Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60
JISEC-CC-CRP-C0371
NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
BSI-DSZ-CC-0675-2011
name Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version:11.0.2100.60 NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP DE
not_valid_after 12.10.2017 01.09.2019
not_valid_before 06.09.2012 06.04.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0675a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0371_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0675b_pdf.pdf
manufacturer Microsoft Corporation NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www.microsoft.com https://www.nxp.com
security_level EAL2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst bccee9cca27bae56 cabd9ee16cc158db
heuristics/cert_id JISEC-CC-CRP-C0371 BSI-DSZ-CC-0675-2011
heuristics/cert_lab [] BSI
heuristics/cpe_matches {} cpe:2.3:h:nxp:j2a081:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3a041:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:3a081:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars {} ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 11.0.2100.60 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0674-2011
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0742-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0741-2011, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0799-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0633-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0371
  • certification_date: 01.09.2012
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cert_link: https://www.ipa.go.jp/en/security/c0371_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2012. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functions This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user and metadata stored in the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users.
    • evaluation_facility: TワV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • report_link: https://www.ipa.go.jp/en/security/c0371_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0371_est.pdf
    • toe_version: 11.0.2100.60
    • vendor: Microsoft Corporation
  • expiration_date: 01.10.2017
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0371_it1383.html
  • toe_overseas_name: Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English) 11.0.2100.60
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0555-2009
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0745-2012, BSI-DSZ-CC-0747-2011, BSI-DSZ-CC-0812-2012, BSI-DSZ-CC-0746-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0804-2012, BSI-DSZ-CC-0748-2011, BSI-DSZ-CC-0799-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0555-2009
pdf_data/report_filename c0371_erpt.pdf 0675a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0675-2011
    • cert_item: NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0371-01: 1
    • Certification No. C0371: 1
  • DE:
    • BSI-DSZ-CC-0555-2009: 2
    • BSI-DSZ-CC-0633-2010: 5
    • BSI-DSZ-CC-0674-2011: 2
    • BSI-DSZ-CC-0675-2011: 24
  • NL:
    • CC-0555-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL 4: 5
    • EAL 5: 4
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.MASQUERADE: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
    • Microsoft Corporation: 7
  • NXP:
    • NXP: 22
    • NXP Semiconductors: 20
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
    • AIS36: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#1: 3
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • / P5CD041V1A / P5CD021V1A / P5CD016V1A, BSI-DSZ-CC-0633-2010, Version 2.0, 11.11.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0555-2009 for NXP Smart Card Controller P5CD081V1A and its: 1
    • Card Controller Rev. 3, BSI-DSZ-CC-0675-2011, Version 4, 06.04.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • J2A081 and J3A041 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
    • J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.0, 09.03.2011, JCOP V2.4.1 Secure Smart Card: 1
    • NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A081, J2A081 and J3A041 Secure: 1
pdf_data/report_metadata
  • /CreationDate: D:20130527154721+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130527154854+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 225890
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110414105710+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, CC"
  • /ModDate: D:20110414105851+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0675-2011
  • pdf_file_size_bytes: 997076
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename c0371_est.pdf 0675b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0555-2009: 1
    • BSI-DSZ-CC-0633: 3
    • BSI-DSZ-CC-0675: 2
    • BSI-DSZ-CC-555: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
    • BSI-PP-0035: 3
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL2: 84
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL5: 17
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_ADD: 3
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 14
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 9
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 14
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
  • FAU:
    • FAU_ARP: 18
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 5
    • FAU_SAA.1: 20
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS: 10
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 4
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 28
    • FCS_COP.1.1: 14
    • FCS_LIM.1: 1
    • FCS_LIM.2: 1
    • FCS_RND.1: 2
    • FCS_RND.2: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 24
    • FDP_ACC.1: 10
    • FDP_ACC.2: 4
    • FDP_ACF: 20
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 5
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 17
    • FDP_IFC.1: 18
    • FDP_IFF: 5
    • FDP_IFF.1: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT: 9
    • FDP_ITT.1: 8
    • FDP_RIP: 10
    • FDP_RIP.1: 15
    • FDP_ROL: 5
    • FDP_ROL.1: 5
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 7
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UAU: 10
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.4: 1
    • FIA_UID: 13
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA: 41
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 12
    • FMT_MTD: 6
    • FMT_MTD.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 6
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT.1: 3
    • FPT_FLS: 25
    • FPT_FLS.1: 9
    • FPT_ITT: 9
    • FPT_ITT.1: 9
    • FPT_PHP: 7
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 5
    • FPT_RCV: 6
    • FPT_RCV.3: 8
    • FPT_RCV.4: 2
    • FPT_RVM.1: 6
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT: 6
    • FRU_FLT.1: 1
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ADMIN_ROLE: 5
    • O.AUDIT_GENERATION: 6
    • O.MANAGE: 7
    • O.MEDIATE: 4
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 3
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.MASQUERADE: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.UNIDENTIFIED_ACTIONS: 3
  • A:
    • A.NATIVE: 7
    • A.NO-: 2
    • A.NO-DELETION: 6
    • A.NO-INSTALL: 5
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 6
    • A.VERIFICATION: 7
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 9
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 7
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JAVA_OBJECT: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 15
    • D.SEC_DATA: 5
  • O:
    • O.AES: 2
    • O.ALARM: 5
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 10
    • O.CIPHER: 12
    • O.CONFIG: 1
    • O.COPY: 1
    • O.ECC: 2
    • O.FAULT_PROTECT: 5
    • O.FIREWALL: 9
    • O.HW_AES: 2
    • O.IDENTIFICATION: 6
    • O.KEY-MNGT: 10
    • O.MEM_ACCESS: 3
    • O.MF_FW: 6
    • O.OPERATE: 16
    • O.OS_DECEIVE: 7
    • O.PHYSICAL: 8
    • O.PIN-MNGT: 5
    • O.PROTECT_DATA: 10
    • O.REALLOCATION: 4
    • O.RESOURCES: 11
    • O.REUSE: 2
    • O.RND: 13
    • O.RSA: 1
    • O.SCP: 36
    • O.SHA: 2
    • O.SHRD_VAR_CON: 1
    • O.SHRD_VAR_CONFID: 9
    • O.SHRD_VAR_INTE: 1
    • O.SHRD_VAR_INTEG: 3
    • O.SID: 13
    • O.SIDE_CHANNEL: 6
    • O.TRANSACTION: 4
    • O.XYZ: 1
  • OE:
    • OE.CARD-MANAGEMENT: 2
    • OE.NATIVE: 5
    • OE.NO-DELETION: 4
    • OE.NO-INSTALL: 7
    • OE.SCP: 5
    • OE.USE_DIAG: 5
    • OE.USE_KEY: 2
    • OE.USE_KEYS: 4
    • OE.VERIFICATION: 9
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 5
    • OP.PUT: 5
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.PRO: 1
    • OSP.PROCESS-TOE: 3
  • R:
    • R.JAVA: 5
  • T:
    • T.ACCES: 1
    • T.ACCESS_DAT: 1
    • T.ACCESS_DATA: 2
    • T.CONFID: 2
    • T.CONFID-: 1
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.EXE-CODE: 11
    • T.FAULT: 7
    • T.INTEG-: 3
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 3
    • T.INTEG-JCS-: 4
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.LEAKA: 1
    • T.LEAKAGE: 6
    • T.OS: 2
    • T.OS_DE: 1
    • T.OS_DECEIVE: 6
    • T.OS_OP: 1
    • T.OS_OPERATE: 5
    • T.PHYSIC: 1
    • T.PHYSICAL: 4
    • T.RESOU: 1
    • T.RESOURCES: 5
    • T.RND: 6
    • T.SID: 12
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 54
    • Microsoft Corporation: 2
  • NXP:
    • NXP: 120
    • NXP Semiconductors: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 6
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 22
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 8
      • SHA-256: 7
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 20
    • RNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 6
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 3
    • Malfunction: 7
    • Physical tampering: 4
    • malfunction: 5
    • physical tampering: 3
  • SCA:
    • DPA: 5
    • Leak-Inherent: 7
    • SPA: 4
    • physical probing: 4
    • side channel: 2
    • side-channel: 1
    • timing attack: 2
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 117
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 6
  • FIPS:
    • FIPS 180-3: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 180-3: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. NXP Semiconductors JCOP 2.4.1 R3 Security Target Lite PUBLIC INFORMATION: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: NXP Semiconductors
  • /CreationDate: D:20110331110331
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria Evaluation, NXP J3A081, J2A081, J3A041, Revision 3, JavaCard
  • /ModDate: D:20110331110331
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1915131
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 116
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different