name |
Mobile FeliCa OS 3.0 on T6NE1/0115_432B |
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 (Version du patch : 1.5) |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
05.09.2021 |
01.09.2019 |
not_valid_before |
05.09.2016 |
11.07.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2014-49fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-49en.pdf |
manufacturer |
FeliCa Networks, Inc |
Gemalto - Infineon Technologies AG |
manufacturer_web |
https://https://www.felicanetworks.co.jp/en/ |
https://www.gemalto.com/ |
security_level |
EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
6835e0576746ad57 |
995da0406e6ca2af |
heuristics/cert_id |
SERTIT-081 |
ANSSI-CC-2014/49 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
3.0 |
1.5 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/50 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/14, ANSSI-CC-2014/06 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2014/50 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/14, ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 05.09.2016
- developer: FeliCa Networks, Inc.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-081
- certification_date: 05.09.2016
- description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
- developer: FeliCa Networks, Inc.
- documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
- mutual_recognition: CCRA, SOG-IS
- product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
- sponsor: FeliCa Networks, Inc.
- product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
- url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0695-2011 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0695-2011 |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
SERTIT-081 CR 1.0.pdf |
ANSSI-CC_2014-49fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/49
- cert_item: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France Rapport de certification ANSSI-CC-2014/49 Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 Page 4 sur 24 ANSSI-CC-CER-F-07.011
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection profiles for secure signature creation device – Part 2: Device with key generation, Référence : prEN 14169-2:2012, Version 2.0.1, maintenu sous la référence BSI-CC-PP-0059-2009-MA-01 (voir [PP-SSCD-Part2]). Protection profiles for secure signature creation device – Part 3: Device with key import, Référence : prEN 14169-3:2012, Version 1.0.2, certifié sous la référence BSI-CC-PP-0075-2012 (voir [PP-SSCD-Part3
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/14: 2
- ANSSI-CC-2014/49: 25
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0059-2009-MA-01: 1
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0075-2012: 2
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 1
- other:
- PP-SSCD-: 2
- PP-SSCD-Part2: 2
- PP-SSCD-Part3: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 3
- EAL 4 augmented: 1
- EAL 4+: 18
- EAL1: 1
- EAL4: 1
- EAL7: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 4
- ALC_FLR: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 4
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FAU:
- FCS:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_IFC.1: 1
- FDP_ITT.1: 1
- FDP_SDI.2: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FRU:
- FTP:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies: 5
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- ISO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /AAPL:Keywords: ['ugradert']
- /Author: Wei Yuan
- /CreationDate: D:20160905104440Z00'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ugradert
- /ModDate: D:20160905104440Z00'00'
- /Producer: Mac OS X 10.11.6 Quartz PDFContext
- /Title: tittel
- pdf_file_size_bytes: 1388306
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20140711145810+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140807095407+02'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title:
- pdf_file_size_bytes: 237258
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
pdf_data/st_filename |
[STP-T] F03T-ASEP01-E01-70.pdf |
ANSSI-CC-cible_2014-49en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
- BSI-CC-PP-0072-2012: 1
- BSI-CC-PP-0075-2012: 1
- BSI-CC-PP-0076-2013: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 4
- PP-SSCD-KG: 25
- PP-SSCD-KI: 21
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 3
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ATE:
- ATE_DPT.2: 6
- ATE_FUN.1: 2
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS: 1
- FAU_SAS.1: 3
- FAU_SAS.1.1: 1
- FCS:
- FCS_RNG: 1
- FCS_RNG.1: 4
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITT.1: 6
- FDP_ITT.1.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_UAU.1: 4
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 4
- FIA_UAU.4.1: 1
- FIA_UID.1: 6
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM.1: 5
- FMT_LIM.1.1: 1
- FMT_LIM.2: 5
- FMT_LIM.2.1: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_SMF.1: 4
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 7
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 4
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FCS:
- FCS_CKM: 14
- FCS_CKM.1: 5
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_CKM.4.1: 2
- FCS_COP: 8
- FCS_COP.1: 2
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC: 4
- FDP_ACC.1: 13
- FDP_ACC.1.1: 4
- FDP_ACF: 4
- FDP_ACF.1: 6
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC.1: 8
- FDP_ITC: 2
- FDP_ITC.1: 4
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 4
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FIA:
- FIA_AFL: 6
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU: 4
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 4
- FIA_UID.1: 5
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 14
- FMT_MSA.1: 3
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.2.1: 1
- FMT_MSA.3: 5
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD: 4
- FMT_MTD.1.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 5
- FPT_EMS.1: 7
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 1
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.AC: 18
- O.RND: 4
- O.SC: 13
- T:
|
- A:
- A.CGA: 2
- A.CSP: 3
- A.SCA: 2
- OE:
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 10
- malfunction: 3
- SCA:
- Leak-Inherent: 10
- Physical Probing: 2
- physical probing: 4
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-004: 1
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: FeliCa Networks, Inc
- /ChipVendor: Toshiba
- /Company: FeliCa Networks, Inc
- /CreationDate: D:20160708165517+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
- /DocNumber: F03T-ASEP01-E01-70
- /DocVersion: 1.70
- /IssueDate: June 2016
- /ModDate: D:20160708171515+09'00'
- /ModelName: T6NE1
- /Producer: Adobe PDF Library 11.0
- /ProductName: Mobile FeliCa OS 3.0 on T6NE1
- /ProductType: Mobile FeliCa IC Chip
- /SourceModified: D:20160708065621
- pdf_file_size_bytes: 365339
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 35
|
- /CreationDate: D:20140131122341+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140807095419+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 606196
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |