Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0
NSCIB-CC-09-10991-CR
Carte M-NFC2.0.3_TUR sur composant ST33F1ME (T1019850 / Release A)
ANSSI-CC-2012/75
name Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 Carte M-NFC2.0.3_TUR sur composant ST33F1ME (T1019850 / Release A)
scheme NL FR
not_valid_after 24.06.2019 01.09.2019
not_valid_before 24.06.2009 22.10.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-10991-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-75fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/957-2-STP-E01-10.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-75en.pdf
manufacturer Sony Corporation Gemalto / STMicroelectronics
manufacturer_web https://www.sony.com/ https://www.gemalto.com/
security_level EAL4 EAL4+, AVA_VAN.5, ALC_DVS.2
dgst b2a375e103b59ffb d26dea362fb8e210
heuristics/cert_id NSCIB-CC-09-10991-CR ANSSI-CC-2012/75
heuristics/cert_lab [] THALES
heuristics/extracted_sars ALC_LCD.1, ADV_IMP.1, ADV_HLD.2, AGD_USR.1, AVA_VLA.2, ALC_DVS.1, ADV_LLD.1, ADV_RCR.1, ALC_TAT.1, AVA_MSU.2, ADV_FSP.2, ATE_DPT.1, AGD_ADM.1, ATE_IND.2, ADV_SPM.1, ATE_COV.2, AVA_SOF.1, ATE_FUN.1 ADV_IMP.1, ASE_OBJ.2, ATE_DPT.1, AVA_VAN.5, ADV_ARC.1, ATE_COV.2, ALC_LCD.1, ASE_TSS.1, ALC_CMS.4, ALC_DVS.2, ASE_ECD.1, AGD_OPE.1, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ASE_REQ.2, ADV_TDS.3, ALC_TAT.1, AGD_PRE.1, ALC_DEL.1, ASE_CCL.1, ALC_CMC.4
heuristics/extracted_versions 1.0 2.0.3
heuristics/report_references/directly_referencing BSI-DSZ-CC-0351-2006 ANSSI-CC-2011/07
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0351-2006, BSI-DSZ-CC-0212-2004 ANSSI-CC-2011/07, ANSSI-CC-2010/49, ANSSI-CC-2010/50
heuristics/st_references/directly_referencing BSI-DSZ-CC-0351-2006 {}
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-0351-2006 {}
heuristics/protection_profiles {} 85bef5b6f16c4d33
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename Certification_Report_NSCIB-CC-09-10991-CR.pdf ANSSI-CC_2012-75fr.pdf
pdf_data/report_frontpage
  • FR:
  • NL:
  • FR:
    • cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 3
    • cert_id: ANSSI-CC-2012/75
    • cert_item: Carte M-NFC2.0.3_TUR sur composant ST33F1ME (T1019850 / Release A
    • cert_item_version: Plateforme M-NFC2.0.3_TUR sur composant ST33F1ME (S1112312 / Release A
    • cert_lab: THALES - CEACI (T3S – CNES) 18 avenue Edouard Belin, BPI1414, 31401 Toulouse Cedex 9, France Tél : +33 (0)5 62 88 28 01 ou 18, mél : [email protected]
    • developer: Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, B.P. 2, 13106 Rousset, France Commanditaire Gemalto La Vigie, Av du Jujubier, ZI Athelia IV, 13705 La Ciotat Cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit \\(référence/version\\)(.+)Nom de la TOE \\(référence/version\\)(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP JCS-O], version 2.6 Java Card System Protection Profile - Open Configuration
  • NL:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0351-2006: 1
  • NL:
    • NSCIB-07-09612: 1
    • NSCIB-CC-09-10991: 2
    • NSCIB-CC-09-10991-CR: 16
  • FR:
    • ANSSI-CC-2011/07: 3
    • ANSSI-CC-2012/75: 20
    • ANSSI-CC-PP-2010/03: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002: 1
    • BSI-PP-0002: 2
  • ANSSI:
    • ANSSI-CC-PP-2010/03: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 3
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_claims
  • R:
    • R.T: 1
  • T:
    • T.M: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 9
  • STMicroelectronics:
    • STMicroelectronics: 2
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • Thales:
    • THALES - CEACI: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 4
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/report_keywords/crypto_library
  • Neslib:
    • NesLib v3.0: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • physical probing: 2
    • side channels: 1
  • other:
    • JIL: 3
  • other:
    • JIL: 2
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS20: 2
  • CC:
    • CCIMB-2005-08-004: 1
  • FIPS:
    • FIPS PUB 46-3: 2
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • 1.2, 9 December 2004. [ST] Security Target RC-S957/2 Series with contact-based operating system out of scope, version 1.1, May 2009. [ST-HW] Renesas AE45X1-C (HD65145X1) Version 03 Smartcard Security Target –: 1
    • 19, 2007. [ETR] Evaluation Technical Report, RC-S957/2 Series with contact operating system out of scope (09-RPT-128), Version 2.0, June 23, 2009. [ETR-HW] Renesas AE45X1-C ETR-Lite, version 1.0, July 13: 1
    • 24, 2009 3 Security Target The Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST- E01-10), version 1.1, May 2009 is included here by reference. Please note that for the: 1
    • Assurance Level (EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan. This report pertains to the TOE which has the: 1
    • Common Criteria security evaluation of the RC- S957/2 Series with contact-based operating system out of scope, v1.0. The developer of the RC- S957/2 Series with contact-based operating system out of scope is: 1
    • EAL) 4 evaluation is the RC- S957/2 Series with contact operating system out of scope, v1.0 from Sony Corporation located in Tokyo, Japan: 1
    • Evaluation Lab Brightsight BV TOE name RC-S957/2 Series with contact-based operating system out of scope, v1.0 Report title Certification Report Report reference name NSCIB-CC-09-10991-CR number page: 1
    • NSCIB-CC-09-10991 Certification Report Sony RC-S957/2 Series with contact-based operating system out of scope, v1.0 Reproduction of this report is authorized provided the report is reproduced in its entirety: 1
    • The Target of Evaluation – TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system. The TOE is: 1
    • and was completed on 29 May 2008. The current RC-S957/2 Series with contact operating system out of scope v1.0 has been re-evaluated by Brightsight B.V. located in Delft, The Netherlands and was completed: 1
    • as the NSCIB Certification Body, declares that the RC-S957/2 Series with contact operating system out of scope, v1.0 evaluation meets all the conditions for international recognition of Common Criteria: 1
    • evaluation results the evaluation lab concluded the RC-S957/2 Series with contact operating system out of scope, v1.0, to be CC Part 2 conformant, CC Part 3 conformant, and to meet the requirements of EAL 4: 1
    • evidence, Sony Corporation as the developer of the RC-S957/2 Series with contact operating system out of scope, v1.0 submitted an Impact Analysis Report [IAR] to the NSCIB Certification Body requesting a new: 1
    • i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface integrated circuit with an embedded smartcard operating system: 1
    • in yellow. The form factor of the smartcard is indicated in gray. The Global Platform OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
    • is a “delta” with respect to the evaluation of the “RC-S957 Series with contact operating system out of scope” with certification id NSCIB-07-09612. The difference between this evaluated TOE and the original: 1
    • is defined uniquely by its name and version number RC-S957/2 Series with contact operating system out of scope, v1.0 and can be identified by its ROM version: 0C06 and form factor: Antenna Module (IC with: 1
    • out of scope: 21
    • reader is encrypted (based on single DES). The RC-S957/2 Series with contact-based operating system out of scope has several self-protection mechanisms, as follows: Ø Common smartcard self-protection mechanisms: 2
    • recently performed evaluation of the original RC-S957 Series with contact-based operating system out of scope, v1.0. The original RC-S957 Series was certified on June 9th 2008 under the certification: 1
    • requirements specified in Security Target RC-S957/2 Series with contact-based operating system out of scope (957-2-ST-E01-10), version 1.1, May 2009. The Security Target does not claim conformance to any: 1
    • the evaluation, the intended environment for the RC-S957/2 Series with contact operating system out of scope, the security requirements, and the level of confidence (evaluation assurance level) at which the: 1
pdf_data/report_metadata
  • /Author: p647
  • /CreationDate: D:20090702110646+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
  • /Title: Certification Report NSCIB-CC-09-10991-CR.doc
  • pdf_file_size_bytes: 253688
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 16
  • /Author:
  • /CreationDate: D:20121022112704+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20121022112704+02'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title:
  • pdf_file_size_bytes: 282469
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 19
pdf_data/st_filename 957-2-STP-E01-10.pdf ANSSI-CC-cible_2012-75en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0351-2006: 1
    • BSI-DSZ-CC-0351-2006-MA-01: 1
  • NL:
    • CC-1: 1
    • CC-2: 4
    • CC-3: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 6
  • BSI:
    • BSI-PP-2007-0035: 2
  • other:
    • PP-SSCD: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 7
  • EAL:
    • EAL4: 5
    • EAL4 augmented: 3
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 6
  • AGD:
    • AGD_ADM.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 6
    • ADV_FSP.1: 4
    • ADV_FSP.2: 2
    • ADV_FSP.4: 9
    • ADV_IMP.1: 5
    • ADV_TDS.1: 2
    • ADV_TDS.2: 1
    • ADV_TDS.3: 9
  • AGD:
    • AGD_ADM: 1
    • AGD_OPE.1: 10
    • AGD_PRE.1: 6
    • AGD_USR: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.1: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 3
    • ALC_TAT.1: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 3
    • ATE_DPT.1: 2
    • ATE_FUN.1: 6
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_COP: 18
    • FCS_COP.1: 4
    • FCS_MSA.3: 1
    • FCS_RCV.4: 2
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 10
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 3
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 8
    • FIA_UAU.3.1: 1
    • FIA_UAU.3.2: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 5
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 7
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP.1: 17
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 3
    • FAU_SAS.1: 1
  • FCO:
    • FCO_NRO: 14
    • FCO_NRO.2: 7
  • FCS:
    • FCS_CKM: 74
    • FCS_CKM.1: 22
    • FCS_CKM.2: 7
    • FCS_CKM.3: 4
    • FCS_CKM.4: 43
    • FCS_CKM.4.1: 1
    • FCS_COP: 53
    • FCS_COP.1: 17
    • FCS_RND: 2
    • FCS_RND.1: 9
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 48
    • FDP_ACC.1: 22
    • FDP_ACC.2: 8
    • FDP_ACF: 38
    • FDP_ACF.1: 25
    • FDP_IFC: 46
    • FDP_IFC.1: 26
    • FDP_IFC.2: 4
    • FDP_IFF: 40
    • FDP_IFF.1: 28
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.4: 1
    • FDP_ITC: 19
    • FDP_ITC.1: 18
    • FDP_ITC.2: 32
    • FDP_ITT.1: 1
    • FDP_RIP: 116
    • FDP_RIP.1: 10
    • FDP_ROL: 19
    • FDP_ROL.1: 7
    • FDP_SDI: 6
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 12
    • FDP_UIT.1: 4
  • FIA:
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU: 18
    • FIA_UAU.1: 2
    • FIA_UAU.4: 1
    • FIA_UID: 33
    • FIA_UID.1: 16
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 2
    • FMT_LIM.2: 1
    • FMT_MOF: 6
    • FMT_MOF.1: 1
    • FMT_MSA: 174
    • FMT_MSA.1: 18
    • FMT_MSA.2: 2
    • FMT_MSA.3: 27
    • FMT_MSA.3.1: 2
    • FMT_MTD: 26
    • FMT_MTD.1: 3
    • FMT_MTD.3: 1
    • FMT_REV: 8
    • FMT_REV.1: 4
    • FMT_SMF: 68
    • FMT_SMF.1: 30
    • FMT_SMF.1.1: 1
    • FMT_SMR: 75
    • FMT_SMR.1: 48
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 5
    • FPR_UNO.1: 11
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 59
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT: 12
    • FPT_ITT.1: 3
    • FPT_PHP.3: 1
    • FPT_RCV: 22
    • FPT_RCV.3: 12
    • FPT_RCV.4: 2
    • FPT_TDC.1: 10
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 1
    • FPT_UNO: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 24
    • FTP_ITC.1: 10
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLET: 5
    • A.APPS-PROVIDER: 5
    • A.DELETION: 2
    • A.MOBILE-: 1
    • A.MOBILE-OPERATOR: 4
    • A.OTA-ADMIN: 5
    • A.PRODUCTION: 2
    • A.VERIFICATION: 4
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 8
    • D.APP_C_DATA: 5
    • D.APP_I_DATA: 6
    • D.APSD_KEYS: 4
    • D.CARD_MNGT_DATA: 4
    • D.CRYPTO: 4
    • D.GP_CODE: 2
    • D.ISD_KEYS: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.OPTIONAL_PF_SERVICE: 2
    • D.PIN: 4
    • D.SEC_DATA: 7
  • O:
    • O.ALARM: 22
    • O.APPLET: 21
    • O.CARD-: 5
    • O.CARD-MANAGEMENT: 50
    • O.CARD_MANAGEMENT: 2
    • O.CIPHER: 24
    • O.CODE_PKG: 14
    • O.COMM_AUTH: 18
    • O.COMM_CONFIDENTIALITY: 15
    • O.COMM_INTEGRITY: 16
    • O.DELETION: 14
    • O.DOMAIN-: 10
    • O.DOMAIN-RIGHTS: 19
    • O.FIREWALL: 51
    • O.GLOBAL_ARRAYS_CONFID: 19
    • O.GLOBAL_ARRAYS_INTEG: 10
    • O.INSTALL: 15
    • O.JAVAOBJECT: 41
    • O.KEY-: 2
    • O.KEY-MNGT: 34
    • O.LOAD: 17
    • O.NATIVE: 14
    • O.OBJ-DELETION: 9
    • O.OPERATE: 35
    • O.PIN-: 7
    • O.PIN-MNGT: 14
    • O.REALLOCATION: 17
    • O.REMOTE: 16
    • O.REMOTE_MTHD: 6
    • O.REMOTE_OBJ: 10
    • O.REMOTE_SERVICE_ACTIVATION: 11
    • O.REMOTE_SERVICE_AUDIT: 11
    • O.RESOURCES: 25
    • O.RMI_SERVICE: 12
    • O.RND: 10
    • O.ROR: 5
    • O.SCP: 29
    • O.SCP-: 2
    • O.SCP-SUPPORT: 19
    • O.SID: 37
    • O.TRANSACTION: 18
  • OE:
    • OE.ACTIVATION-: 1
    • OE.ACTIVATION-KEY-ESCROW: 6
    • OE.AID-: 1
    • OE.AID-MANAGEMENT: 6
    • OE.AP-KEYS: 7
    • OE.APPLET: 9
    • OE.APPS-: 1
    • OE.APPS-PROVIDER: 6
    • OE.BASIC-: 4
    • OE.BASIC-APPS-: 6
    • OE.BASIC-APPS-VALIDATION: 17
    • OE.CARD_MANAGEMENT: 2
    • OE.GEMACTIVATE-ADMIN: 6
    • OE.KEY-CHANGE: 8
    • OE.KEY-ESCROW: 5
    • OE.KEY-GENERATION: 5
    • OE.MOBILE-OPERATOR: 7
    • OE.OPERATOR-KEYS: 7
    • OE.OTA-ADMIN: 5
    • OE.OTA-LOADING: 5
    • OE.OTA-SERVERS: 7
    • OE.PERSONALIZER: 6
    • OE.PRODUCTION: 5
    • OE.QUOTAS: 7
    • OE.SCP: 3
    • OE.SECURE-APPS-CERTIFICATION: 6
    • OE.SECURITY-DOMAINS: 5
    • OE.SHARE-CONTROL: 7
    • OE.TRUSTED-APPS-DEVELOPER: 7
    • OE.TRUSTED-APPS-PRE-ISSUANCE: 5
    • OE.VERIFICATION: 34
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 3
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 6
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.RET_RORD: 3
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 5
  • OSP:
    • OSP.ACTIVATION-KEY-ESCROW: 5
    • OSP.AID-MANAGEMENT: 5
    • OSP.APSD-KEYS: 5
    • OSP.BASIC-: 1
    • OSP.BASIC-APPS-VALIDATION: 4
    • OSP.KEY-: 1
    • OSP.KEY-CHANGE: 5
    • OSP.KEY-ESCROW: 5
    • OSP.KEY-GENERATION: 4
    • OSP.OPERATOR-KEYS: 5
    • OSP.OTA-LOADING: 5
    • OSP.OTA-SERVERS: 5
    • OSP.PERSONALIZER: 5
    • OSP.PRODUCTION: 5
    • OSP.QUOTAS: 5
    • OSP.RNG: 5
    • OSP.SECURE-APPS-: 2
    • OSP.SECURE-APPS-CERTIFICATION: 3
    • OSP.SECURITY-DOMAINS: 5
    • OSP.SERVICE: 1
    • OSP.SERVICE_AUDIT: 4
    • OSP.SHARE-CONTROL: 5
    • OSP.TRUSTED-: 1
    • OSP.TRUSTED-APPS-DEVELOPER: 5
    • OSP.TRUSTED-APPS-PRE-: 2
    • OSP.TRUSTED-APPS-PRE-ISSUANCE: 2
    • OSP.VERIFICATION: 5
  • R:
    • R.JAVA: 11
  • T:
    • T.COM_EXPLOIT: 7
    • T.CONFID-APPLI-DATA: 18
    • T.CONFID-JCS-: 9
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 4
    • T.DELETION: 7
    • T.EXE-: 1
    • T.EXE-CODE: 11
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 6
    • T.INTEG-: 10
    • T.INTEG-APPLI-: 7
    • T.INTEG-APPLI-CODE: 9
    • T.INTEG-APPLI-DATA: 16
    • T.INTEG-JCS-CODE: 7
    • T.INTEG-JCS-DATA: 6
    • T.INTEG-USER-DATA: 8
    • T.LIFE_CYCLE: 7
    • T.NATIVE: 7
    • T.OBJ-DELETION: 4
    • T.PHYSICAL: 6
    • T.RESOURCES: 8
    • T.SID: 18
    • T.UNAUTHORIZED_ACCESS: 5
    • T.UNAUTHORIZED_ACCESS_TO_SERVIC: 1
    • T.UNAUTHORIZED_ACCESS_TO_SERVICE: 5
    • T.UNAUTHORIZED_CARD_MNGT: 9
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 203
  • STMicroelectronics:
    • STMicroelectronics: 3
pdf_data/st_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 6
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 8
  • DES:
    • 3DES:
      • TDES: 7
    • DES:
      • DES: 9
  • constructions:
    • MAC:
      • CMAC: 2
      • HMAC: 7
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 3
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 3
      • SHA2: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 2
  • KA:
    • Key agreement: 1
  • MAC:
    • MAC: 18
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
  • RNG:
    • RND: 10
    • RNG: 8
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CBC:
    • CBC: 8
  • ECB:
    • ECB: 4
pdf_data/st_keywords/crypto_engine
  • NesCrypt:
    • Nescrypt: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
  • SCA:
    • Side_channel: 1
    • physical probing: 6
    • side channel: 1
    • side channels: 1
  • FI:
    • fault induction: 2
    • malfunction: 3
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • physical probing: 1
  • other:
    • JIL: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS20: 4
  • FIPS:
    • FIPS PUB 46-3: 5
  • ISO:
    • ISO/IEC 7810: 2
    • ISO/IEC18092: 2
    • ISO/IEC7816: 2
  • CC:
    • CCIMB-2009-07-001: 1
    • CCIMB-2009-07-002: 1
    • CCIMB-2009-07-003: 1
    • CCIMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
    • FIPS 180-3: 1
    • FIPS 197: 1
    • FIPS 46-3: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 3
    • FIPS PUB 81: 4
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS #1: 5
    • PKCS #5: 1
    • PKCS#1: 1
    • PKCS#5: 1
  • RFC:
    • RFC2085: 1
    • RFC2104: 1
  • SCP:
    • SCP 01: 1
    • SCP 02: 1
    • SCP 80: 1
    • SCP02: 6
    • SCP80: 9
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 2
  • JavaCard:
    • Java Card 2.2.2: 2
    • Java Card 3.0.1: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • java:
    • java.rmi: 2
  • javacard:
    • javacard.framework: 2
    • javacard.framework.service: 1
    • javacard.security: 2
  • javacardx:
    • javacardx.crypto: 10
    • javacardx.rmi: 1
    • javacardx.security: 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Public Version No. 957-2-STP-E01-10 Introduction This document is the Security: 1
    • FeliCa Dual Interface IC Chip Security Target RC-S957/2 Series with contact-based operating system out of scope Version 1.1 : June 2009 Sony Corporation FeliCa Business Division NO.957-2-STP-E01-10 ©2009 Sony: 1
    • ST identification ST Name: Security Target RC-S957/2 Series with contact-based operating system out of scope Version: 1.1 Date: June 2009 TOE identification TOE Name: RC-S957/2 Series with contact-based: 1
    • Security Target presents the following TOE: RC-S957/2 Series with contact-based operating system out of scope. The TOE is a dual interface integrated circuit with an antenna and an embedded smartcard operating: 1
    • TOE Description 2.1. Overview The TOE (i.e., RC-S957/2 Series with contact-based operating system out of scope) is a dual interface COT package for an integrated circuit with an embedded smartcard operating: 1
    • is indicated in yellow. The form factor of the smartcard is indicated in gray. The GP OS, which is out of scope of the TOE, is indicated in blue. The components of the TOE “FeliCa Operating System” constitute: 1
    • out of scope: 7
    • system out of scope Version: 1.0 Product type: Dual Interface IC Chip for smartcard Form factor: Antenna Module (IC: 1
  • OutOfScope:
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Reference D1245410 Release 1.2p (Printed copy not controlled: 1
    • out of scope: 2
    • parameters for cryptographic operations, the use of these other values are not advised; and clearly out of scope of the TOE. See [USR] for details. JCS.EraseResidualData The security function ensures that: 1
pdf_data/st_metadata
  • /Author:
  • /CreationDate: D:20090623194607+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0.7
  • /ModDate: D:20090623194911+09'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20090623104507
  • /Title: Microsoft Word - 957-2-STP-E01-10.doc
  • pdf_file_size_bytes: 344849
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 47
  • /Author: fguerin
  • /CreationDate: D:20120601181854+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20120601181854+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Target : NFC 2.0.3 TUR
  • pdf_file_size_bytes: 2299875
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 179
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different