Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RISE Konnektor V5.1
BSI-DSZ-CC-1052-V6-2024
Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0
NSCIB-CC-09-10991-CR
name RISE Konnektor V5.1 Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme DE NL
status active archived
not_valid_after 23.01.2029 24.06.2019
not_valid_before 24.01.2024 24.06.2009
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1052V6c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1052V6a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-10991-CR.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1052V6b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/957-2-STP-E01-10.pdf
manufacturer Research Industrial Systems Engineering (RISE) Forschungs-, Entwicklungs- und Großprojekteberatung GmbH Sony Corporation
manufacturer_web https://www.rise-world.com/ https://www.sony.com/
security_level ADV_FSP.4, EAL3, AVA_VAN.5, ALC_FLR.2, ADV_IMP.1, ALC_TAT.1, ADV_TDS.3 EAL4
dgst 65d148b67bc5288a b2a375e103b59ffb
heuristics/cert_id BSI-DSZ-CC-1052-V6-2024 NSCIB-CC-09-10991-CR
heuristics/cert_lab BSI []
heuristics/extracted_sars AGD_PRE.1, ALC_TAT.1, AVA_VAN.5, ALC_DEL.1, ADV_FSP.4, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ADV_IMP.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1
heuristics/extracted_versions 5.1 1.0
heuristics/report_references/directly_referencing BSI-DSZ-CC-1052-V5-2022 BSI-DSZ-CC-0351-2006
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1052-V3-2021, BSI-DSZ-CC-1052-2018, BSI-DSZ-CC-1052-V4-2021, BSI-DSZ-CC-1052-V2-2020, BSI-DSZ-CC-1052-V5-2022 BSI-DSZ-CC-0351-2006, BSI-DSZ-CC-0212-2004
heuristics/scheme_data
  • category: eHealth
  • cert_id: BSI-DSZ-CC-1052-V6-2024
  • certification_date: 24.01.2024
  • enhanced:
    • applicant: Research Industrial Systems Engineering (RISE) Forschungs-, Entwicklungs- und Großprojektberatung GmbH Concorde Business Park F 2320 Schwechat Austria
    • assurance_level: EAL3,AVA_VAN.5,ALC_TAT.1,ALC_FLR.2,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
    • cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1052V6c_pdf.pdf?__blob=publicationFile&v=1
    • certification_date: 24.01.2024
    • description: The target of evaluation (TOE) is the network connector (German “Netzkonnektor”) RISE-Konnektor V1.0. The TOE is part of the application connector (German “Anwendungskonnektor”) as an “e-Health Konnektor” in the context of the German health care telematics infrastructure.
    • entries: [frozendict({'id': 'BSI-DSZ-CC-1052-V6-2024-MA-01 (Ausstellungsdatum / Certification Date 14.03.2024) Maintenance Report', 'description': '-Client'}), frozendict({'id': 'BSI-DSZ-CC-1052-V6-2024 (Ausstellungsdatum / Certification Date 24.01.2024, gültig bis / valid until 23.01.2029) Zertifizierungsreport / Certification Report', 'description': 'is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration.'}), frozendict({'id': 'BSI-DSZ-CC-1052-V5-2022 (Ausstellungsdatum / Certification Date 14.04.2022, gültig bis / valid until 13.04.2027) Zertifizierungsreport / Certification Report', 'description': 'is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration. This version implements the changes from PTV4 to PTV5.'}), frozendict({'id': 'BSI-DSZ-CC-1052-V4-2021 (Ausstellungsdatum / Certification Date 27.08.2021, gültig bis / valid until 26.08.2026) Zertifizierungsreport / Certification Report', 'description': 'is part of the Konnektor and it is delivered pre-installed on exactly one hardware-configuration.'}), frozendict({'id': 'BSI-DSZ-CC-1052-V3-2021 (Ausstellungsdatum / Certification Date 22.02.2021, gültig bis / valid until 21.02.2026) Zertifizierungsreport / Certification Report', 'description': 'The security functionality of the Anwendungskonnektor comprises the signature service, encryption and decryption of documents, a card terminal service and a smart card service. Together with the network connector, the Anwendungskonnektor also enables secure communication between the connector and the client system and between Fachmodulen and Fachdiensten.'}), frozendict({'id': 'BSI-DSZ-CC-1052-V2-2020 (Ausstellungsdatum / Certification Date 24.06.2020, gültig bis / valid until 23.06.2025) Zertifizierungsreport / Certification Report', 'description': ') of the German health care.'}), frozendict({'id': 'BSI-DSZ-CC-1052-2018 (Ausstellungsdatum / Certification Date 08.01.2019, gültig bis / valid until 07.01.2024) Zertifizierungsreport / Certification Report', 'description': 'Certificat'})]
    • evaluation_facility: SRC Security Research & Consulting GmbH
    • expiration_date: 23.01.2029
    • product: RISE Konnektor V5.1
    • protection_profile: Common Criteria Schutzprofil (Protection Profile), Schutzprofil 1: Anforderungen an den Netzkonnektor, Version 1.6.6, BSI-CC-PP-0097-V2-2020-MA-01 vom 15.04.2021;
    • report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1052V6a_pdf.pdf?__blob=publicationFile&v=1
    • target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1052V6b_pdf.pdf?__blob=publicationFile&v=1
  • product: RISE Konnektor V5.1
  • subcategory: Software
  • url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Software/1052_1052V2_1052V3_1052V4_1052V5_1052V6.html
  • vendor: Research Industrial Systems Engineering (RISE) Forschungs-, Entwicklungs- und Großprojektberatung GmbH
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0351-2006
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0351-2006
heuristics/protection_profiles 19e2d2b1593c97a5 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0097V2b_pdf.pdf {}
pdf_data/cert_filename 1052V6c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1052-V6-2024: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0097-V2-2020-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 3: 1
    • EAL 4: 1
    • EAL 5: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 1
    • ALC_TAT.1: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Konnektor"
  • /Subject: Common Criteria, Certification, Zertifizierung, Konnektor
  • /Title: Zertifikat BSI-DSZ-CC-1052-V6-2023
  • pdf_file_size_bytes: 393917
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 1052V6a_pdf.pdf Certification_Report_NSCIB-CC-09-10991-CR.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-1052-V6-2024
    • cert_item: RISE Konnektor, V5.1
    • cert_lab: BSI
    • developer: Research Industrial Systems Engineering (RISE
    • match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
  • NL:
  • DE:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1052-V5-2022: 2
    • BSI-DSZ-CC-1052-V6-2024: 19
  • DE:
    • BSI-DSZ-CC-0351-2006: 1
  • NL:
    • NSCIB-07-09612: 1
    • NSCIB-CC-09-10991: 2
    • NSCIB-CC-09-10991-CR: 16
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0097-V2-2020-: 1
    • BSI-CC-PP-0097-V2-2020-MA-01: 1
    • BSI-CC-PP-0097-V2-2021-MA-01: 1
  • BSI:
    • BSI-PP- 0002: 1
    • BSI-PP-0002: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 3
    • EAL 3: 4
    • EAL 4: 2
    • EAL 5: 1
    • EAL5+: 1
    • EAL6: 1
  • EAL:
    • EAL 4: 2
    • EAL4: 1
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.4: 4
    • ADV_IMP.1: 4
    • ADV_TDS.3: 4
  • ALC:
    • ALC_FLR: 3
    • ALC_FLR.2: 4
    • ALC_TAT.1: 4
  • AVA:
    • AVA_CCA: 3
    • AVA_VAN.5: 5
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 2
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_UIT: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.NK: 5
  • R:
    • R.T: 1
  • T:
    • T.M: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 6
  • BrightSight:
    • Brightsight: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
      • AES-: 8
      • AES-128: 2
  • constructions:
    • MAC:
      • HMAC: 8
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 8
      • Diffie-Hellman: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-2: 1
      • SHA-256: 6
    • SHA3:
      • SHA-3: 1
pdf_data/report_keywords/crypto_scheme
  • AEAD:
    • AEAD: 1
  • KEX:
    • Key Exchange: 3
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
    • IKEv2: 9
  • IPsec:
    • IPsec: 10
  • TLS:
    • TLS:
      • TLS: 20
      • TLS 1.2: 2
      • TLS v1.2: 7
  • VPN:
    • VPN: 12
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • GCM:
    • GCM: 4
  • CBC:
    • CBC: 1
pdf_data/report_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
  • SCA:
    • physical probing: 2
    • side channels: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
    • BSI TR-03111: 1
    • BSI TR-03116-1: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 20: 2
    • AIS 23: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 38: 1
    • AIS 46: 1
  • FIPS:
    • FIPS 180-4: 11
    • FIPS 186-4: 4
    • FIPS 197: 4
    • FIPS 202: 1
    • FIPS PUB 180-4: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • SP 800-38D: 2
    • SP 800-56A: 1
    • SP 800-90A: 1
  • PKCS:
    • PKCS#1: 4
    • PKCS#12: 2
  • RFC:
    • RFC 1321: 1
    • RFC 2104: 5
    • RFC 2404: 4
    • RFC 2898: 2
    • RFC 3268: 5
    • RFC 3279: 1
    • RFC 3526: 4
    • RFC 3602: 4
    • RFC 4055: 2
    • RFC 4301: 4
    • RFC 4303: 4
    • RFC 4346: 2
    • RFC 4492: 4
    • RFC 4868: 4
    • RFC 5083: 1
    • RFC 5084: 1
    • RFC 5116: 2
    • RFC 5246: 7
    • RFC 5280: 2
    • RFC 5289: 3
    • RFC 5639: 2
    • RFC 5652: 1
    • RFC 5751: 1
    • RFC 5869: 2
    • RFC 7027: 4
    • RFC 7292: 2
    • RFC 7296: 6
    • RFC 8017: 8
  • X509:
    • X.509: 4
  • BSI:
    • AIS 20: 1
    • AIS20: 2
  • CC:
    • CCIMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 46-3: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • 1.2, 9 December 2004. [ST] Security Target RC-S957/2 Series with contact-based operating system out of scope, version 1.1, May 2009. [ST-HW] Renesas AE45X1-C (HD65145X1) Version 03 Smartcard Security Target –: 1
    • 19, 2007. [ETR] Evaluation Technical Report, RC-S957/2 Series with contact operating system out of scope (09-RPT-128), Version 2.0, June 23, 2009. [ETR-HW] Renesas AE45X1-C ETR-Lite, version 1.0, July 13: 1
    • 24, 2009 3 Security Target The Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST- E01-10), version 1.1, May 2009 is included here by reference. Please note that for the: 1
    • Assurance Level (EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan. This report pertains to the TOE which has the: 1
    • Common Criteria security evaluation of the RC- S957/2 Series with contact-based operating system out of scope, v1.0. The developer of the RC- S957/2 Series with contact-based operating system out of scope is: 1
    • EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan: 1
    • Evaluation Lab Brightsight BV TOE name RC-S957/2 Series with contact-based operating system out of scope, v1.0 Report title Certification Report Report reference name NSCIB-CC-09-10991-CR number page: 1
    • NSCIB-CC-09-10991 Certification Report Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 Reproduction of this report is authorized provided the report is reproduced in its entirety: 1
    • The Target of Evaluation – TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system. The TOE is: 1
    • and was completed on 29 May 2008. The current RC-S957/2 Series with contact operating system out of scope v1.0 has been re-evaluated by Brightsight B.V. located in Delft, The Netherlands and was completed: 1
    • as the NSCIB Certification Body, declares that the RC-S957/2 Series with contact operating system out of scope, v1.0 evaluation meets all the conditions for international recognition of Common Criteria: 1
    • evaluation results the evaluation lab concluded the RC-S957/2 Series with contact operating system out of scope, v1.0, to be CC Part 2 conformant, CC Part 3 conformant, and to meet the requirements of EAL 4: 1
    • evidence, Sony Corporation as the developer of the RC-S957/2 Series with contact operating system out of scope, v1.0 submitted an Impact Analysis Report [IAR] to the NSCIB Certification Body requesting a new: 1
    • i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system: 1
    • in yellow. The form factor of the smartcard is indicated in gray. The Global Platform OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
    • is a “delta” with respect to the evaluation of the “RC-S957 Series with contact operating system out of scope” with certification id NSCIB-07-09612. The difference between this evaluated TOE and the original: 1
    • is defined uniquely by its name and version number RC-S957/2 Series with contact operating system out of scope, v1.0 and can be identified by its ROM version: 0C06 and form factor: Antenna Module (IC with: 1
    • out of scope: 21
    • reader is encrypted (based on single DES). The RC-S957/2 Series with contact-based operating system out of scope has several self-protection mechanisms, as follows: Ø Common smartcard self-protection mechanisms: 2
    • recently performed evaluation of the original RC-S957 Series with contact-based operating system out of scope, v1.0. The original RC-S957 Series was certified on June 9th 2008 under the certification: 1
    • requirements specified in Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST-E01-10), version 1.1, May 2009. The Security Target does not claim conformance to any: 1
    • the evaluation, the intended environment for the RC-S957/2 Series with contact operating system out of scope, the security requirements, and the level of confidence (evaluation assurance level) at which the: 1
pdf_data/report_metadata
  • /Author: p647
  • /CreationDate: D:20090702110646+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
  • /Title: Certification Report NSCIB-CC-09-10991-CR.doc
  • pdf_file_size_bytes: 253688
  • pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 16
pdf_data/st_filename 1052V6b_pdf.pdf 957-2-STP-E01-10.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1052: 1
  • DE:
    • BSI-DSZ-CC-0351-2006: 1
    • BSI-DSZ-CC-0351-2006-MA-01: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0082-: 1
    • BSI-CC-PP- 0098-V2: 1
    • BSI-CC-PP-0097-V2-2020-MA-: 2
    • BSI-CC-PP-0097-V2-2020-MA-01: 9
    • BSI-CC-PP-0098-: 1
    • BSI-CC-PP-0098-V2: 7
  • BSI:
    • BSI-PP-0002: 6
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 14
  • EAL:
    • EAL4: 7
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP.4: 7
    • ADV_IMP.1: 9
    • ADV_TDS.1: 1
    • ADV_TDS.2: 2
    • ADV_TDS.3: 7
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 12
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DEL.1: 6
    • ALC_FLR.2: 6
    • ALC_TAT.1: 8
  • ATE:
    • ATE_DPT.1: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 10
  • ACM:
    • ACM_AUT.1: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 6
  • AGD:
    • AGD_ADM.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 16
    • FAU_GEN.1: 5
    • FAU_GEN.2: 1
    • FAU_STG: 2
  • FCS:
    • FCS_CKM: 90
    • FCS_CKM.1: 14
    • FCS_CKM.2: 6
    • FCS_CKM.4: 13
    • FCS_COP: 77
    • FCS_COP.1: 12
  • FDP:
    • FDP_ACC: 11
    • FDP_ACC.1: 7
    • FDP_ACF: 8
    • FDP_ACF.1: 5
    • FDP_ETC: 9
    • FDP_ETC.2: 4
    • FDP_IFC: 20
    • FDP_IFC.1: 7
    • FDP_IFF: 21
    • FDP_IFF.1: 16
    • FDP_ITC: 9
    • FDP_ITC.1: 12
    • FDP_ITC.2: 17
    • FDP_RIP: 6
    • FDP_RIP.1: 1
    • FDP_UIT: 9
    • FDP_UIT.1: 2
  • FIA:
    • FIA_UID: 8
    • FIA_UID.1: 4
  • FMT:
    • FMT_MOF: 13
    • FMT_MOF.1: 1
    • FMT_MSA: 48
    • FMT_MSA.1: 2
    • FMT_MSA.3: 6
    • FMT_MSA.4: 1
    • FMT_MTD: 8
    • FMT_MTD.1: 1
    • FMT_SMF: 18
    • FMT_SMF.1: 4
    • FMT_SMR: 23
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
  • FPT:
    • FPT_EMS: 17
    • FPT_EMS.1: 7
    • FPT_EMS.1.1: 2
    • FPT_EMS.1.2: 2
    • FPT_STM: 11
    • FPT_STM.1: 2
    • FPT_TDC: 22
    • FPT_TDC.1: 6
    • FPT_TST: 7
    • FPT_TST.1: 3
  • FTP:
    • FTP_ITC: 50
    • FTP_ITC.1: 26
    • FTP_TRP: 14
    • FTP_TRP.1: 5
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 18
    • FCS_COP.1: 4
    • FCS_MSA.3: 1
    • FCS_RCV.4: 2
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 10
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 3
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 8
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NK: 56
  • O:
    • O.AK: 1
    • O.NK: 196
  • OE:
    • OE.NK: 164
  • OSP:
    • OSP.NK: 22
  • T:
    • T.NK: 142
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 22
      • AES-128: 3
      • AES-256: 2
    • HPC:
      • HPC: 1
  • constructions:
    • MAC:
      • HMAC: 31
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-2: 2
      • SHA-256: 6
      • SHA256: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 4
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 2
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 25
    • IKEv2: 8
  • IPsec:
    • IPsec: 31
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 143
      • TLS 1.2: 2
      • TLS 1.3: 1
  • VPN:
    • VPN: 58
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 13
  • RNG:
    • RNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 3
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 2
    • brainpoolP384r1: 1
  • NIST:
    • P-256: 2
    • P-384: 2
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • side channel: 1
  • FI:
    • physical tampering: 2
  • SCA:
    • Side_channel: 1
    • physical probing: 6
    • side channel: 1
    • side channels: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 4: 1
    • BSI TR-03116-1: 3
    • BSI TR-03144: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 197: 2
    • FIPS PUB 180-4: 4
  • PKCS:
    • PKCS #12: 1
    • PKCS#12: 2
  • RFC:
    • RFC 1323: 1
    • RFC 2104: 3
    • RFC 2131: 2
    • RFC 2132: 2
    • RFC 2401: 1
    • RFC 2402: 1
    • RFC 2404: 2
    • RFC 2406: 2
    • RFC 2460: 1
    • RFC 2560: 1
    • RFC 2663: 1
    • RFC 3268: 1
    • RFC 3279: 1
    • RFC 3526: 1
    • RFC 3602: 3
    • RFC 3947: 1
    • RFC 4035: 1
    • RFC 4055: 2
    • RFC 4301: 5
    • RFC 4302: 2
    • RFC 4303: 6
    • RFC 4330: 1
    • RFC 4346: 1
    • RFC 4868: 2
    • RFC 5246: 4
    • RFC 5280: 1
    • RFC 5289: 2
    • RFC 5639: 1
    • RFC 5905: 1
    • RFC 7296: 8
    • RFC 791: 1
    • RFC 793: 1
    • RFC 8017: 3
    • RFC 8422: 2
    • RFC 8446: 1
    • RFC 958: 1
    • RFC-5639: 1
    • RFC-7027: 1
  • X509:
    • X.509: 14
  • BSI:
    • AIS 20: 1
    • AIS20: 4
  • FIPS:
    • FIPS PUB 46-3: 5
  • ISO:
    • ISO/IEC 7810: 2
    • ISO/IEC18092: 2
    • ISO/IEC7816: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Public Version No. 957-2-STP-E01-10 Introduction This document is the Security: 1
    • FeliCa Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version 1.1 : June 2009 Sony Corporation FeliCa Business Division NO.957-2-STP-E01-10 ©2009 Sony: 1
    • ST identification ST Name: Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Date: June 2009 TOE identification TOE Name: RC-S957/2 Series with contact-based: 1
    • Security Target presents the following TOE: RC-S957/2 Series with contact-based operating system out of scope. The TOE is a dual interface integrated circuit with an antenna and an embedded smartcard operating: 1
    • TOE Description 2.1. Overview The TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface COT package for an integrated circuit with an embedded smartcard operating: 1
    • is indicated in yellow. The form factor of the smartcard is indicated in gray. The GP OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
    • out of scope: 7
    • system out of scope Version: 1.0 Product type: Dual Interface IC Chip for smartcard Form factor: Antenna Module (IC: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20090623194607+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /ModDate: D:20090623194911+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20090623104507
  • /Title: Microsoft Word - 957-2-STP-E01-10.doc
  • pdf_file_size_bytes: 344849
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 47
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different