| name |
Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 |
SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD) |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
NL |
NL |
| status |
archived |
active |
| not_valid_after |
24.06.2019 |
13.07.2026 |
| not_valid_before |
24.06.2009 |
13.07.2021 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-certificate-21-0189594.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-10991-CR.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0189594-crsscd-imp.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/957-2-STP-E01-10.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-lite-sscd_impv1.6st_lite_eps3_pp0075_v16_infineon.pdf |
| manufacturer |
Sony Corporation |
Infineon Technologies AG |
| manufacturer_web |
https://www.sony.com/ |
https://www.infineon.com/ |
| security_level |
EAL4 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
b2a375e103b59ffb |
5c8a5a97ed2b0df4 |
| heuristics/cert_id |
NSCIB-CC-09-10991-CR |
NSCIB-CC-0189594-CR |
| heuristics/cert_lab |
[] |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
1.0 |
1.0, 3.5 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0351-2006 |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0212-2004, BSI-DSZ-CC-0351-2006 |
{} |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0351-2006 |
BSI-DSZ-CC-1079-V2-2020 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0351-2006 |
BSI-DSZ-CC-1079-V2-2020 |
| heuristics/protection_profiles |
{} |
27abdb9c6ab375a7 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf |
| pdf_data/cert_filename |
|
nscib-certificate-21-0189594.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0075-2012-MA-01: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL2: 1
- EAL7: 1
|
| pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.3: 1
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 1
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 15408-2: 1
- ISO/IEC 15408-3: 1
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20210715135138+01'00'
- /Creator: C458-M
- /ModDate: D:20210715135209+02'00'
- /Producer: KONICA MINOLTA bizhub C458
- /Title: C458-M&S21071513510
- pdf_file_size_bytes: 82710
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
Certification_Report_NSCIB-CC-09-10991-CR.pdf |
nscib-cc-0189594-crsscd-imp.pdf |
| pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-0189594-CR
- cert_item: SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD
- cert_lab: Brightsight B.V.
- developer: cv cryptovision GmbH
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- NL:
- NSCIB-07-09612: 1
- NSCIB-CC-09-10991: 2
- NSCIB-CC-09-10991-CR: 16
|
- NL:
- NSCIB-CC-0031318-CR2: 1
- NSCIB-CC-0189594-CR: 12
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002: 1
- BSI-PP-0002: 2
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL4+: 1
- EAL5+: 1
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_CAP.4: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.1: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM.1: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 2
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 2
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
- SCA:
- physical probing: 2
- side channels: 1
- other:
|
- other:
- JIL: 2
- JIL-AAPS: 2
- JIL-AM: 2
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- OutOfScope:
- 1.2, 9 December 2004. [ST] Security Target RC-S957/2 Series with contact-based operating system out of scope, version 1.1, May 2009. [ST-HW] Renesas AE45X1-C (HD65145X1) Version 03 Smartcard Security Target –: 1
- 19, 2007. [ETR] Evaluation Technical Report, RC-S957/2 Series with contact operating system out of scope (09-RPT-128), Version 2.0, June 23, 2009. [ETR-HW] Renesas AE45X1-C ETR-Lite, version 1.0, July 13: 1
- 24, 2009 3 Security Target The Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST- E01-10), version 1.1, May 2009 is included here by reference. Please note that for the: 1
- Assurance Level (EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan. This report pertains to the TOE which has the: 1
- Common Criteria security evaluation of the RC- S957/2 Series with contact-based operating system out of scope, v1.0. The developer of the RC- S957/2 Series with contact-based operating system out of scope is: 1
- EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan: 1
- Evaluation Lab Brightsight BV TOE name RC-S957/2 Series with contact-based operating system out of scope, v1.0 Report title Certification Report Report reference name NSCIB-CC-09-10991-CR number page: 1
- NSCIB-CC-09-10991 Certification Report Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 Reproduction of this report is authorized provided the report is reproduced in its entirety: 1
- The Target of Evaluation – TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system. The TOE is: 1
- and was completed on 29 May 2008. The current RC-S957/2 Series with contact operating system out of scope v1.0 has been re-evaluated by Brightsight B.V. located in Delft, The Netherlands and was completed: 1
- as the NSCIB Certification Body, declares that the RC-S957/2 Series with contact operating system out of scope, v1.0 evaluation meets all the conditions for international recognition of Common Criteria: 1
- evaluation results the evaluation lab concluded the RC-S957/2 Series with contact operating system out of scope, v1.0, to be CC Part 2 conformant, CC Part 3 conformant, and to meet the requirements of EAL 4: 1
- evidence, Sony Corporation as the developer of the RC-S957/2 Series with contact operating system out of scope, v1.0 submitted an Impact Analysis Report [IAR] to the NSCIB Certification Body requesting a new: 1
- i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system: 1
- in yellow. The form factor of the smartcard is indicated in gray. The Global Platform OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
- is a “delta” with respect to the evaluation of the “RC-S957 Series with contact operating system out of scope” with certification id NSCIB-07-09612. The difference between this evaluated TOE and the original: 1
- is defined uniquely by its name and version number RC-S957/2 Series with contact operating system out of scope, v1.0 and can be identified by its ROM version: 0C06 and form factor: Antenna Module (IC with: 1
- out of scope: 21
- reader is encrypted (based on single DES). The RC-S957/2 Series with contact-based operating system out of scope has several self-protection mechanisms, as follows: Ø Common smartcard self-protection mechanisms: 2
- recently performed evaluation of the original RC-S957 Series with contact-based operating system out of scope, v1.0. The original RC-S957 Series was certified on June 9th 2008 under the certification: 1
- requirements specified in Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST-E01-10), version 1.1, May 2009. The Security Target does not claim conformance to any: 1
- the evaluation, the intended environment for the RC-S957/2 Series with contact operating system out of scope, the security requirements, and the level of confidence (evaluation assurance level) at which the: 1
|
|
| pdf_data/report_metadata |
- /Author: p647
- /CreationDate: D:20090702110646+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
- /Title: Certification Report NSCIB-CC-09-10991-CR.doc
- pdf_file_size_bytes: 253688
- pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 16
|
- /Author:
- /CreationDate: D:20210713160933+02'00'
- /Creator:
- /Keywords:
- /ModDate: D:20210713160933+02'00'
- /Producer: Foxit Reader PDF Printer Version 7.1.0.112
- /Subject:
- /Title:
- pdf_file_size_bytes: 198822
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
| pdf_data/st_filename |
957-2-STP-E01-10.pdf |
st-lite-sscd_impv1.6st_lite_eps3_pp0075_v16_infineon.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0351-2006: 1
- BSI-DSZ-CC-0351-2006-MA-01: 1
|
- DE:
- BSI-DSZ-CC-1079-V2-2020: 2
- NL:
- NSCIB-CC-0031318-CR2: 1
- NSCIB-CC-0189594: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0075-: 1
- BSI-CC-PP-0075-2012-: 1
- BSI-CC-PP-0075-2012-MA-01: 2
- BSI-CC-PP-0084-: 1
- BSI-PP-0006-2002: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL 5 augmented: 1
- EAL 5+: 3
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 4
- EAL5 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.1: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL.2: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP.2: 1
- ADV_HLD.2: 1
- ADV_IMP.1: 1
- ADV_LLD.1: 1
- ADV_RCR.1: 1
- ADV_SPM.1: 6
- AGD:
- ALC:
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.2: 1
- AVA_SOF.1: 1
- AVA_VLA.2: 1
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 4
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP: 18
- FCS_COP.1: 4
- FCS_MSA.3: 1
- FCS_RCV.4: 2
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 10
- FDP_ITC.1.1: 1
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 1
- FDP_ITC.2: 3
- FIA:
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.3: 8
- FIA_UAU.3.1: 1
- FIA_UAU.3.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.2: 5
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 9
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RCV.4: 7
- FPT_RCV.4.1: 1
- FPT_RVM.1: 10
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.1: 7
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FTP:
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FCO:
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.2: 1
- FCS_CKM.3: 1
- FCS_CKM.4: 12
- FCS_CKM.4.1: 3
- FCS_COP: 18
- FCS_COP.1: 15
- FCS_RND: 7
- FCS_RND.1: 11
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 25
- FDP_ACC.1: 22
- FDP_ACF: 14
- FDP_ACF.1: 28
- FDP_AFC: 1
- FDP_IFC: 2
- FDP_IFC.1: 12
- FDP_IFF: 2
- FDP_ITC: 9
- FDP_ITC.1: 15
- FDP_ITC.2: 6
- FDP_RIP: 8
- FDP_RIP.1: 5
- FDP_RIP.1.1: 2
- FDP_ROL: 2
- FDP_SDI: 12
- FDP_SDI.1: 2
- FDP_SDI.2: 12
- FDP_UCT: 10
- FDP_UCT.1: 3
- FDP_UIT: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_ATD: 1
- FIA_UAU: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 3
- FIA_UID: 2
- FIA_UID.1: 13
- FIA_UID.1.1: 3
- FIA_UID.1.2: 3
- FIA_USB: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 2
- FMT_MSA: 23
- FMT_MSA.1: 7
- FMT_MSA.2: 5
- FMT_MSA.2.1: 2
- FMT_MSA.3: 15
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 5
- FMT_MSA.4.1: 3
- FMT_MTD: 15
- FMT_MTD.1: 6
- FMT_SMF: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 2
- FMT_SMR: 3
- FMT_SMR.1: 24
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 3
- FPR:
- FPT:
- FPT_EMS: 7
- FPT_EMS.1: 11
- FPT_EMS.1.1: 5
- FPT_EMS.1.2: 4
- FPT_FLS: 4
- FPT_FLS.1: 12
- FPT_FLS.1.1: 2
- FPT_ITC: 1
- FPT_PHP.1: 6
- FPT_PHP.1.1: 3
- FPT_PHP.1.2: 3
- FPT_PHP.3: 11
- FPT_PHP.3.1: 3
- FPT_RCV: 1
- FPT_TDC.1: 1
- FPT_TST: 2
- FPT_TST.1: 15
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ICT: 2
- FTP_ITC: 6
- FTP_ITC.1: 11
- FTP_TRP.1: 2
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 1
- A.CGA: 2
- A.CSP: 2
- A.SCA: 2
- A.VERIFICATION: 1
- O:
- O.ALARM: 1
- O.CARD-MANAGEMENT: 1
- O.CIPHER: 1
- O.COMMUNICATION: 1
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.KEY-MNGT: 1
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PIN-MNGT: 1
- O.REALLOCATION: 1
- O.RESOURCES: 1
- O.SCP: 4
- O.SID: 1
- O.TRANSACTION: 1
- OE:
- OE.APPLET: 1
- OE.CODE-EVIDENCE: 1
- OE.HID_VAD: 3
- OE.VERIFICATION: 1
- T:
- T.COMMUNICATION: 1
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.DELETION: 1
- T.EXE-CODE: 2
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.LIFE_CYCLE: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.RNG: 1
- T.SID: 2
- T.UNAUTHORIZED_CARD_MNGT: 1
|
| pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies AG: 2
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- SCA:
- Side_channel: 1
- physical probing: 6
- side channel: 1
- side channels: 1
|
- FI:
- DFA: 1
- fault injection: 1
- malfunction: 1
- physical tampering: 13
- SCA:
- DPA: 2
- SPA: 2
- physical probing: 1
- timing attacks: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- FIPS:
- ISO:
- ISO/IEC 7810: 2
- ISO/IEC18092: 2
- ISO/IEC7816: 2
|
- BSI:
- AIS 20: 1
- AIS 31: 1
- AIS20: 3
- AIS31: 2
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS PUB 186-3: 1
- FIPS180-4: 3
- FIPS186-3: 2
- FIPS197: 2
- ICAO:
- ISO:
- PKCS:
- RFC:
- SCP:
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Public Version No. 957-2-STP-E01-10 Introduction This document is the Security: 1
- FeliCa Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version 1.1 : June 2009 Sony Corporation FeliCa Business Division NO.957-2-STP-E01-10 ©2009 Sony: 1
- ST identification ST Name: Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Date: June 2009 TOE identification TOE Name: RC-S957/2 Series with contact-based: 1
- Security Target presents the following TOE: RC-S957/2 Series with contact-based operating system out of scope. The TOE is a dual interface integrated circuit with an antenna and an embedded smartcard operating: 1
- TOE Description 2.1. Overview The TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface COT package for an integrated circuit with an embedded smartcard operating: 1
- is indicated in yellow. The form factor of the smartcard is indicated in gray. The GP OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
- out of scope: 7
- system out of scope Version: 1.0 Product type: Dual Interface IC Chip for smartcard Form factor: Antenna Module (IC: 1
|
- OutOfScope:
- No contradiction to this ST. FDP_ROL.1/FIREWALL No correspondence. Out of scope (internal Java Card Fire- wall: 1
- No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall: 1
- No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
- No contradiction to this ST. FPT_FLS.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
- While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification: 1
- While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification. 1.4.3 TOE package types and forms of delivery The TOE can be delivered in the: 1
- 20 of 74 Platform SFR Correspondence in this ST References/Remarks FPT_FLS.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional: 1
- 21 of 74 Platform SFR Correspondence in this ST References/Remarks FCO_NRO.2/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/SC No correspondence: 1
- 74 Platform SFR Correspondence in this ST References/Remarks FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
- 74 Platform Threat Correspondence in this ST References/Remarks T.COMMUNICATION No correspondence Out of scope. No contradiction to this ST. T.UNAUTHORIZED_CARD_MNGT No correspondence Out of scope. No: 1
- ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- Card OS). No contradiction to this ST. FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.4 FCS_CKM.4 Tbd. (“clearKey: 1
- DTBS_Forgery, T.Sig_Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
- FCS_CKM.1.1/AES, FCS_CKM.1.1/TDES) No correspondence Out of scope of the TOE. No contra- diction to this ST. FCS_CKM.2 No correspondence Out of scope (managed within: 1
- FCS_CKM.1.1/RSA, FCS_CKM.1.1/EC, FCS_CKM.1.1/AES, FCS_CKM.1.1/TDES) No correspondence Out of scope of the TOE: 1
- Functional Requirements (chapter 7.2.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
- O.GLOBAL_ARRAYS_INTEG OT.DTBS_Integrity_TOE No contradiction to this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
- O.LOAD No correspondence Out of scope. No contradiction to this ST. O.INSTALL No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to: 1
- O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- Out of scope: 96
- Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 2
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/Installer No: 1
- Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No: 1
- SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
- ST. O.COMMUNICATION No correspondence Out of scope. No contradiction to this ST. O.SCP.IC OT.Tamper_ID, OT.Tamper_Resistance, OT.EMSEC_Design The: 1
- ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to this ST. O.DELETION No correspondence Out of scope. No contradiction to this: 1
- ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
- ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
- Security Functional Requirements (chapter 7.2.6 in platform ST) FDP_UIT.1/CCM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/CCM No correspondence: 1
- T.DELETION No correspondence Out of scope. No contradiction to this ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST: 1
- T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
- T.SCD_Divulg, T.SCD_Derive No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-DATA No correspondence Out of scope. No contradiction to: 1
- are related. No con- tradiction to this ST. O.SCP.RECOVERY No correspondence Out of scope. No contradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to: 1
- chapter 7.2.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall: 1
- chapter 7.2.6 in platform ST) FDP_UIT.1/CCM No correspondence Out of scope (internal Java Card func- tionality: 1
- in this ST References/Remarks mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_ATD.1/AID No correspondence: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall: 1
- internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FCS_CKM.1 (FCS_CKM.1.1/RSA, FCS_CKM.1: 1
- internal Java Card func- tionality). No contradiction to this ST. FCS_COP.1/DAP No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FCS_COP.1/DAP No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACC.1/SD No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/SD No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/SD No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/SD No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/SC No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/SC No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence. Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence. Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1/SC No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.4/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1/SC No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/SC No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/SC No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/SD No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/SD No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/SD No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/SC No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SECORA™ ID X Applet Collection: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/SD No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/SD No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/SC No correspondence: 1
- internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.2/CCM No correspondence Out of scope (internal Java Card func- tionality: 1
- internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.2/CCM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/CCM No correspondence: 1
- internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine: 1
- internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out: 1
- managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS: 1
- manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence: 1
- objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this: 1
- of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
- of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of: 1
- out of scope: 1
- that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The: 1
- the plat- form leads to secrecy of SCD. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this ST. O.TRANSACTION No correspondence Out of scope. No contradiction to: 1
- to this ST. T.LIFE_CYCLE No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
- vided by FCS_COP.1.1/JCAPI/HASH. No contradictions to this ST. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence: 1
- which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No: 1
|
| pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20090623194607+09'00'
- /Creator: Word 用 Acrobat PDFMaker 7.0.7
- /ModDate: D:20090623194911+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /SourceModified: D:20090623104507
- /Title: Microsoft Word - 957-2-STP-E01-10.doc
- pdf_file_size_bytes: 344849
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 47
|
- /Author: bdrisch
- /CreationDate: D:20210611135736+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: SSCD, ePasslet Suite, electronic Signature
- /ModDate: D:20210611135736+02'00'
- /Producer: Microsoft® Word 2013
- /Title: Security Target ePasslet/ePKI-SSCD
- pdf_file_size_bytes: 2431628
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |