name |
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
|
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2016-02-05
|
2018-12-17
|
not_valid_after |
2021-02-05
|
2023-12-17
|
scheme |
DE
|
DE
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978b_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0939V3b_pdf.pdf
|
status |
archived
|
archived
|
manufacturer |
NXP Semiconductors Germany GmbH Business Line Identification
|
NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
|
manufacturer_web |
https://www.nxp.com
|
https://www.nxp.com
|
security_level |
ALC_FLR.1, ASE_TSS.2, EAL6+ |
ALC_FLR.1, ASE_TSS.2, EAL6+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978a_pdf.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0939V3a_pdf.pdf
|
cert_link |
None
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0939V3c_pdf.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': frozenset({'PKISKPP', 'SECURITY_IC_V1.0'})}) |
maintenance_updates |
frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2018, 8, 17), 'maintenance_title': 'NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0978V2ma1a_pdf.pdf', 'maintenance_st_link': None}) |
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
False
|
True
|
state/cert/download_ok |
False
|
True
|
state/cert/extract_ok |
False
|
True
|
state/cert/pdf_hash |
None
|
ecedea72b3158375d2ecff39d1d4a6c981acf26dd85c92275433ccee99cedad5
|
state/cert/txt_hash |
None
|
71672162362cb79bf0e0e0fc546b404d43dc15d8950080543ab80b023f7fdea8
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
be3fc3fa8851f16aa02445b6d43a0d05dcae3aded916d5ca0ddefc07200624f2
|
ca4fd8bbd21ec2d582e736da0ca135531e8e1c9afd9640af9a52a7c754f32bf2
|
state/report/txt_hash |
532d223e7b93839f1b0a634a1edcfe27691bb9bbb5e1cfa704437449643cf98a
|
7a26688ceff6cd06f1eebeb3d19d1a06830857d7e9adb44ba8e71e27cd23fc27
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
21e2fdbc441003344f6bfb846d02418402eebcf5bf09d26d33adac2a0348fcb3
|
81b57e097716763a0705881ffad7680fbbc64cd059be1916086234a327daf858
|
state/st/txt_hash |
e89fa1f8b114250cfe1c97b48bf1d36845b6f05a4f72addb81cb1aec7134b617
|
06b8c12cd26c1278e29d8f2f66278da733c7ab61b12f2e64e6eeecbf909cf4e9
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
BSI-DSZ-CC-0978-2016
|
BSI-DSZ-CC-0939-V3-2018
|
heuristics/cert_lab |
BSI |
BSI |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
- |
016 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0817-V2-2016, ANSSI-CC-2016/27, BSI-DSZ-CC-0957-V2-2016, ANSSI-CC-2016/26, ANSSI-CC-2016/49, ANSSI-CC-2016/39, ANSSI-CC-2016/40, ANSSI-CC-2016/50, ANSSI-CC-2016/38, ANSSI-CC-2016/29, BSI-DSZ-CC-0978-V2-2017, ANSSI-CC-2016/41, ANSSI-CC-2016/28, BSI-DSZ-CC-0809-V2-2016, ANSSI-CC-2016/30, BSI-DSZ-CC-0808-V2-2016 |
None
|
heuristics/report_references/directly_referencing |
None
|
BSI-DSZ-CC-0939-V2-2016 |
heuristics/report_references/indirectly_referenced_by |
ANSSI-CC-2016/39, BSI-DSZ-CC-0978-V2-2017, BSI-DSZ-CC-0831-V6-2023, BSI-DSZ-CC-0809-V3-2017, ANSSI-CC-2016/40, ANSSI-CC-2016/49, BSI-DSZ-CC-0918-V5-2023, ANSSI-CC-2016/28, BSI-DSZ-CC-0831-V3-2021, ANSSI-CC-2016/30, BSI-DSZ-CC-0809-V2-2016, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-1035-2017, BSI-DSZ-CC-0957-V2-2016, ANSSI-CC-2016/26, ANSSI-CC-2016/50, BSI-DSZ-CC-0808-V3-2017, ANSSI-CC-2016/29, ANSSI-CC-2016/41, BSI-DSZ-CC-0918-V4-2022, BSI-DSZ-CC-0831-V5-2022, BSI-DSZ-CC-0808-V2-2016, ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0831-V7-2023, BSI-DSZ-CC-0817-V2-2016, ANSSI-CC-2016/27, BSI-DSZ-CC-0831-V2-2020, BSI-DSZ-CC-0919-V2-2021, ANSSI-CC-2016/38, BSI-DSZ-CC-0831-V4-2021, BSI-DSZ-CC-0978-V3-2019, BSI-DSZ-CC-0918-V6-2024 |
None
|
heuristics/report_references/indirectly_referencing |
None
|
BSI-DSZ-CC-0939-V2-2016, BSI-DSZ-CC-0939-2015 |
heuristics/scheme_data |
None
|
None
|
heuristics/st_references/directly_referenced_by |
ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0957-V2-2016, ANSSI-CC-2016/49, ANSSI-CC-2016/39, ANSSI-CC-2016/40, ANSSI-CC-2016/50, ANSSI-CC-2016/38, ANSSI-CC-2016/41 |
None
|
heuristics/st_references/directly_referencing |
None
|
None
|
heuristics/st_references/indirectly_referenced_by |
ANSSI-CC-2016/39, BSI-DSZ-CC-0822-V5-2023, BSI-DSZ-CC-0822-V4-2023, ANSSI-CC-2016/40, ANSSI-CC-2016/49, BSI-DSZ-CC-0918-V5-2023, BSI-DSZ-CC-0919-V3-2023, BSI-DSZ-CC-0957-V2-2016, BSI-DSZ-CC-0918-V3-2022, ANSSI-CC-2016/50, BSI-DSZ-CC-0918-V2-2021, ANSSI-CC-2016/41, BSI-DSZ-CC-0918-V4-2022, ANSSI-CC-2016/52, ANSSI-CC-2016/51, BSI-DSZ-CC-0918-2020, BSI-DSZ-CC-0919-V2-2021, ANSSI-CC-2016/38, BSI-DSZ-CC-0918-V6-2024 |
None
|
heuristics/st_references/indirectly_referencing |
None
|
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
None
|
0939V3c_pdf.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
None
|
- cc_cert_id:
- DE:
- BSI-DSZ-CC-0939-V3-2018:
1
- cc_protection_profile_id:
- cc_security_level:
- EAL:
- EAL 6:
1
- EAL 5:
1
- EAL 2:
1
- EAL 6 augmented:
1
- cc_sar:
- cc_sfr:
- cc_claims:
- vendor:
- NXP:
- NXP:
1
- NXP Semiconductors:
1
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- ISO:
- ISO/IEC 15408:
2
- ISO/IEC 18045:
2
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
pdf_data/cert_metadata |
None
|
- pdf_file_size_bytes:
346486
- pdf_is_encrypted:
False
- pdf_number_of_pages:
1
- /Author:
Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate:
D:20181218093705+01'00'
- /Creator:
Writer
- /Keywords:
"Common Criteria, Certification, Zertifizierung, EAL6, Smartcard Controller, P60D024/016/012yVB(Y/Z/A)yVF"
- /ModDate:
D:20181218093912+01'00'
- /Producer:
LibreOffice 5.2
- /Subject:
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
- /Title:
Certificate BSI-DSZ-CC-0939-V3-2018
- pdf_hyperlinks:
|
pdf_data/report_filename |
0978a_pdf.pdf
|
0939V3a_pdf.pdf
|
pdf_data/report_frontpage/DE/cc_security_level |
Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 SOGIS Recognition Agreement
|
Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1
|
pdf_data/report_frontpage/DE/cc_version |
PP conformant plus product specific extensions Common Criteria Part 2 extended
|
PP conformant plus product specific extensions Common Criteria Part 2 extended
|
pdf_data/report_frontpage/DE/cert_id |
BSI-DSZ-CC-0978-2016
|
BSI-DSZ-CC-0939-V3-2018
|
pdf_data/report_frontpage/DE/cert_item |
NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
|
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
|
pdf_data/report_frontpage/DE/cert_lab |
BSI
|
BSI
|
pdf_data/report_frontpage/DE/developer |
NXP Semiconductors Germany GmbH
|
NXP Semiconductors Germany GmbH
|
pdf_data/report_frontpage/DE/match_rules |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*) |
pdf_data/report_frontpage/DE/ref_protection_profiles |
Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/DE |
- BSI-DSZ-CC-0978-2016:
22
- BSI-DSZ-CC-0978:
2
|
- BSI-DSZ-CC-0939-V3-2018:
16
- BSI-DSZ-CC-0939-V2-2016:
3
|
pdf_data/report_keywords/cc_claims/O/O.C |
7
|
5
|
pdf_data/report_keywords/cc_claims/R/R.O |
7
|
5
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
- BSI-CC-PP-0035-2007:
2
- BSI-CC-PP- 0035-2007: 1
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0035-2007 |
4
|
2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
2
- ADV_IMP.2:
2
- ADV_INT.3:
2
- ADV_SPM.1:
2
- ADV_TDS.5:
2
- ADV_ARC.1:
1
- ADV_FSP.1:
1
- ADV_FSP.2:
1
- ADV_FSP.3:
1
- ADV_FSP.4:
1
- ADV_FSP.6:
1
- ADV_IMP.1:
1
- ADV_INT.1:
1
- ADV_INT.2:
1
- ADV_TDS.1:
1
- ADV_TDS.2:
1
- ADV_TDS.3:
1
- ADV_TDS.4:
1
- ADV_TDS.6:
1
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
6
- ALC_FLR:
3
- ALC_CMC.5:
3
- ALC_CMS.5:
3
- ALC_DVS.2:
3
- ALC_TAT.3:
3
- ALC_CMC.1:
1
- ALC_CMC.2:
1
- ALC_CMC.3:
1
- ALC_CMC.4:
1
- ALC_CMS.1:
1
- ALC_CMS.2:
1
- ALC_CMS.3:
1
- ALC_CMS.4:
1
- ALC_DEL.1:
2
- ALC_DVS.1:
1
- ALC_FLR.2:
1
- ALC_FLR.3:
1
- ALC_LCD.1:
2
- ALC_LCD.2:
1
- ALC_TAT.1:
1
- ALC_TAT.2:
1
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV.3:
2
- ATE_DPT.3:
2
- ATE_FUN.2:
2
- ATE_FUN:
3
- ATE_IND:
2
- ATE_COV.1:
1
- ATE_COV.2:
1
- ATE_DPT.1:
1
- ATE_DPT.2:
1
- ATE_DPT.4:
1
- ATE_FUN.1:
1
- ATE_IND.1:
1
- ATE_IND.2:
1
- ATE_IND.3:
1
- ATE_COV:
1
- ATE_DPT:
1
- AVA:
- AVA_VAN.5:
2
- AVA_VAN:
3
- AVA_VAN.1:
1
- AVA_VAN.2:
1
- AVA_VAN.3:
1
- AVA_VAN.4:
1
- APE:
- APE_INT.1:
1
- APE_CCL.1:
1
- APE_SPD.1:
1
- APE_OBJ.1:
1
- APE_OBJ.2:
1
- APE_ECD.1:
1
- APE_REQ.1:
1
- APE_REQ.2:
1
- ASE:
- ASE_TSS.2:
6
- ASE_INT.1:
1
- ASE_CCL.1:
1
- ASE_SPD.1:
1
- ASE_OBJ.1:
1
- ASE_OBJ.2:
1
- ASE_ECD.1:
1
- ASE_REQ.1:
1
- ASE_REQ.2:
1
- ASE_TSS.1:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
- ALC:
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ATE:
- AVA:
- ASE:
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_FLR.1:
6
- ALC_FLR:
3
- ALC_CMC.5:
3
- ALC_CMS.5:
3
- ALC_DVS.2:
3
- ALC_TAT.3:
3
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_DEL.1:
2
- ALC_DVS.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1:
2
- ALC_LCD.2: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
- ALC_FLR.1:
5
- ALC_FLR:
3
- ALC_CMC.5:
1
- ALC_CMS.5:
1
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
3
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 |
6
|
5
|
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 |
2
|
1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 |
3
|
1
|
pdf_data/report_keywords/cc_sar/ASE |
- ASE_TSS.2:
6
- ASE_INT.1: 1
- ASE_CCL.1: 1
- ASE_SPD.1: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_ECD.1: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_SPD: 1
- ASE_TSS: 1
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 |
6
|
4
|
pdf_data/report_keywords/cc_sar/ATE |
- ATE_COV.3: 2
- ATE_DPT.3: 2
- ATE_FUN.2: 2
- ATE_FUN:
3
- ATE_IND:
2
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.4: 1
- ATE_FUN.1: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- ATE_COV: 1
- ATE_DPT: 1
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_FUN |
3
|
2
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND |
2
|
1
|
pdf_data/report_keywords/cc_sar/AVA |
- AVA_VAN.5: 2
- AVA_VAN:
3
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
3
|
1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 6:
8
- EAL 5:
9
- EAL 2:
7
- EAL 1:
7
- EAL 4:
6
- EAL5:
1
- EAL 5+:
1
- EAL 3:
4
- EAL 7:
4
- EAL 6 augmented:
3
- ITSEC:
|
- EAL:
- EAL 6:
5
- EAL 5:
3
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+:
1
- EAL5:
1
- EAL 5+:
1
- EAL 6 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL |
- EAL 6:
8
- EAL 5:
9
- EAL 2:
7
- EAL 1:
7
- EAL 4:
6
- EAL5:
1
- EAL 5+:
1
- EAL 3: 4
- EAL 7: 4
- EAL 6 augmented:
3
|
- EAL 6:
5
- EAL 5:
3
- EAL 2:
2
- EAL 1:
1
- EAL 4:
1
- EAL 2+: 1
- EAL5:
1
- EAL 5+:
1
- EAL 6 augmented:
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 1 |
7
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 |
7
|
2
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 |
6
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 |
9
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 5+ |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 |
8
|
5
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 augmented |
3
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL5 |
1
|
1
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE: 1
- IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9: 1
- Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP: 1
- Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP: 1
- Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card: 1
- NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors: 1
- Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE: 1
- Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE: 1
- NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP: 1
- Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors: 1
- Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP: 1
- Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller: 1
- Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification: 1
- Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry: 1
|
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification:
1
- Card Controller P60D024/016/012yVB(Y/Z/A)/yVF, Version 4.4, 29 October 2018, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, for the P60D024/016/012yVB(Y/Z/A)/VF, Version 4, 26 November 2018: 1
- TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
- for the P60D024/016/012y VB(Y/Z/A)/VF, TÜV Informationstechnik GmbH, Version 4, 26 November 2018 (confidential document) [11] NXP Secure Smart Controller P60D024/016/012yVB(Y/Z/A)/ yVF Configuration List, NXP: 1
- Version 2.50, 20 November 2015 (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- Y/Z/A)/yVF Evaluation Reference List, NXP Semiconductors, Version 3.26, 14 November 2018 (confidential document) [13] Product Data Sheet SmartMX2 family P60D012/016/024 VB/VF Secure high- performance smart card: 1
- Version 5.2, 27 June 2014 (confidential document) [14] Instruction set for the SmartMX2 family Secure smart card controller Product data sheet, NXP: 1
- Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60D012/016/024 VB/VF: 1
- NXP Semiconductors, Version 2.4, 24 October 2018 (confidential document) [16] Product data sheet addendum: Wafer and delivery specification SmartMX2 family P60D012/016/024: 1
- NXP Semiconductors, Version 3.2, 21 May 2014 (confidential document) [17] SmartMX2 family Post Delivery Configuration (PDC) Secure high-performance smart card: 1
- Product data sheet addendum, NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors, NXP: 1
- Version 3.1, 01 October 2014 (confidential document) [19] Product Errata Sheet SmartMX2 family P60D012/016/024 VB/VF Secure high- performance smart: 1
- controller, NXP Semiconductors, Version 1.2, 24 October 2018 (confidential document) 26 / 31 BSI-DSZ-CC-0939-V3-2018 Certification Report C. Excerpts from the Criteria For the: 1
|
pdf_data/report_keywords/certification_process/ConfidentialDocument/being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification |
1
|
1
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine/SmartMX/SmartMX2 |
16
|
12
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik:
4
- TÜViT:
1
|
- TUV:
- TÜV Informationstechnik:
4
- TÜViT:
1
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis/SCA |
|
- physical probing: 1
- SPA:
1
- DPA:
1
|
pdf_data/report_keywords/side_channel_analysis/SCA/DPA |
1
|
1
|
pdf_data/report_keywords/side_channel_analysis/SCA/SPA |
1
|
1
|
pdf_data/report_keywords/side_channel_analysis/other/JIL |
3
|
4
|
pdf_data/report_keywords/standard_id/BSI |
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 37:
1
- AIS 31:
2
- AIS 36:
3
- AIS31:
1
- AIS 35:
2
- AIS 32:
1
- AIS 38:
1
|
- AIS 34:
2
- AIS 25:
2
- AIS 26:
2
- AIS 37:
1
- AIS 31:
2
- AIS 36:
2
- AIS31:
1
- AIS 35:
2
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 32:
1
- AIS 38:
1
- AIS 46: 1
- AIS 47: 1
|
pdf_data/report_keywords/standard_id/BSI/AIS 25 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 26 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 32 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 34 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 35 |
2
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 36 |
3
|
2
|
pdf_data/report_keywords/standard_id/BSI/AIS 37 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS 38 |
1
|
1
|
pdf_data/report_keywords/standard_id/BSI/AIS31 |
1
|
1
|
pdf_data/report_keywords/standard_id/ISO |
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 14443:
4
- ISO/IEC 7816:
2
|
- ISO/IEC 15408:
4
- ISO/IEC 18045:
4
- ISO/IEC 17065:
2
- ISO/IEC 14443:
4
- ISO/IEC 7816:
2
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
- BSI:
- BSI TR-02102:
1
- BSI 7148:
1
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor/NXP/NXP |
36
|
37
|
pdf_data/report_keywords/vendor/NXP/NXP Semiconductors |
53
|
26
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//Author |
Bundesamt für Sicherheit in der Informationstechnik
|
Bundesamt für Sicherheit in der Informationstechnik
|
pdf_data/report_metadata//CreationDate |
D:20160223160422+01'00'
|
D:20181218085041+01'00'
|
pdf_data/report_metadata//Creator |
Writer
|
Writer
|
pdf_data/report_metadata//Keywords |
"Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP"
|
"Common Criteria, Certification, Zertifizierung, EAL6, Smartcard Controller, P60D024/016/012yVB(Y/Z/A)yVF"
|
pdf_data/report_metadata//ModDate |
D:20160224080500+01'00'
|
D:20181218103018+01'00'
|
pdf_data/report_metadata//Producer |
LibreOffice 4.2
|
LibreOffice 5.2
|
pdf_data/report_metadata//Subject |
Common Criteria Certification
|
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
|
pdf_data/report_metadata//Title |
Certification Report BSI-DSZ-CC-0978-2016
|
Certification Report BSI-DSZ-CC-0939-V3-2018
|
pdf_data/report_metadata/pdf_file_size_bytes |
1316475
|
969617
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
42
|
31
|
pdf_data/st_filename |
0978b_pdf.pdf
|
0939V3b_pdf.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- O:
- O.RND:
3
- O.HW_AES:
7
- O.CUST_RECONFIG:
5
- O.EEPROM_INTEGRITY:
5
- O.FM_FW:
9
- O.MEM_ACCESS:
9
- O.SFR_ACCESS:
9
- T:
|
- O:
- O.RND:
3
- O.HW_AES:
7
- O.CUST_RECONFIG:
5
- O.EEPROM_INTEGRITY:
5
- O.FM_FW:
9
- O.MEM_ACCESS:
9
- O.SFR_ACCESS:
9
- T:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.5:
11
- ADV_IMP.2:
4
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
1
- ADV_ARC:
1
- ADV_FSP:
4
- ADV_IMP:
1
- ADV_FSP.4:
3
- ADV_SPM:
2
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.5:
4
- ALC_CMS.5:
5
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_CMS:
4
- ALC_CMC:
4
- ALC_CMS.4:
3
- ALC_CMC.4:
3
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- AVA:
- ASE:
- ASE_TSS.2:
6
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
|
- ADV:
- ADV_ARC.1:
1
- ADV_FSP.5:
11
- ADV_IMP.2:
4
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ADV_SPM.1:
1
- ADV_ARC:
1
- ADV_FSP:
4
- ADV_IMP:
1
- ADV_FSP.4:
3
- ADV_SPM:
2
- AGD:
- AGD_OPE.1:
1
- AGD_PRE.1:
1
- AGD_OPE:
1
- AGD_PRE:
1
- ALC:
- ALC_FLR.1:
5
- ALC_CMC.5:
4
- ALC_CMS.5:
5
- ALC_DEL.1:
1
- ALC_DVS.2:
1
- ALC_LCD.1:
1
- ALC_TAT.3:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_CMS:
4
- ALC_CMC:
4
- ALC_CMS.4:
3
- ALC_CMC.4:
3
- ATE:
- ATE_COV.3:
4
- ATE_DPT.3:
1
- ATE_FUN.2:
1
- ATE_IND.2:
1
- ATE_COV:
1
- AVA:
- ASE:
- ASE_TSS.2:
6
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
1
- ASE_REQ.2:
1
- ASE_SPD.1:
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 6 |
2
|
2
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 |
3
|
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4 augmented |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL4+ |
1
|
1
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6 |
36
|
38
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6 augmented |
3
|
3
|
pdf_data/st_keywords/cc_security_level/EAL/EAL6+ |
1
|
2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS.1:
7
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
9
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
2
- FCS_COP.1:
23
- FCS_COP.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4:
3
- FDP:
- FDP_ITT.1:
6
- FDP_IFC.1:
10
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_SDI.2:
7
- FDP_SDI.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ACC.1:
35
- FDP_ACC.1.1:
2
- FDP_ACF.1:
32
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_FLS.1:
1
- FMT:
- FMT_LIM.1:
3
- FMT_LIM.2:
4
- FMT_MSA.3:
20
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.1:
25
- FMT_SMR.1:
7
- FMT_MSA.1.1:
2
- FMT_SMF.1:
19
- FMT_SMF.1.1:
1
- FPT:
- FPT_FLS.1:
7
- FPT_PHP.3:
7
- FPT_ITT.1:
6
- FRU:
|
- FAU:
- FAU_SAS.1:
7
- FAU_SAS.1.1:
1
- FCS:
- FCS_RNG.1:
9
- FCS_RNG.1.1:
3
- FCS_RNG.1.2:
2
- FCS_COP.1:
23
- FCS_COP.1.1:
2
- FCS_CKM.1:
5
- FCS_CKM.4:
3
- FDP:
- FDP_ITT.1:
6
- FDP_IFC.1:
10
- FDP_ITC.1:
5
- FDP_ITC.2:
5
- FDP_SDI.2:
7
- FDP_SDI.1:
1
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ACC.1:
35
- FDP_ACC.1.1:
2
- FDP_ACF.1:
32
- FDP_ACF.1.1:
2
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
2
- FDP_ACF.1.4:
2
- FDP_FLS.1:
1
- FMT:
- FMT_LIM.1:
3
- FMT_LIM.2:
4
- FMT_MSA.3:
20
- FMT_MSA.3.1:
2
- FMT_MSA.3.2:
2
- FMT_MSA.1:
25
- FMT_SMR.1:
7
- FMT_MSA.1.1:
2
- FMT_SMF.1:
19
- FMT_SMF.1.1:
1
- FPT:
- FPT_FLS.1:
7
- FPT_PHP.3:
7
- FPT_ITT.1:
6
- FRU:
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine/SmartMX/SmartMX |
1
|
1
|
pdf_data/st_keywords/crypto_engine/SmartMX/SmartMX2 |
21
|
19
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
13
- Physical Probing:
2
- physical probing:
1
- side channel:
1
- DPA:
2
- timing attacks:
2
- FI:
- physical tampering:
1
- Malfunction:
10
- malfunction:
2
- fault injection:
3
|
- SCA:
- Leak-Inherent:
13
- Physical Probing:
2
- physical probing:
1
- side channel:
1
- DPA:
2
- timing attacks:
2
- FI:
- physical tampering:
1
- Malfunction:
10
- malfunction:
2
- fault injection:
3
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2012-09-001:
1
- CCMB-2012-09-004:
2
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
2
- CCMB-2017-04-003:
2
- CCMB-2017-04-004:
2
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS PUB 46-3: 3
- FIPS PUB 197:
3
- FIPS PUB 46:
1
|
- FIPS PUB 197:
3
- FIPS PUB 46:
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 |
3
|
3
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 46 |
1
|
1
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 14443 |
16
|
12
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 18092 |
2
|
2
|
pdf_data/st_keywords/standard_id/ISO/ISO/IEC 7816 |
22
|
18
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
32
|
30
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDEA |
3
|
5
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DEA |
1
|
1
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
9
|
9
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DEA |
2
|
2
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
16
|
14
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP:
138
- NXP Semiconductors:
49
|
- NXP:
- NXP:
115
- NXP Semiconductors:
37
- Philips:
|
pdf_data/st_keywords/vendor/NXP/NXP |
138
|
115
|
pdf_data/st_keywords/vendor/NXP/NXP Semiconductors |
49
|
37
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
878457
- pdf_is_encrypted:
False
- pdf_number_of_pages:
87
- /Alternative descriptive title: Security Target Lite
- /Author:
NXP Semiconductors
- /CertificationID: BSI-DSZ-CC-0978
- /Company: NXP Semiconductors GmbH Germany
- /Copyright date: 2015
- /CreationDate:
D:20151210161030+01'00'
- /Creator:
Acrobat PDFMaker 11 für Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Document identifier:
- /Keywords:
CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE
- /ModDate:
D:20151210161132+01'00'
- /Modification date: 14 October 2015
- /Producer:
Adobe PDF Library 11.0
- /Product name title: <not applicable>
- /Revision: Rev. 2.61
- /Security status: <Security status>
- /SourceModified: D:20151210150346
- /Specification status: Evaluation documentation PUBLIC
- /Subject:
P60x144/080yVA/yVA(Y/B/X)/yVE
- /Template date: 29 January 2010
- /Template version: 2.9.0
- /Title:
Security Target Lite
- /docpath: W:\WORKAREA_01\data\id_smx21_lib\id_smx21\DOCUMENTS\project_docu\Evaluation\Procedure_P60D144\ASE
- /list_of_authors:
- /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\99_prj_mgmt\Templates\V2.9.0_R1
- /relBiblioPath: ..\Bibliography.doc
- /test_sec_row_naming: manufacturer area
- /text_cert_body_long: Bundesamt fuer Sicherheit in der Informationstechnik
- /text_cert_body_short: BSI
- /text_developer_long: NXP Semiconductors, Business Unit Security & Connectivity
- /text_developer_short: NXP Semiconductors
- /text_product_cfgC080: P60C080P
- /text_product_cfgC144: P60C144P
- /text_product_cfgD080: P60D080y
- /text_product_cfgD144: P60D144y
- /text_product_cfgD144_nameplate: 9050C
- /text_product_letter: A
- /text_product_long: NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE
- /text_product_minor: VA/VE
- /text_product_short: NXP Secure Smart Card Controller P60x144/080y
- /text_product_short_pa: P60x144/080yVA/VE
- /text_product_short_pa_b: P60x144/080yVA(B)
- /text_product_short_pa_y: P60x144/080yVA(Y)
- /text_product_short_pe: P60x144/080yVE
- /text_sponsor_long: NXP Semiconductors, Business Unit Security & Connectivity
- /text_sponsor_short: NXP
- pdf_hyperlinks:
http://www.nxp.com/, mailto:[email protected]
|
- pdf_file_size_bytes:
1383576
- pdf_is_encrypted:
False
- pdf_number_of_pages:
87
- /Title:
Security Target
- /Author:
NXP Semiconductors
- /Subject:
NXP Secure Smart Card Controller P60D024yVB(Y/Z/A)/yVF
- /Keywords:
CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20181029143412+00'00'
- /ModDate:
D:20181029143412+00'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
http://www.nxp.com/, mailto:[email protected]
|
pdf_data/st_metadata//Author |
NXP Semiconductors
|
NXP Semiconductors
|
pdf_data/st_metadata//CreationDate |
D:20151210161030+01'00'
|
D:20181029143412+00'00'
|
pdf_data/st_metadata//Creator |
Acrobat PDFMaker 11 für Word
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Keywords |
CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE
|
CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+
|
pdf_data/st_metadata//ModDate |
D:20151210161132+01'00'
|
D:20181029143412+00'00'
|
pdf_data/st_metadata//Producer |
Adobe PDF Library 11.0
|
Microsoft® Word 2016
|
pdf_data/st_metadata//Subject |
P60x144/080yVA/yVA(Y/B/X)/yVE
|
NXP Secure Smart Card Controller P60D024yVB(Y/Z/A)/yVF
|
pdf_data/st_metadata//Title |
Security Target Lite
|
Security Target
|
pdf_data/st_metadata/pdf_file_size_bytes |
878457
|
1383576
|
pdf_data/st_metadata/pdf_hyperlinks |
http://www.nxp.com/, mailto:[email protected] |
http://www.nxp.com/, mailto:[email protected] |
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
87
|
87
|
dgst |
6ce78dc0d982a21f
|
ecfc2e7cbac868da
|