name |
Mobile FeliCa OS 3.0 on T6NE1/0115_432B |
NFC FlyBuy on S3FS91J |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
05.09.2021 |
01.09.2019 |
not_valid_before |
05.09.2016 |
12.07.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2011-24fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2011-24en.pdf |
manufacturer |
FeliCa Networks, Inc |
Oberthur Technologies |
manufacturer_web |
https://https://www.felicanetworks.co.jp/en/ |
https://www.oberthur.com/ |
security_level |
EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 |
EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst |
6835e0576746ad57 |
091d302472777e95 |
heuristics/cert_id |
SERTIT-081 |
ANSSI-CC-2011/24 |
heuristics/cert_lab |
[] |
THALES |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ASE_INT.1, ASE_APD.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
3.0 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2012/06, ANSSI-CC-2012/39 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2009/57 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/60, ANSSI-CC-2013/65, ANSSI-CC-2012/39, ANSSI-CC-2014/81, ANSSI-CC-2012/06, ANSSI-CC-2013/60, ANSSI-CC-2019/38 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2009/57, ANSSI-CC-2009/25 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 05.09.2016
- developer: FeliCa Networks, Inc.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-081
- certification_date: 05.09.2016
- description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
- developer: FeliCa Networks, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
- sponsor: FeliCa Networks, Inc.
- product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
- url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2009/57 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2009/57 |
heuristics/protection_profiles |
{} |
7b81fd67c02d34de |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-04en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SERTIT-081 CR 1.0.pdf |
ANSSI-CC_2011-24fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2011/24
- cert_item: NFC FlyBuy sur S3FS91J
- cert_item_version: version du système d’exploitation en natif : 075895 version du Card Manager en Java Card : GOP Ref V1.5.o
- cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
- developer: Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France Samsung Electronics Co. Ltd San#24 Nongseo-Ri, Giheung-Eup, Yongin-City, Gyeonggi-Do, 449-711, République de Corée Commanditaire Oberthur Technologies 71-73 chemin des Hautes Pâtures, 92 726 NANTERRE CEDEX, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP (U)SIM], version 2.0.2, certifié par l’ANSSI (U)SIM Java Card Platform Protection Profile Basic and SCWS Configurations Evolutive Certification Scheme for (U)SIM cards
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2009/57: 4
- ANSSI-CC-2011/24: 22
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0035: 1
- BSI-PP-0035: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 18
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur: 6
- Oberthur Technologies: 13
- Samsung:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Wei Yuan
- /CreationDate: D:20160905104440Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20160905104440Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1388306
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20110713100055+02'00'
- /Keywords:
- /ModDate: D:20110713100055+02'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- pdf_file_size_bytes: 544621
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
[STP-T] F03T-ASEP01-E01-70.pdf |
ANSSI-CC-cible_2011-24en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2009/57: 1
- ANSSI-CC-PP 2010/04: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 3
- EAL 4 augmented: 1
- EAL4: 7
- EAL4 augmented: 4
- EAL4+: 3
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ATE:
- ATE_DPT.2: 6
- ATE_FUN.1: 2
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 15
- ADV_FSP: 1
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 20
- ADV_IMP: 1
- ADV_IMP.1: 11
- ADV_IMP.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 23
- AGD:
- AGD_ADM: 1
- AGD_OPE: 3
- AGD_OPE.1: 19
- AGD_PRE: 2
- AGD_PRE.1: 12
- AGD_USR: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 16
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL: 1
- ALC_DEL.1: 6
- ALC_DVS: 8
- ALC_DVS.1: 1
- ALC_DVS.2: 14
- ALC_LCD: 1
- ALC_LCD.1: 9
- ALC_TAT: 1
- ALC_TAT.1: 10
- ASE:
- ASE_APD.1: 1
- ASE_CCL: 1
- ASE_CCL.1: 15
- ASE_ECD: 1
- ASE_ECD.1: 14
- ASE_INT: 1
- ASE_INT.1: 17
- ASE_OBJ: 1
- ASE_OBJ.2: 13
- ASE_REQ: 1
- ASE_REQ.1: 2
- ASE_REQ.2: 15
- ASE_SPD: 1
- ASE_SPD.1: 8
- ASE_TSS: 1
- ASE_TSS.1: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 2
- ATE_COV.2: 8
- ATE_DPT: 1
- ATE_DPT.1: 7
- ATE_FUN: 1
- ATE_FUN.1: 14
- ATE_IND: 1
- ATE_IND.2: 7
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_RNG: 1
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITT.1: 6
- FDP_ITT.1.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP.1: 16
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FCO:
- FCS:
- FCS_CKM.1: 19
- FCS_CKM.1.1: 1
- FCS_CKM.2: 8
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 26
- FCS_CKM.4.1: 1
- FCS_COP: 44
- FCS_COP.1: 13
- FCS_COP.1.1: 1
- FCS_RNG: 9
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 47
- FDP_ACC.1: 20
- FDP_ACC.2: 7
- FDP_ACF: 36
- FDP_ACF.1: 24
- FDP_IFC: 44
- FDP_IFC.1: 23
- FDP_IFC.2: 4
- FDP_IFF: 38
- FDP_IFF.1: 26
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 20
- FDP_ITC.1: 8
- FDP_ITC.2: 22
- FDP_RIP: 110
- FDP_RIP.1: 10
- FDP_ROL: 18
- FDP_ROL.1: 7
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 10
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 6
- FIA_AFL.1: 2
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_UAU: 24
- FIA_UAU.1: 4
- FIA_UAU.4: 1
- FIA_UAU.7: 1
- FIA_UID: 28
- FIA_UID.1: 15
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_MSA: 160
- FMT_MSA.1: 17
- FMT_MSA.2: 2
- FMT_MSA.3: 26
- FMT_MSA.3.1: 2
- FMT_MTD: 18
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_REV: 7
- FMT_REV.1: 4
- FMT_SMF: 58
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR: 63
- FMT_SMR.1: 44
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 49
- FPT_FLS.1: 17
- FPT_FLS.1.1: 1
- FPT_PHP: 8
- FPT_PHP.3: 1
- FPT_RCV: 28
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 7
- FPT_TDC.1: 10
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 1
- FRU:
- FTP:
- FTP_ITC: 24
- FTP_ITC.1: 10
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AC: 18
- O.RND: 4
- O.SC: 13
- T:
|
- A:
- A.APPLET: 5
- A.APPS-PROVIDER: 4
- A.CONTROLLING-: 2
- A.CONTROLLING-AUTHORITY: 2
- A.KEY-ESCROW: 4
- A.MOBILE-OPERATOR: 4
- A.OTA-ADMIN: 4
- A.VERIFICATION: 4
- A.VERIFICATION-: 2
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 9
- D.APP_C_DATA: 5
- D.APP_I_DATA: 7
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CASD_KEYS: 3
- D.CRYPTO: 4
- D.GP_CODE: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 5
- D.SEC_DATA: 8
- D.VASD_KEYS: 3
- O:
- O.ALARM: 22
- O.APPLET: 21
- O.APPLI-AUTH: 13
- O.CARD-: 3
- O.CARD-MANAGEMENT: 76
- O.CIPHER: 16
- O.CODE_PKG: 14
- O.COMM_AUTH: 20
- O.COMM_CONFIDENTIALI: 1
- O.COMM_CONFIDENTIALITY: 13
- O.COMM_INTEGRITY: 20
- O.DELETION: 14
- O.DOMAIN-: 17
- O.DOMAIN-RIGHTS: 10
- O.FIREWALL: 51
- O.GLOBAL_ARRAYS_CON: 1
- O.GLOBAL_ARRAYS_CONFI: 1
- O.GLOBAL_ARRAYS_CONFID: 17
- O.GLOBAL_ARRAYS_INTE: 1
- O.GLOBAL_ARRAYS_INTEG: 9
- O.INSTALL: 16
- O.JAVAOBJECT: 41
- O.KEY-: 2
- O.KEY-MNGT: 23
- O.LOAD: 17
- O.NATIVE: 14
- O.OBJ-: 1
- O.OBJ-DELETION: 8
- O.OPERATE: 35
- O.PIN-: 9
- O.PIN-MNGT: 13
- O.REALLOCATION: 17
- O.REMOTE: 15
- O.REMOTE_MTH: 1
- O.REMOTE_MTHD: 5
- O.REMOTE_OBJ: 10
- O.RESOURCES: 25
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SCP: 63
- O.SCP-IC: 1
- O.SCP-SUPPORT: 2
- O.SCPP: 1
- O.SID: 40
- O.TRANSACTION: 19
- OE:
- OE.AID-MANAGEMENT: 6
- OE.AP-KEYS: 7
- OE.APPLET: 9
- OE.APPS-PROVIDER: 6
- OE.BASIC-APPS-: 1
- OE.BASIC-APPS-VALIDATION: 4
- OE.CA-KEYS: 8
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 4
- OE.KEY-CHANGE: 6
- OE.KEY-ESCROW: 6
- OE.KEY-GENERATION: 4
- OE.MOBILE-OPERATOR: 6
- OE.OPERATOR-KEYS: 6
- OE.OTA-ADMIN: 4
- OE.OTA-LOADING: 5
- OE.OTA-SERVERS: 5
- OE.PERSONALIZER: 1
- OE.PRODUCTION: 1
- OE.QUOTAS: 5
- OE.SCP: 3
- OE.SECURE-APPS-: 2
- OE.SECURE-APPS-CERTIFICATION: 3
- OE.SECURITY-DOMAINS: 5
- OE.SHARE-CONTROL: 7
- OE.VA-KEYS: 5
- OE.VERIFICATION: 34
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 3
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.GET_ROR: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.PUT: 6
- OP.RECEIVE: 1
- OP.RET_RORD: 3
- OP.SEND: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.AID-MANAGEMENT: 4
- OSP.APSD-KEYS: 4
- OSP.BASIC-APPS-VALIDATION: 4
- OSP.CASD-KEYS: 4
- OSP.KEY-CHANGE: 4
- OSP.KEY-GENERATION: 4
- OSP.OPERATOR-KEYS: 4
- OSP.OTA-LOADING: 4
- OSP.OTA-SERVERS: 5
- OSP.QUOTAS: 4
- OSP.SECURE-APPS-: 2
- OSP.SECURE-APPS-CERTIFICATION: 2
- OSP.SECURITY-DOMAINS: 4
- OSP.SHARE-CONTROL: 4
- OSP.VASD-KEYS: 4
- OSP.VERIFICATION: 4
- R:
- T:
- T.COM_EXPLOIT: 6
- T.CONFID-APPLI-DATA: 17
- T.CONFID-JCS-: 7
- T.CONFID-JCS-CODE: 5
- T.CONFID-JCS-DATA: 5
- T.DELETION: 5
- T.EXE-: 1
- T.EXE-CODE: 8
- T.EXE-CODE-REMOTE: 4
- T.INSTALL: 6
- T.INTEG-: 9
- T.INTEG-APPLI-: 7
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 17
- T.INTEG-JCS-CODE: 5
- T.INTEG-JCS-DATA: 6
- T.INTEG-USER-DATA: 6
- T.LIFE_CYCLE: 5
- T.NATIVE: 6
- T.OBJ-DELETION: 4
- T.PHYSICAL: 5
- T.RESOURCES: 8
- T.SID: 18
- T.UNAUTHORIZED_ACCESS: 4
- T.UNAUTHORIZED_CARD_MNG: 1
- T.UNAUTHORIZED_CARD_MNGT: 7
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- OBERTHUR: 2
- Oberthur: 16
- Oberthur Technologies: 384
- Samsung:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- malfunction: 3
- SCA:
- Leak-Inherent: 10
- Physical Probing: 2
- physical probing: 4
|
- FI:
- malfunction: 1
- physical tampering: 2
- SCA:
- DPA: 1
- physical probing: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS 140-2: 1
- FIPS 186-3: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 3
- FIPS PUB 46-3: 4
- FIPS PUB 81: 3
- PKCS:
- SCP:
- SCP 80: 1
- SCP02: 3
- SCP80: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 4
- javacard.framework.service: 1
- javacard.security: 3
- javacardx:
- javacardx.crypto: 2
- javacardx.framework.util: 1
- javacardx.rmi: 2
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
- out of scope: 1
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
- /Author: FeliCa Networks, Inc
- /ChipVendor: Toshiba
- /Company: FeliCa Networks, Inc
- /CreationDate: D:20160708165517+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
- /DocNumber: F03T-ASEP01-E01-70
- /DocVersion: 1.70
- /IssueDate: June 2016
- /ModDate: D:20160708171515+09'00'
- /ModelName: T6NE1
- /Producer: Adobe PDF Library 11.0
- /ProductName: Mobile FeliCa OS 3.0 on T6NE1
- /ProductType: Mobile FeliCa IC Chip
- /SourceModified: D:20160708065621
- pdf_file_size_bytes: 365339
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /CreationDate: D:20110713095952+02'00'
- /Keywords:
- /ModDate: D:20110713095952+02'00'
- /Producer: GPL Ghostscript 8.61
- pdf_file_size_bytes: 1275792
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 191
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |