywords/standard_id
  • BSI:
    • BSI-AIS31: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS197: 2
  • BSI:
    • AIS 20: 7
    • AIS20: 2
    • AIS31: 1
  • CC:
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 180-3: 6
    • FIPS 186-3: 5
    • FIPS 197: 2
    • FIPS 46-3: 1
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 9796-: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 3
    • PKCS#3: 2
    • PKCS1: 1
  • RFC:
    • RFC 5639: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • GlobalPlatform 2.2.1: 2
  • JavaCard:
    • Java Card 3.0.1: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Author: z00se00558
  • /CreationDate: D:2014073115520209'00'
  • /Creator: PrimoPDF http://www.primopdf.com/
  • /ModDate: D:2014073115520209'00'
  • /Producer: PrimoPDF
  • /Title: Microsoft Word - MP_C2503_ST_DOM_1.00.jp_ENG
  • pdf_file_size_bytes: 5618999
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 91
  • /Author: NXP Semiconductors
  • /CreationDate: D:20130909161853Z
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: JCOP, ST, Security Target Lite
  • /ModDate: D:20130909162017+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target Lite
  • /Title: NXP J3D145_M59, J3D120_M60, J3D082_M60, J2D145_M59, J2D120_M60, and J2D082_M60 Secure Smart Card Controller Revision 2
  • pdf_file_size_bytes: 1544635
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 133
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different