name |
McAfee Enterprise Mobility Management 12.0 |
NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)PVG with IC Dedicated Software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
DE |
status |
archived |
archived |
not_valid_after |
04.09.2019 |
25.10.2019 |
not_valid_before |
04.09.2014 |
24.10.2014 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CT%20v1.0e.docx |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20CR%20v1.0e.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-275%20ST%20v1.16.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0837V2b_pdf.pdf |
manufacturer |
McAfee, Inc. |
NXP Semiconductors Germany GmbH Business Line Identification |
manufacturer_web |
https://www.mcafee.com/ |
https://www.nxp.com |
security_level |
EAL2+, ALC_FLR.2 |
EAL6+, ALC_FLR.1, ASE_TSS.2 |
dgst |
b193f130f541449d |
a8b768bf10dd60b7 |
heuristics/cert_id |
383-4-275 |
BSI-DSZ-CC-0837-V2-2014 |
heuristics/cert_lab |
CANADA |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, APE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_TAT.3, ATE_FUN.2, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ALC_CMC.5, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ATE_COV.3, ADV_SPM.1 |
heuristics/extracted_versions |
12.0 |
052 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-12-36243-CR2, ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2015/03, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2016/30, ANSSI-CC-2015/65, ANSSI-CC-2015/02, BSI-DSZ-CC-0892-V2-2015, ANSSI-CC-2015/63, ANSSI-CC-2015/01, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/04, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2015/08, ANSSI-CC-2016/45, ANSSI-CC-2016/37 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/37, ANSSI-CC-2016/04, NSCIB-CC-12-36243-CR2, ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/03, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2015/03, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2015/44, ANSSI-CC-2016/30, ANSSI-CC-2015/65, ANSSI-CC-2015/02, BSI-DSZ-CC-0892-V2-2015, ANSSI-CC-2015/63, ANSSI-CC-2015/74, ANSSI-CC-2015/01, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/04, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2015/75, ANSSI-CC-2015/38, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2015/08, ANSSI-CC-2016/45, ANSSI-CC-2016/37 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2015/65, ANSSI-CC-2015/63, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2016/45, ANSSI-CC-2016/37 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/64, ANSSI-CC-2016/28, ANSSI-CC-2016/19, ANSSI-CC-2016/34, ANSSI-CC-2016/48, ANSSI-CC-2016/46, ANSSI-CC-2016/18, ANSSI-CC-2015/65, ANSSI-CC-2015/63, ANSSI-CC-2015/62, ANSSI-CC-2016/21, ANSSI-CC-2015/76, ANSSI-CC-2016/36, ANSSI-CC-2016/35, ANSSI-CC-2016/63, ANSSI-CC-2015/77, ANSSI-CC-2016/47, ANSSI-CC-2015/78, ANSSI-CC-2016/17, ANSSI-CC-2016/20, ANSSI-CC-2015/79, ANSSI-CC-2016/45, ANSSI-CC-2016/37 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
383-4-275 CT v1.0e.docx |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
383-4-275 CR v1.0e.pdf |
0837V2a_pdf.pdf |
pdf_data/report_frontpage |
- DE:
- CA:
- cert_id: 383-4-275-CR
- cert_lab: CANADA
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1 and ASE_TSS.2 SOGIS Recognition Agreement
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0837-V2-2014
- cert_item: NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG with IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0837-2013-MA-01: 3
- BSI-DSZ-CC-0837-V2-2014: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 2 augmented: 1
- EAL 2+: 3
|
- EAL:
- EAL 2: 1
- EAL 4: 4
- EAL 5: 3
- EAL 6: 4
- EAL 6 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 6
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_SPM.1: 2
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 2
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 3
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR: 3
- ALC_FLR.1: 6
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 3
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 2
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 3
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 2
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 20
- NXP Semiconductors: 22
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7138: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 01 October 2014, EVALUATION TECHNICAL REPORT SUMMARY (ETR SUMMARY), TÜV Informationstechnik GmbH (confidential document) [10] ETR for composite evaluation according to AIS 36, Version 1, 02 September 2014, ETR FOR: 1
- Configuration List, Version 01.50, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60x080/052/040PVC, Customer specific Appendix of the: 1
- EVALUATION (ETR-COMP), TÜV Informationstechnik GmbH (confidential document) [11] Configuration list for the TOE: 8 specifically • AIS 25, Version 8, Anwendung der CC auf: 1
- List, Version 01.40, 01 July 2014, NXP Semiconductors, Business Unit Identification (confidential document) and • NXP Secure Smart Card Controller P60x080/052/040PVC, Appendix of the Configuration List for: 1
- NXP Secure Smart Card Controller P60x080/052/040PVC(Y/Z/A)/PVG Security Target, NXP Semiconductors (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8: 1
- and Operation Manual, Version 1.1, 26 June 2014, NXP Semiconductors, Business Unit Identification (confidential document) 23 / 36 Certification Report BSI-DSZ-CC-0837-V2-2014 This page is intentionally left blank. 24 : 1
- evaluation, Version 01.40, 05 August 2014, NXP Semiconductors, Business Unit Identification (confidential document) [12] NXP Secure Smart Card Controller P60x040/052/080 VC/VG, Information on Guidance and Operation: 1
|
pdf_data/report_metadata |
- /Author: cpclark
- /CR date: 04 September 2014
- /CR version: 1.0
- /Certificate date: 04 September 2014
- /Company: CSEC-CSTC
- /Conformance Claim: EAL 2 augmented
- /CreationDate: D:20140922130520-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: McAfee, Inc.
- /Document number: 383-4-275-CR
- /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of McAfee, Inc. McAfee Enterprise Mobility Management 12.0, Version 0.3, 15 August 2014
- /Evaluation completion date: 15 August 2014
- /ModDate: D:20140922130523-04'00'
- /Producer: Adobe PDF Library 10.0
- /ST Title: Security Target: McAfee Enterprise Mobility Management 12.0, v1.16, 20 July 2014
- /SourceModified: D:20140903182940
- /TOE name and version: McAfee Enterprise Mobility Management 12.0
- /TOE short name: McAfee EMM v12.0
- /Title: 383-4-XXX CR vxe
- /_DocHome: -1616610741
- pdf_file_size_bytes: 289620
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20141110104311+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Smartcard"
- /ModDate: D:20141111083907+01'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0837-V2-2014
- pdf_file_size_bytes: 783130
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
pdf_data/st_filename |
383-4-275 ST v1.16.pdf |
0837V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 36
- EAL6 augmented: 3
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 1
- ALC_CMS: 1
- ALC_CMS.2: 1
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_FLR: 1
- ALC_FLR.2: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 4
- ALC_CMC.4: 3
- ALC_CMC.5: 4
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 10
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.4: 3
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 35
- FDP_ACC.1.1: 2
- FDP_ACF.1: 32
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_FLS.1: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_ITT: 1
- FDP_ITT.1: 6
- FDP_ITT.5: 11
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 4
- FMT_MSA.1: 25
- FMT_MSA.1.1: 2
- FMT_MSA.3: 20
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 14
- FPT_ITT.1.1: 1
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.DATABASE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.PKI: 3
- A.PROTCT: 3
- O:
- O.ACCESS: 14
- O.AUDITS: 4
- O.EADMIN: 6
- O.IDAUTH: 19
- O.INTEGRITY: 6
- O.MOBILE_POLICY: 3
- OE:
- OE.AUDIT_REVIEW: 2
- OE.CREDEN: 3
- OE.CRYPTO: 4
- OE.DATABASE: 4
- OE.INSTALL: 5
- OE.INTEROP: 3
- OE.MOBILE_ACCESS: 2
- OE.PERSON: 8
- OE.PHYCAL: 6
- OE.PKI: 3
- OE.PROTECT: 5
- OE.STORAGE: 4
- OE.TIME: 4
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.IMPCON: 3
- T.LOSSOF: 3
- T.MOBILE_POLICY: 3
- T.NOHALT: 3
- T.PRIVIL: 3
|
- O:
- O.CUST_RECONFIG: 6
- O.EEPROM_INTEGRITY: 4
- O.FM_FW: 9
- O.HW_AES: 7
- O.INTEGRITY_CHK: 7
- O.MEM_ACCESS: 9
- O.RND: 3
- O.SFR_ACCESS: 9
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 116
- NXP Semiconductors: 33
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 3
- TDES: 1
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- fault injection: 3
- malfunction: 3
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 14443: 20
- ISO/IEC 18092: 2
- ISO/IEC 7816: 22
- ISO/IEC 7816-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- of policies for managed mobile devices. 1.6.2 McAfee EMM Portal The McAfee Client Application (out of scope) connects to the EMM Portal to request the policy for the device. The McAfee EMM Portal (EMM Portal: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /Author: Primasec
- /CreationDate: D:20140924094632-04'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20140924094632-04'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: Enterprise Mobility Management 12.0
- /Title: Security Target
- pdf_file_size_bytes: 1436557
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: NXP Semiconductors
- /CreationDate: D:20140821152255+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+
- /ModDate: D:20140821154606+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: P60x080/052/040PVC(Y/Z/A)/PVG
- /Title: Security Target Lite
- pdf_file_size_bytes: 929678
- pdf_hyperlinks: http://www.nxp.com/, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 82
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |