name |
OPPO Find X5 Pro, including ColorOS 12.1, and Qualcomm Snapdragon® 8 Gen 1 Mobile Platform |
MTCOS Pro 2.6 SSCD / P71D352 (N7121) |
category |
Mobility |
Products for Digital Signatures |
scheme |
SE |
DE |
status |
active |
active |
not_valid_after |
31.03.2027 |
27.10.2028 |
not_valid_before |
31.03.2022 |
27.10.2023 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed-CCRA-Certificate%20OPPO%20Find%20X5%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20-%20OPPO%20Find%20X5%20Pro.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OPPO%20Find%20X5%20Pro%20on%20ColorOS%2012.1%20Security%20Target.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1211b_pdf.pdf |
manufacturer |
Guangdong OPPO Mobile Telecommunications Corp., Ltd |
MaskTech International GmbH |
manufacturer_web |
https://www.oppo.com/en/ |
https://www.masktech.de/ |
security_level |
{} |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
95ee9573a6851af4 |
d50de8f311b752e5 |
heuristics/cert_id |
CSEC2021007 |
BSI-DSZ-CC-1211-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_TSS.2, ASE_REQ.2, ALC_COMP.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
12.1 |
2.6 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1147-V3-2023 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1136-V3-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1148-V3-2023, BSI-DSZ-CC-1147-V3-2023 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-2021, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-1136-V2-2022, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-0996-2018, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1034-2019, BSI-DSZ-CC-1136-V3-2022, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-0995-2018 |
heuristics/scheme_data |
|
- category: Digital signature
- cert_id: BSI-DSZ-CC-1211-2023
- certification_date: 27.10.2023
- enhanced:
- applicant: MaskTech International GmbH Nordostpark 45 90411 Nürnberg
- assurance_level: EAL5+,ALC_DVS.2,AVA_VAN.5
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1211c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 27.10.2023
- description: The fundamental change in this re-evaluation is the porting of the embedded software to NXP Semiconductors Germany GmbH hardware P71D352 (N7121) (certification-ID: BSI-DSZ-CC-1136-V3), which implies a different delivery procedure. The hardware-depending tools have also changed, which leads to changes in the Configuration Management System. Furthermore the TOE supports import of signing keys and the creation of electronic signatures with the imported key.
- entries: [frozendict({'id': 'EN'}), frozendict({'id': 'EN'}), frozendict({'id': 'Protection'}), frozendict({'id': 'Protection'}), frozendict({'id': 'EN'})]
- evaluation_facility: SRC Security Research & Consulting GmbH
- expiration_date: 26.10.2028
- product: MTCOS Pro 2.6 SSCD / P71D352 (N7121)
- protection_profile: EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device with key generation, 18 May 2013, BSI-CC-PP-0059-2009-MA-02EN 419211-3:2013 - Protection profiles for secure signature creation device - Part 3: Device with key import, 14 September 2013, BSI-CC-PP-0075-2012-MA-01Protection profiles for secure signature creation device - Part 4: Extension for device with key generation and trusted communication with certificate generation application 1.0.1, CEN / CENELEC (TC224/WG17), November 2012, BSI-CC-PP-0071-2012Protection profiles for secure signature creation device - Part 5: Extension for device with key generation and trusted channel to signature creation application, CEN / ISSS - Information Society Standardization System, 12 October 2013, BSI-CC-PP-0072-20EN 419211-6:2014 - Protection profiles for secure signature creation device - Part 6: Extension for device with key import and trusted channel to signature creation application, 25 July 2014, BSI-CC-PP-0076-2013-MA-01
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1211a_pdf.pdf?__blob=publicationFile&v=2
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1200/1211b_pdf.pdf?__blob=publicationFile&v=2
- product: MTCOS Pro 2.6 SSCD / P71D352 (N7121)
- subcategory: Secure Signature Creation Devices (SSCD)
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Digitale_Signatur-Sichere_Signaturerstellungseinheiten/1211.html
- vendor: MaskTech International GmbH
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1136-V3-2022 |
heuristics/protection_profiles |
c40ae795865a0dba, 731bdcc989507942, 83014eb399a802f3, c88af12926be2779 |
d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_MDF_V3.2.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/MOD_BT_V1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf |
pdf_data/cert_filename |
Signed-CCRA-Certificate OPPO Find X5 Pro.pdf |
1211c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-02: 1
- BSI-CC-PP-0071-2012-MA-01: 1
- BSI-CC-PP-0072-2012-MA-01: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0076-2013-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_FLR: 1
- ALC_TSU_EXT.1: 1
- ASE:
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20220404080932+02'00'
- /Creator: RICOH MP C4504ex
- /ModDate: D:20220404083958+02'00'
- /Producer: RICOH MP C4504ex
- pdf_file_size_bytes: 1623099
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
- /Title: Certificate BSI-DSZ-CC-1211-2023
- pdf_file_size_bytes: 231878
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
Certification Report - OPPO Find X5 Pro.pdf |
1211a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by ALC_DVS.2 and AVA_VAN.5 valid until: 26 October 2028
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1211-2023
- cert_item: MTCOS Pro 2.6 SSCD / P71D352 (N7121
- cert_lab: BSI
- developer: MaskTech International GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: EN 419211-2:2013 (BSI-CC-PP-0059-2009-MA-02), EN 419211-3:2013 (BSI-CC-PP-0075-2012-MA-01), EN 419211-4:2013 (BSI-CC-PP-0071-2012-MA-01) EN 419211-5:2013 (BSI-CC-PP-0072-2012-MA-01), EN 419211-6:2014 (BSI-CC-PP-0076-2013-MA-01
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1036-2019: 3
- BSI-DSZ-CC-1064-2020-MA-01: 1
- BSI-DSZ-CC-1136-V3-2022: 10
- BSI-DSZ-CC-1136-V3-2022-MA-01: 2
- BSI-DSZ-CC-1211-2023: 18
- BSI-DSZ-CC-S-0181-2022: 1
- BSI-DSZ-CC-S-0207-: 1
- BSI-DSZ-CC-S-0232-2023: 1
- BSI-DSZ-CC-S-0233-2023: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0072-2012-MA-01: 1
- BSI-CC-PP- 0075-2012-MA-01: 1
- BSI-CC-PP- 0084-2014: 1
- BSI-CC-PP-0056-v2-2012: 1
- BSI-CC-PP-0059-2009-MA-02: 3
- BSI-CC-PP-0068-V2-2011-MA01: 1
- BSI-CC-PP-0071-: 1
- BSI-CC-PP-0071-2012-MA-01: 3
- BSI-CC-PP-0072-2012-MA-01: 3
- BSI-CC-PP-0075-2012-MA-01: 3
- BSI-CC-PP-0076-2013-MA-01: 3
- BSI-CC-PP-0084-2014: 3
- BSI-CC-PP-0086-2015: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 3
- EAL 1 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 4: 1
- EAL 5: 8
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5+: 1
- EAL6: 4
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 4
- ASE_TSS.1: 1
- ATE:
- AVA:
|
- ADV:
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_FLR.1: 3
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ATE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- T:
- T.MALICIOUS_APP: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 5
- NXP Semiconductors: 11
|
pdf_data/report_keywords/eval_facility |
|
- SRC:
- SRC Security Research & Consulting: 3
- TUV:
- TÜV Informationstechnik: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102-1: 1
- BSI TR-03110: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- ISO:
- X509:
|
- BSI:
- AIS 20: 2
- AIS 25: 3
- AIS 26: 3
- AIS 31: 2
- AIS 32: 1
- AIS 34: 3
- AIS 35: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 1
- AIS 46: 3
- AIS 47: 1
- AIS36: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP) Applications loaded onto the Mobile Device may: 1
- out of scope: 1
|
- ConfidentialDocument:
- 1.6, 20 October 2023, Evaluation Technical Report (ETR), SRC Security Research & Consulting GmbH (confidential document) [9] EN 419211-2:2013 - Protection profiles for secure signature creation device - Part 2: Device: 1
- 2023, Configuration List of MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) [19] User Guidance – MTCOS Pro 2.6 SSCD / P71D352 (N7121), Version 1.3, 30 August 2023, MaskTech: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- creation device with key generation, Version 0.1, 09 September 2022, MaskTech International GmbH (confidential document) 26 / 30 BSI-DSZ-CC-1211-2023 Certification Report C. Excerpts from the Criteria For the meaning: 1
- key generation and key import, MTCOS Pro 2.6 SSCD / P71D352 (N7121), MaskTech International GmbH (confidential document) 7 specifically • AIS 20, Version 3, Funktionalitätsklassen und Evaluationsmethodologie für: 1
|
pdf_data/report_metadata |
- /Author: Jerry Johansson
- /CreationDate: D:20220329111443+02'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20220331141336+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: 21FMV6272-30:1
- /Title: Certification Report - OPPO Find X5 Pro
- pdf_file_size_bytes: 504386
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH"
- /Subject: Common Criteria, Certification, Zertifizierung, Smartcard, MRTD, SSCD, MTCOS Pro 2.6 SSCD / P71D352 (N7121) MaskTechInternational GmbH
- /Title: Certification Report BSI-DSZ-CC-1211-2023
- pdf_file_size_bytes: 433901
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
pdf_data/st_filename |
OPPO Find X5 Pro on ColorOS 12.1 Security Target.pdf |
1211b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1136-V3-2022: 1
- BSI-DSZ-CC-1211: 2
- BSI-DSZ-CC-1211-2023: 1
- BSI-DSZ-CC-S-0207-2021: 1
- BSI-DSZ-CC-S-0214-2022: 1
- BSI-DSZ-CC-S-0232-2023: 1
- BSI-DSZ-CC-S-0233-2023: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0071: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0059: 1
- BSI-CC-PP-0059-2009-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071-2012-MA-01: 2
- BSI-CC-PP-0072: 1
- BSI-CC-PP-0072-2012-MA-01: 2
- BSI-CC-PP-0075: 1
- BSI-CC-PP-0075-2012-MA-01: 1
- BSI-CC-PP-0075-MA-01: 1
- BSI-CC-PP-0076: 1
- BSI-CC-PP-0076-2013-MA-01: 1
- BSI-CC-PP-0084-2014: 2
- BSI-CC-PP-0086-2015: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 1: 2
- EAL 1 augmented: 1
|
- EAL:
- EAL5: 10
- EAL5 augmented: 6
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 10
- AGD_PRE: 1
- AGD_PRE.1: 6
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 4
- ALC_CMS: 1
- ALC_CMS.1: 5
- ALC_TSU_EXT: 3
- ALC_TSU_EXT.1: 8
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_IMP.1: 3
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 2
- ALC_TAT.2: 2
- ASE:
- ASE_CCL.1: 3
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ASE_TSS.2: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 7
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_STG: 2
- FAU_STG.1: 4
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 22
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 5
- FCS_CKM_EXT: 7
- FCS_CKM_EXT.1: 5
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.1.2: 1
- FCS_CKM_EXT.1.3: 1
- FCS_CKM_EXT.2: 5
- FCS_CKM_EXT.2.1: 1
- FCS_CKM_EXT.3: 6
- FCS_CKM_EXT.3.1: 1
- FCS_CKM_EXT.3.2: 1
- FCS_CKM_EXT.4: 7
- FCS_CKM_EXT.4.1: 2
- FCS_CKM_EXT.4.2: 1
- FCS_CKM_EXT.5: 5
- FCS_CKM_EXT.5.1: 1
- FCS_CKM_EXT.5.2: 1
- FCS_CKM_EXT.6: 5
- FCS_CKM_EXT.6.1: 1
- FCS_CKM_EXT.8: 7
- FCS_CKM_EXT.8.1: 1
- FCS_COP: 41
- FCS_COP.1: 7
- FCS_RBG_EXT: 1
- FCS_RBG_EXT.1: 13
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RBG_EXT.1.3: 1
- FCS_SMF_EXT.1: 1
- FCS_SRV_EXT: 1
- FCS_SRV_EXT.1: 5
- FCS_SRV_EXT.1.1: 1
- FCS_STG_EXT: 3
- FCS_STG_EXT.1: 5
- FCS_STG_EXT.1.1: 1
- FCS_STG_EXT.1.2: 1
- FCS_STG_EXT.1.3: 1
- FCS_STG_EXT.1.4: 1
- FCS_STG_EXT.1.5: 1
- FCS_STG_EXT.2: 7
- FCS_STG_EXT.2.1: 2
- FCS_STG_EXT.2.2: 1
- FCS_STG_EXT.3: 5
- FCS_STG_EXT.3.1: 1
- FCS_STG_EXT.3.2: 1
- FCS_TLSC_EXT: 12
- FCS_TLSC_EXT.1: 11
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 2
- FCS_TLSC_EXT.2: 4
- FCS_TLSC_EXT.2.1: 1
- FCS_TLSC_EXT.4: 3
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSC_EXT.5: 3
- FCS_TLSC_EXT.5.1: 1
- FCS_TLS_EXT: 1
- FCS_TLS_EXT.1: 3
- FCS_TLS_EXT.1.1: 1
- FDP:
- FDP_ACF_EXT: 2
- FDP_ACF_EXT.1: 3
- FDP_ACF_EXT.1.1: 1
- FDP_ACF_EXT.1.2: 1
- FDP_ACF_EXT.2: 3
- FDP_ACF_EXT.2.1: 1
- FDP_DAR_EXT: 2
- FDP_DAR_EXT.1: 5
- FDP_DAR_EXT.1.1: 1
- FDP_DAR_EXT.1.2: 1
- FDP_DAR_EXT.2: 5
- FDP_DAR_EXT.2.1: 1
- FDP_DAR_EXT.2.2: 1
- FDP_DAR_EXT.2.3: 1
- FDP_DAR_EXT.2.4: 1
- FDP_IFC_EXT: 1
- FDP_IFC_EXT.1: 6
- FDP_IFC_EXT.1.1: 1
- FDP_PBA_EXT: 3
- FDP_PBA_EXT.1: 1
- FDP_PBA_EXT.1.1: 1
- FDP_STG_EXT: 1
- FDP_STG_EXT.1: 5
- FDP_STG_EXT.1.1: 1
- FDP_UPC_EXT: 4
- FDP_UPC_EXT.1: 2
- FIA:
- FIA_AFL_EXT: 1
- FIA_AFL_EXT.1: 4
- FIA_AFL_EXT.1.1: 1
- FIA_AFL_EXT.1.2: 1
- FIA_AFL_EXT.1.3: 1
- FIA_AFL_EXT.1.4: 1
- FIA_AFL_EXT.1.5: 1
- FIA_AFL_EXT.1.6: 1
- FIA_BLT_EXT: 6
- FIA_BLT_EXT.1: 5
- FIA_BLT_EXT.1.1: 1
- FIA_BLT_EXT.2: 5
- FIA_BLT_EXT.2.1: 1
- FIA_BLT_EXT.3: 3
- FIA_BLT_EXT.3.1: 1
- FIA_BLT_EXT.4: 5
- FIA_BLT_EXT.4.1: 1
- FIA_BLT_EXT.4.2: 1
- FIA_BLT_EXT.6: 5
- FIA_BLT_EXT.6.1: 1
- FIA_BLT_EXT.7: 5
- FIA_BLT_EXT.7.1: 1
- FIA_BMG_EXT: 8
- FIA_BMG_EXT.1: 5
- FIA_PAE_EXT: 1
- FIA_PAE_EXT.1: 5
- FIA_PAE_EXT.1.1: 1
- FIA_PMG_EXT: 1
- FIA_PMG_EXT.1: 8
- FIA_PMG_EXT.1.1: 1
- FIA_TRT_EXT: 1
- FIA_TRT_EXT.1: 5
- FIA_TRT_EXT.1.1: 1
- FIA_UAU: 3
- FIA_UAU.5: 4
- FIA_UAU.5.1: 3
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UAU.6.2: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT: 2
- FIA_UAU_EXT.1: 5
- FIA_UAU_EXT.1.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 4
- FIA_UAU_EXT.2.2: 1
- FMT:
- FMT_MOF_EXT: 1
- FMT_MOF_EXT.1: 6
- FMT_MOF_EXT.1.1: 1
- FMT_MOF_EXT.1.2: 1
- FMT_SMF_EXT: 10
- FMT_SMF_EXT.1: 8
- FMT_SMF_EXT.1.1: 1
- FMT_SMF_EXT.2: 3
- FMT_SMF_EXT.2.1: 1
- FPT:
- FPT_AEX_EXT: 4
- FPT_AEX_EXT.1: 5
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.2: 5
- FPT_AEX_EXT.2.1: 1
- FPT_AEX_EXT.3: 5
- FPT_AEX_EXT.3.1: 1
- FPT_AEX_EXT.4: 3
- FPT_AEX_EXT.4.1: 1
- FPT_AEX_EXT.4.2: 1
- FPT_JTA_EXT: 1
- FPT_JTA_EXT.1: 5
- FPT_JTA_EXT.1.1: 1
- FPT_KST_EXT: 3
- FPT_KST_EXT.1: 5
- FPT_KST_EXT.1.1: 1
- FPT_KST_EXT.2: 5
- FPT_KST_EXT.2.1: 1
- FPT_KST_EXT.3: 5
- FPT_KST_EXT.3.1: 1
- FPT_NOT_EXT: 1
- FPT_NOT_EXT.1: 5
- FPT_NOT_EXT.1.1: 1
- FPT_STM: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT: 13
- FPT_TST_EXT.1: 9
- FPT_TST_EXT.1.1: 1
- FPT_TST_EXT.2: 1
- FPT_TUD_EXT: 3
- FPT_TUD_EXT.1: 6
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.2: 3
- FPT_TUD_EXT.2.1: 1
- FPT_TUD_EXT.2.2: 1
- FPT_TUD_EXT.2.3: 1
- FPT_TUD_EXT.3: 3
- FPT_TUD_EXT.3.1: 1
- FTA:
- FTA_SSL_EXT: 1
- FTA_SSL_EXT.1: 5
- FTA_SSL_EXT.1.1: 1
- FTA_SSL_EXT.1.2: 1
- FTA_SSL_EXT.1.3: 1
- FTA_WSE_EXT: 1
- FTA_WSE_EXT.1: 4
- FTA_WSE_EXT.1.1: 1
- FTP:
- FTP_BLT_EXT: 12
- FTP_BLT_EXT.1: 5
- FTP_BLT_EXT.1.1: 1
- FTP_BLT_EXT.1.2: 1
- FTP_BLT_EXT.2: 5
- FTP_BLT_EXT.2.1: 1
- FTP_BLT_EXT.3: 3
- FTP_ITC_EXT: 7
- FTP_ITC_EXT.1: 5
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
|
- FAU:
- FCS:
- FCS_CKM: 112
- FCS_CKM.1: 30
- FCS_CKM.2: 11
- FCS_CKM.4: 44
- FCS_CKM.4.1: 1
- FCS_COP: 141
- FCS_COP.1: 24
- FCS_COP.1.1: 1
- FCS_RND: 1
- FCS_RND.1: 13
- FCS_RND.1.1: 1
- FCS_RND.1.2: 1
- FCS_RNG: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 77
- FDP_ACC.1: 36
- FDP_ACF: 36
- FDP_ACF.1: 36
- FDP_AFC: 18
- FDP_DAU: 10
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 19
- FDP_ITC: 8
- FDP_ITC.1: 25
- FDP_ITC.2: 22
- FDP_ITT.1: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_SDC.1: 1
- FDP_SDI: 21
- FDP_SDI.1: 2
- FDP_SDI.2: 5
- FDP_UCT: 10
- FDP_UCT.1: 1
- FDP_UIT: 12
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 23
- FIA_AFL.1: 7
- FIA_API: 1
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_UAU: 25
- FIA_UAU.1: 20
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 1
- FIA_UAU.4: 2
- FIA_UAU.4.1: 1
- FIA_UAU.5: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 21
- FIA_UID.1.1: 2
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MOF.1: 8
- FMT_MOF.1.1: 1
- FMT_MSA: 69
- FMT_MSA.1: 9
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 20
- FMT_MSA.4: 4
- FMT_MTD: 44
- FMT_MTD.1: 5
- FMT_SMF.1: 29
- FMT_SMF.1.1: 2
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 20
- FPT_EMS.1: 7
- FPT_FLS.1: 11
- FPT_FLS.1.1: 1
- FPT_ITC: 1
- FPT_ITT.1: 1
- FPT_PHP.1: 7
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
- FTP_ITC: 40
- FTP_ITC.1: 16
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CONFIG: 1
- A.NOTIFY: 1
- A.NO_TOE_BYPASS: 1
- A.PRECAUTION: 1
- A.PROPER_USER: 1
- A.TRUSTED_ADMIN: 1
- O:
- O.AUTH: 1
- O.AUTH_COMM: 1
- O.CONFIG: 1
- O.CRYPTOGRAPHIC_FUNCTIONS: 1
- O.INTEGRITY: 1
- O.PRIVACY: 1
- O.PROTECTED_COMMS: 1
- O.STORAGE: 1
- O.SYSTEM_MONITORING: 1
- O.TOE_ADMINISTRATION: 1
- O.TSF_SELF_TEST: 1
- O.WIRELESS_ACCESS_POINT_CONNECTION: 1
- OE:
- OE.CONFIG: 1
- OE.DATA_PROPER_USER: 1
- OE.NOTIFY: 1
- OE.NO_TOE_BYPASS: 1
- OE.PRECAUTION: 1
- OE.TRUSTED_ADMIN: 1
- T:
- T.EAVESDROP: 1
- T.FLAWAPP: 2
- T.MALICIOUS_APP: 1
- T.NETWORK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PERSISTENT: 2
- T.PERSISTENT_PRESENCE: 1
- T.PHYSICAL: 2
- T.PHYSICAL_ACCESS: 1
- T.TSF_FAILURE: 1
- T.UNAUTHORIZED: 1
- T.UNDETECTED_ACTIONS: 1
|
- A:
- A.CGA: 3
- A.CSP: 5
- A.SCA: 3
- O:
- O.AES: 1
- O.ECC: 1
- O.PUF: 1
- O.RND: 1
- O.RSA: 1
- O.SHA: 1
- O.TDES: 1
- OE:
- OE.CGA_TC_: 1
- OE.HID_VAD: 7
- OT:
- OT.EMSEC_: 1
- OT.TOE_TC_: 1
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 7
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 28
- AES-: 1
- AES-128: 1
- AES-256: 16
- constructions:
- MAC:
- HMAC: 5
- HMAC-SHA-256: 6
- HMAC-SHA-384: 4
- HMAC-SHA-512: 4
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 12
- TDEA: 1
- TDES: 5
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- PBKDF:
- SHA:
- SHA1:
- SHA2:
- SHA-256: 10
- SHA-384: 5
- SHA-512: 2
- SHA384: 1
- SHA512: 2
- scrypt:
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 8
- SHA-384: 3
- SHA-512: 4
|
pdf_data/st_keywords/crypto_scheme |
- KEX:
- Key Exchange: 1
- Key exchange: 3
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- TLS:
- DTLS:
- SSL:
- TLS:
- TLS: 63
- TLS 1.0: 1
- TLS 1.1: 2
- TLS 1.2: 2
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 8
- secp256r1: 4
- secp384r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 3
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 3
- TLS_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 2
- TLS_RSA_WITH_AES_256_GCM_SHA384: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 1
- fault injection: 2
- malfunction: 1
- physical tampering: 4
- SCA:
- Leak-Inherent: 1
- physical probing: 2
- side channel: 2
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI TR-02102-1: 1
- BSI TR-03110: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 1
- FIPS 180-4: 4
- FIPS 186-4: 3
- FIPS 197: 4
- FIPS 198-1: 3
- FIPS PUB 186-4: 4
- FIPS PUB 197: 2
- FIPS186-4: 1
- FIPS198-1: 1
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-38C: 1
- NIST SP 800-38D: 1
- NIST SP 800-38E: 1
- NIST SP 800-38F: 1
- NIST SP 800-57: 1
- SP 186-4: 1
- SP 800-108: 2
- SP 800-38E: 1
- SP 800-90A: 1
- RFC:
- RFC 2246: 1
- RFC 2818: 2
- RFC 3394: 2
- RFC 4346: 2
- RFC 5216: 1
- RFC 5246: 4
- RFC 5280: 3
- RFC 5288: 5
- RFC 5289: 12
- RFC 5746: 2
- RFC 6125: 1
- RFC 6960: 1
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180-4: 1
- FIPS PUB 140-3: 1
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 10116-2017: 1
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 7816: 2
- NIST:
- NIST SP 800-38B: 1
- NIST SP 800-56A: 1
- NIST SP 800-67: 1
- NIST SP 800-90A: 1
- PKCS:
- PKCS #1: 2
- PKCS #15: 1
- PKCS#1: 2
- PKCS#3: 1
- RFC:
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.coloros.ocs.opencapabilityservice: 1
- java:
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- access to its storage media. Note: Defending against device re-use after physical compromise is out of scope for this Protection Profile. T.MALICIOUS_APP (MDFPP32) Applications loaded onto the Mobile Device: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /Author: MaskTech International GmbH
- /Keywords: Common Criteria, CC, Secure Signature Creation Device, SSCD, MTCOS, EAL 5+
- /Subject: Common Criteria Certification
- /Title: MTCOS Pro 2.6 SSCD / P71D352 (N7121)- Security Target lite
- pdf_file_size_bytes: 1200444
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 130
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |