name |
Mobile FeliCa OS 3.0 on T6NE1/0115_432B |
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
05.09.2021 |
01.09.2019 |
not_valid_before |
05.09.2016 |
17.02.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-56en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-56en.pdf |
manufacturer |
FeliCa Networks, Inc |
Gemalto / NXP Semiconductors |
manufacturer_web |
https://https://www.felicanetworks.co.jp/en/ |
https://www.gemalto.com/ |
security_level |
EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
6835e0576746ad57 |
03de79a10467e320 |
heuristics/cert_id |
SERTIT-081 |
ANSSI-CC-2009/56 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
CVE-2014-2103, CVE-2014-3402, CVE-2014-3406, CVE-2011-4022, CVE-2013-1218, CVE-2013-1243 |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ATE_COV.2, AVA_VLA.4, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ADV_FSP.4, ALC_DEL.1, ATE_IND.2, ALC_DVS.2, ALC_LCD.1, AGD_OPE.1, ADV_IMP.2, ADV_TDS.3, ADV_ARC.1, ATE_DPT.1, ALC_CMC.4, AVA_MSU.3, AGD_PRE.1 |
heuristics/extracted_versions |
3.0 |
1.2, 4.2.7, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2012/81, ANSSI-CC-2010/59, ANSSI-CC-2010/52 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2012/81, ANSSI-CC-2010/59, ANSSI-CC-2010/52, Certificate Number: 2012/81 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 05.09.2016
- developer: FeliCa Networks, Inc.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-081
- certification_date: 05.09.2016
- description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
- developer: FeliCa Networks, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
- sponsor: FeliCa Networks, Inc.
- product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
- url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SERTIT-081 CR 1.0.pdf |
ANSSI-CC_2009-56en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1
- cert_id: ANSSI-CC-2009/56
- cert_item: Multiapp ID IAS ECC smart card : electronic signature application v4.2.7.A loaded on Multiapp v1.0 Java Card platform with v1.2 soft mask embedded on NXP P5CD144 VOB
- cert_item_version: Applet version: v4.2.7.A Multiapp Java Card platform version : v1.0 soft mask version: v1.2 Microcontroller version : V0B
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, France Phone: +33 (0)5 57 26 08 75, email : [email protected]
- developer: Gemalto SA1 6 rue de la Verrerie 92197 Meudon, France NXP Semiconductors GmbH1 Stresemannallee 101 D-22502 Hamburg, Germany Sponsor Gemalto SA 6 rue de la Verrerie, 92197 Meudon, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: BSI-PP-0005-2002] : SSCD Type 2, version 1.04 [BSI-PP-0006-2002] : SSCD Type 3, version 1.05
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0411-2007-MA-04: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP-0002-2001: 2
- BSI-PP-0005-: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 3
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 18
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 4 augmented: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 3
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADO:
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
- AVA_MSU.3: 1
- AVA_VAN: 1
- AVA_VAN.5: 2
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- NXP:
- NXP: 9
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Wei Yuan
- /CreationDate: D:20160905104440Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20160905104440Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1388306
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20100827152755+02'00'
- /Keywords:
- /ModDate: D:20100827152755+02'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- pdf_file_size_bytes: 147571
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
[STP-T] F03T-ASEP01-E01-70.pdf |
anssi-cc-cible_2009-56en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0002-2001: 1
- BSI-PP-0004-2002T-: 1
- BSI-PP-0005-2002T-03-04-2002: 1
- BSI-PP-0006-2002T-03-04-2002: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 8
- EAL4 augmented: 6
- EAL4+: 4
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ATE:
- ATE_DPT.2: 6
- ATE_FUN.1: 2
- AVA:
|
- ACM:
- ACM_AUT: 1
- ACM_CAP: 2
- ACM_SCP: 2
- ADO:
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.4: 1
- ADV_HLD: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_LLD: 1
- ADV_TDS.3: 1
- AGD:
- AGD_ADM: 1
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 3
- AGD_USR: 1
- ALC:
- ALC_CMC: 2
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_DEL: 2
- ALC_DEL.1: 1
- ALC_DVS: 3
- ALC_DVS.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.3: 2
- AVA_SOF: 1
- AVA_VAN: 2
- AVA_VAN.5: 2
- AVA_VLA: 1
- AVA_VLA.4: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_RNG: 1
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITT.1: 6
- FDP_ITT.1.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 9
- FCS_CKM.1: 5
- FCS_CKM.4: 4
- FCS_COP: 9
- FCS_COP.1: 9
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 9
- FDP_ACF: 9
- FDP_ACF.1: 24
- FDP_ETC: 6
- FDP_ETC.1: 4
- FDP_ITC: 6
- FDP_ITC.1: 8
- FDP_RIP: 4
- FDP_RIP.1: 2
- FDP_RIP.1.1: 1
- FDP_SDI: 5
- FDP_SDI.2: 7
- FDP_UCT: 3
- FDP_UCT.1: 5
- FDP_UIT: 6
- FDP_UIT.1: 6
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 4
- FIA_ATD.1: 2
- FIA_ATD.1.1: 1
- FIA_UAU: 3
- FIA_UAU.1: 3
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UID: 4
- FIA_UID.1: 4
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 3
- FMT_MOF.1: 3
- FMT_MOF.1.1: 1
- FMT_MSA: 9
- FMT_MSA.1: 5
- FMT_MSA.2: 3
- FMT_MSA.2.1: 1
- FMT_MSA.3: 7
- FMT_MTD: 3
- FMT_MTD.1: 3
- FMT_MTD.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 3
- FMT_SMF.1.1: 2
- FMT_SMR: 3
- FMT_SMR.1: 3
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_AMT: 1
- FPT_AMT.1: 1
- FPT_FLS: 3
- FPT_FLS.1: 3
- FPT_FLS.1.1: 1
- FPT_PHP: 4
- FPT_PHP.1: 3
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_TST: 5
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 10
- FTP_ITC.1: 14
- FTP_TRP: 7
- FTP_TRP.1: 3
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AC: 18
- O.RND: 4
- O.SC: 13
- T:
|
- A:
- D:
- D.DTBS: 6
- D.RAD: 5
- D.SCD: 10
- D.SIG: 3
- D.SSCD: 1
- D.SVD: 7
- D.VAD: 1
- OE:
- OE.HI_VAD: 3
- OE.SVD_AUTH_CGA: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- malfunction: 3
- SCA:
- Leak-Inherent: 10
- Physical Probing: 2
- physical probing: 4
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- Side channel: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 46-3: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- JC2.2: 1
- JC2.2.1: 1
- Java Card 2.2.1: 5
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
- out of scope: 1
|
- OutOfScope:
- Multiapp platform. Beside the TOE, the product also contains the following Java Card applications (out of scope of the TOE) Figure 1 represents the product. The TOE is bordered with bold and un-continuous line: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: FeliCa Networks, Inc
- /ChipVendor: Toshiba
- /Company: FeliCa Networks, Inc
- /CreationDate: D:20160708165517+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
- /DocNumber: F03T-ASEP01-E01-70
- /DocVersion: 1.70
- /IssueDate: June 2016
- /ModDate: D:20160708171515+09'00'
- /ModelName: T6NE1
- /Producer: Adobe PDF Library 11.0
- /ProductName: Mobile FeliCa OS 3.0 on T6NE1
- /ProductType: Mobile FeliCa IC Chip
- /SourceModified: D:20160708065621
- pdf_file_size_bytes: 365339
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /CreationDate: D:20100301110216+01'00'
- /Keywords:
- /ModDate: D:20100301110216+01'00'
- /Producer: GPL Ghostscript 8.54
- pdf_file_size_bytes: 791366
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 58
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |