Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Mobile FeliCa OS 3.0 on T6NE1/0115_432B
SERTIT-081
NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
BSI-DSZ-CC-0555-2009
name Mobile FeliCa OS 3.0 on T6NE1/0115_432B NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
scheme NO DE
not_valid_after 05.09.2021 01.09.2019
not_valid_before 05.09.2016 10.11.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0555a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0555b_pdf.pdf
manufacturer FeliCa Networks, Inc NXP Semiconductors
manufacturer_web https://https://www.felicanetworks.co.jp/en/ https://www.nxp.com/
security_level EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 EAL5+
dgst 6835e0576746ad57 1f3ad7a74ca0a6bd
heuristics/cert_id SERTIT-081 BSI-DSZ-CC-0555-2009
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2021-3011
heuristics/indirect_transitive_cves {} CVE-2021-3011
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ASE_TSS.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 3.0 -
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0745-2012, ANSSI-CC-2013/31, ANSSI-CC-2011/05, BSI-DSZ-CC-0702-2011, ANSSI-CC-2013/70, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, 2011-15-INF-1098, ANSSI-CC-2012/28, 2011-14-INF-1095, ANSSI-CC-2012/76, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/28, ANSSI-CC-2014/01, ANSSI-CC-2012/67, ANSSI-CC-2013/08, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0804-2012, 2012-9-INF-1200, 2011-13-INF-1092, ANSSI-CC-2014/03, ANSSI-CC-2012/24, ANSSI-CC-2012/80, ANSSI-CC-2014/02, 2012-8-INF-1198, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0857-2013, CRP272, ANSSI-CC-2012/30, BSI-DSZ-CC-0746-2012, ANSSI-CC-2012/66, BSI-DSZ-CC-0703-2011, ANSSI-CC-2012/36, ANSSI-CC-2010/40, ANSSI-CC-2011/73, ANSSI-CC-2011/27, 2011-12-INF-1089
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0745-2012, ANSSI-CC-2011/05, ANSSI-CC-2013/31, ANSSI-CC-2016/69, BSI-DSZ-CC-0702-2011, BSI-DSZ-CC-0741-2011, ANSSI-CC-2012/71, ANSSI-CC-2013/70, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0750-2011, ANSSI-CC-2012/10, BSI-DSZ-CC-0799-2012, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, NSCIB-CC-15-67351-CR, BSI-DSZ-CC-0812-2012, Certificate Number: 2012/80, ANSSI-CC-2010/58, 2011-15-INF-1098, BSI-DSZ-CC-0825-2017, ANSSI-CC-2019/38, ANSSI-CC-2012/28, BSI-DSZ-CC-0864-2012, BSI-DSZ-CC-0857-V2-2015, 2011-14-INF-1095, ANSSI-CC-2012/76, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/28, ANSSI-CC-2014/01, NSCIB-CC-13-37761-CR2, ANSSI-CC-2012/67, ANSSI-CC-2013/08, BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0804-2012, 2012-9-INF-1200, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0860-2013, 2011-13-INF-1092, ANSSI-CC-2014/03, ANSSI-CC-2012/24, ANSSI-CC-2012/80, BSI-DSZ-CC-0866-2013, BSI-DSZ-CC-0867-2014, ANSSI-CC-2014/02, ANSSI-CC-2011/64, 2012-8-INF-1198, BSI-DSZ-CC-0633-2010, CRP272, ANSSI-CC-2012/30, BSI-DSZ-CC-0783-2013, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0746-2012, ANSSI-CC-2012/66, BSI-DSZ-CC-0703-2011, ANSSI-CC-2012/36, ANSSI-CC-2010/40, ANSSI-CC-2011/73, BSI-DSZ-CC-0866-V2-2014, ANSSI-CC-2011/27, 2011-12-INF-1089, BSI-DSZ-CC-0744-2011
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 05.09.2016
  • developer: FeliCa Networks, Inc.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-081
    • certification_date: 05.09.2016
    • description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
    • developer: FeliCa Networks, Inc.
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
    • mutual_recognition: CCRA, SOG-IS
    • product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
    • sponsor: FeliCa Networks, Inc.
  • product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
  • url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0745-2012, ANSSI-CC-2013/31, ANSSI-CC-2011/05, ANSSI-CC-2013/29, ANSSI-CC-2013/70, ANSSI-CC-2013/30, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, ANSSI-CC-2012/28, ANSSI-CC-2012/76, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/28, ANSSI-CC-2014/01, ANSSI-CC-2012/67, ANSSI-CC-2013/08, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0804-2012, ANSSI-CC-2014/03, ANSSI-CC-2012/24, ANSSI-CC-2012/80, ANSSI-CC-2014/02, ANSSI-CC-2012/30, BSI-DSZ-CC-0746-2012, ANSSI-CC-2012/66, ANSSI-CC-2012/36, ANSSI-CC-2010/40, ANSSI-CC-2011/73, ANSSI-CC-2011/27
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0745-2012, ANSSI-CC-2013/31, ANSSI-CC-2011/05, ANSSI-CC-2016/69, ANSSI-CC-2013/29, ANSSI-CC-2012/71, ANSSI-CC-2013/70, ANSSI-CC-2013/30, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012, ANSSI-CC-2011/76, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, ANSSI-CC-2010/58, 2011-15-INF-1098, ANSSI-CC-2012/28, 2011-14-INF-1095, ANSSI-CC-2012/76, BSI-DSZ-CC-0675-2011, ANSSI-CC-2011/28, ANSSI-CC-2014/01, ANSSI-CC-2012/67, ANSSI-CC-2013/08, BSI-DSZ-CC-0784-2013, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0804-2012, 2011-13-INF-1092, ANSSI-CC-2014/03, ANSSI-CC-2012/24, ANSSI-CC-2012/80, ANSSI-CC-2014/02, CRP272, ANSSI-CC-2012/30, BSI-DSZ-CC-0746-2012, ANSSI-CC-2012/66, ANSSI-CC-2012/36, ANSSI-CC-2010/40, ANSSI-CC-2011/73, ANSSI-CC-2011/27, 2011-12-INF-1089
maintenance_updates
pdf_data/report_filename SERTIT-081 CR 1.0.pdf 0555a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0555-2009
    • cert_item: NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH Business Line Identification
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-081: 19
  • DE:
    • BSI-DSZ-CC-0555: 1
    • BSI-DSZ-CC-0555-2009: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
  • BSI:
    • BSI-CC-PP-0035: 1
    • BSI-CC-PP-0035-2007: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 18
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL 7: 1
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 4
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 2
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_SDI.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.C: 1
  • R:
    • R.O: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 12
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 3
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
  • FI:
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • BSI:
    • AIS 20: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 3
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Secure Smart Card Controller, Version 1.0, 30.09.2009, BSI-DSZ-CC-0555, T-Systems GEI GmbH (confidential document) [12] Data Sheet, P5CD016/021/041 and P5Cx081, Secure dual interface and contact PKI Smart Card: 1
    • T-Systems Gei GmbH (confidential document) [8] Configuration List for the P5CD016/021/041 and P5Cx081 family, Rev. 1.0, NXP Semiconductors: 1
    • and P5Cx081V1A NXP Secure Smart Card, NXP Semiconductors, Business Line Identification (confidential document) [7] Evaluation Technical Report, V. 1.2, 3th November 2009, NXP P5CD081V1A Secure Smart Card: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Wei Yuan
  • /CreationDate: D:20160905104440Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20160905104440Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1388306
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20091123125521+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Smart Card Controller P5CD081V1A and its major configurations P5CC081V1A, P5CN081V1A, P5CD041V1A, P5CD021V1A and P5CD016V1A each with IC dedicated Software, NXP Semiconductors Germany GmbH"
  • /ModDate: D:20091207095523+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0555-2009
  • pdf_file_size_bytes: 795041
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename [STP-T] F03T-ASEP01-E01-70.pdf 0555b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0555: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 23
  • BSI:
    • BSI-PP- 0035: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 7
  • EAL:
    • EAL 5: 3
    • EAL 5 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5: 32
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
  • ATE:
    • ATE_DPT.2: 6
    • ATE_FUN.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 6
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 3
    • ADV_FSP.5: 11
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 1
    • ALC_CMS: 4
    • ALC_CMS.4: 3
    • ALC_CMS.5: 5
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 1
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITT.1: 6
    • FDP_ITT.1.1: 1
    • FDP_SDI.2: 4
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM.1: 5
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 5
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 7
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.4: 3
    • FCS_COP.1: 22
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 33
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 30
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 10
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
    • FDP_ITT.1: 6
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MSA.1: 25
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
  • FPT:
    • FPT_FLS.1: 7
    • FPT_ITT.1: 6
    • FPT_PHP.3: 7
  • FRU:
    • FRU_FLT.2: 7
pdf_data/st_keywords/cc_claims
  • O:
    • O.AC: 18
    • O.RND: 4
    • O.SC: 13
  • T:
    • T.RND: 3
  • O:
    • O.HW_AES: 7
    • O.MEM_ACCESS: 9
    • O.MF_FW: 7
    • O.RND: 3
    • O.SFR_ACCESS: 7
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 82
    • NXP Semiconductors: 19
  • Philips:
    • Philips: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 34
  • DES:
    • 3DES:
      • TDEA: 3
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 2
      • DES: 26
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 4
  • RNG:
    • RND: 5
    • RNG: 8
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • malfunction: 3
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 4
  • FI:
    • Malfunction: 10
    • fault injection: 5
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 13
    • Physical Probing: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 3
    • FIPS PUB 46: 1
    • FIPS PUB 46-3: 3
  • ISO:
    • ISO/IEC 14443: 16
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 10
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: FeliCa Networks, Inc
  • /ChipVendor: Toshiba
  • /Company: FeliCa Networks, Inc
  • /CreationDate: D:20160708165517+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
  • /DocNumber: F03T-ASEP01-E01-70
  • /DocVersion: 1.70
  • /IssueDate: June 2016
  • /ModDate: D:20160708171515+09'00'
  • /ModelName: T6NE1
  • /Producer: Adobe PDF Library 11.0
  • /ProductName: Mobile FeliCa OS 3.0 on T6NE1
  • /ProductType: Mobile FeliCa IC Chip
  • /SourceModified: D:20160708065621
  • pdf_file_size_bytes: 365339
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: Astrid Schweer
  • /CreationDate: 21.09.2009 14:55:13
  • /CreationDate--Text: 21.09.2009 14:55:13
  • /Creator: FreePDF XP 3.26 - http://shbox.de
  • /Keywords: Security Evaluation, Security Functional Requirements, Security Functions, Assurance Level
  • /ModDate: D:20091130182015+01'00'
  • /Producer: AFPL Ghostscript 7.04
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 487711
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 67
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different