Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Argus Command Center Web Portal Stable Version 2.1
ISCB-3-RPT-C115-CR-v1
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1
NSCIB-CC-0428888-CR2
name Argus Command Center Web Portal Stable Version 2.1 NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY NL
not_valid_after 23.06.2026 29.11.2027
not_valid_before 23.06.2021 29.11.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-22-0428888-Cert.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0428888-CR2-1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0428888-STLite_v1.8.pdf
manufacturer Certis CISCO Security Pte Ltd (Certis) NXP Semiconductors Germany GmbH
manufacturer_web https://www.certisgroup.com/ https://www.nxp.com
security_level EAL2 ALC_DVS.2, ASE_TSS.2, ALC_FLR.1, EAL5+, AVA_VAN.5
dgst c86ad5ef88d4cf8b a66d864aa9f72b9c
heuristics/cert_id ISCB-3-RPT-C115-CR-v1 NSCIB-CC-0428888-CR2
heuristics/cert_lab []
heuristics/extracted_sars AGD_OPE.1, ATE_COV.1, ATE_IND.2, ASE_ECD.1, ASE_TSS.1, ADV_TDS.1, ASE_REQ.2, ALC_CMC.2, ASE_SPD.1, ALC_CMS.2, ATE_FUN.1, ADV_ARC.1, ALC_DEL.1, AVA_VAN.2, ASE_OBJ.2, ASE_INT.1, ADV_FSP.2, AGD_PRE.1, ASE_CCL.1 ASE_TSS.2, AVA_VAN.5, ALC_DVS.2, ALC_FLR.1
heuristics/extracted_versions 2.1 1.02.1, 6.2, 2.01.1, 1.01.1
heuristics/report_references/directly_referencing {} NSCIB-CC-22-0258298-CR
heuristics/report_references/indirectly_referencing {} NSCIB-CC-22-0258298-CR
heuristics/scheme_data
heuristics/protection_profiles {} 1153ad24c84b397a, d1376142068b1da5, 7f886b64878b68c1
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf
pdf_data/cert_filename ISCB-5-CERT-C115-CERTIFICATE-v1.pdf NSCIB-CC-22-0428888-Cert.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-22-0428888: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0104: 1
    • BSI-CC-PP-0099-v2-2020: 1
    • BSI-CC-PP-0100-2018: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR.1: 1
    • ALC_FLR.3: 2
  • ASE:
    • ASE_TSS.2: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • SGS:
    • SGS: 1
    • SGS Brightsight: 1
pdf_data/cert_keywords/os_name
  • JCOP:
    • JCOP 6: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20210630131348Z
  • /Creator: Word
  • /ModDate: D:20210630215915+08'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 205722
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: kruitr
  • /CreationDate: D:20230105164924+01'00'
  • /Creator: Bullzip PDF Printer (11.0.0.2588)
  • /ModDate: D:20230105165008+01'00'
  • /Producer: PDF Printer / www.bullzip.com / FPG / TUV Rheinland Service GmbH
  • /Title: Microsoft Word - NSCIB-CC-22-0428888-Cert.doc
  • pdf_file_size_bytes: 247264
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C115-CR-v1.pdf NSCIB-CC-0428888-CR2-1.0.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-0428888-CR2
    • cert_item: NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1
    • cert_lab: SGS Brightsight B.V.
    • developer: NXP Semiconductors Germany GmbH
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C115-CR-v1: 35
  • NL:
    • CC-22-0258298: 1
    • NSCIB-CC-0428888-CR2: 19
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0099-2017: 1
    • BSI-CC-PP-0099-V2-2020: 1
    • BSI-CC-PP-0100-2018: 1
    • BSI-CC-PP-0104-2019: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 6
  • EAL:
    • EAL 5: 1
    • EAL4: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 3
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ADV:
    • ADV_IMP: 1
  • ALC:
    • ALC_DVS.2: 2
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.2: 2
  • ATE:
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 1
  • FIA:
    • FIA_AFL.1: 2
    • FIA_ATD.1: 5
    • FIA_SOS.1: 3
    • FIA_SOS.2: 2
    • FIA_UAU.1: 2
    • FIA_UID.1: 7
  • FMT:
    • FMT_MSA.1: 7
    • FMT_SMF.1: 3
    • FMT_SMR.1: 3
  • FTP:
    • FTP_ITC.1: 17
    • FTP_TRP.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.CLOUD: 1
    • A.CONNECTIVITY: 1
    • A.DDOS: 1
    • A.MALWARE: 1
    • A.THIRDPARTY: 1
    • A.TIMESTAMP: 1
    • A.TRUSTED_ADMIN: 1
    • A.TRUSTED_DEV: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 5
  • NXP:
    • NXP: 17
    • NXP Semiconductors: 3
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • SGS:
    • SGS: 3
    • SGS Brightsight: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 3
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • CBC-MAC: 3
      • CMAC: 2
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 1
      • TLSv1.2: 1
  • PACE:
    • PACE: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • ECB:
    • ECB: 3
  • GCM:
    • GCM: 2
  • XTS:
    • XTS: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library 2.2.0: 3
    • Crypto Library 2.3.1: 1
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
  • SCA:
    • side channel: 1
    • side-channel: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 1
    • JIL-AM: 2
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 6: 48
    • JCOP6: 7
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 20: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 3.0.5: 1
    • Java Card 3.1: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • or non-standard algorithms, protocols and implementations: OSCCA, MIFARE, and Felica, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20210629084408Z00'00'
  • /Creator: Word
  • /ModDate: D:20210629084408Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
  • pdf_file_size_bytes: 800031
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf NSCIB-CC-0428888-STLite_v1.8.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-21-0258298: 2
    • NSCIB-CC-0428888: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-CC-PP-0099-2017: 1
    • BSI-CC-PP-0099-v2-2020: 1
    • BSI-CC-PP-0100-2018: 1
    • BSI-CC-PP-0104: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 11
  • EAL:
    • EAL5: 8
    • EAL5 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 4
  • ASE:
    • ASE_CCL.1: 3
    • ASE_ECD: 1
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 3
    • ASE_REQ.2: 5
    • ASE_SPD.1: 3
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
  • ALC:
    • ALC_DVS.2: 4
    • ALC_FLR.1: 5
  • ASE:
    • ASE_INT: 2
    • ASE_REQ: 2
    • ASE_SPD: 2
    • ASE_TSS: 2
    • ASE_TSS.2: 4
  • AVA:
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 8
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_SOS.2: 5
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 6
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTP:
    • FTP_ITC.1: 5
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 13
    • FAU_ARP.1.1: 1
    • FAU_SAA.1: 2
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 2
  • FCO:
    • FCO_NRO: 2
    • FCO_NRO.1: 1
    • FCO_NRO.2: 6
    • FCO_NRO.2.1: 2
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 2
  • FCS:
    • FCS_CKM: 12
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 7
    • FCS_CKM.2: 2
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 3
    • FCS_CKM.5: 8
    • FCS_CKM.5.1: 5
    • FCS_COP: 12
    • FCS_COP.1: 31
    • FCS_COP.1.1: 33
    • FCS_RNG: 3
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 5
    • FDP_ACC.2: 10
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_DAU.2: 2
    • FDP_DAU.2.1: 2
    • FDP_ETC.2: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 22
    • FDP_IFC.2: 21
    • FDP_IFC.2.1: 3
    • FDP_IFC.2.2: 3
    • FDP_IFF: 2
    • FDP_IFF.1: 29
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 5
    • FDP_IFF.1.3: 5
    • FDP_IFF.1.4: 7
    • FDP_IFF.1.5: 4
    • FDP_ITC: 2
    • FDP_ITC.2: 9
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 2
    • FDP_RIP.1: 14
    • FDP_ROL.1: 8
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDC: 1
    • FDP_SDC.1: 2
    • FDP_SDC.1.1: 1
    • FDP_SDI: 5
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 1
    • FDP_UIT: 2
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_API: 4
    • FIA_API.1: 3
    • FIA_ATD.1: 5
    • FIA_UAU.1: 25
    • FIA_UAU.1.1: 5
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 13
    • FIA_UAU.4.1: 2
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 51
    • FIA_UID.1.1: 7
    • FIA_UID.1.2: 4
    • FIA_UID.2: 2
    • FIA_USB.1: 4
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 4
    • FMT_MSA.1: 53
    • FMT_MSA.1.1: 6
    • FMT_MSA.2: 3
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 46
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 6
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 3
    • FMT_MTD.3: 3
    • FMT_SAE: 1
    • FMT_SAE.1: 1
    • FMT_SAE.1.1: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 52
    • FMT_SMF.1.1: 6
    • FMT_SMR: 2
    • FMT_SMR.1: 59
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 3
  • FPR:
    • FPR_UNO.1: 6
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_EMS: 1
    • FPT_ESA: 1
    • FPT_ESA.1: 1
    • FPT_ESA.1.4: 1
    • FPT_FLS.1: 30
    • FPT_FLS.1.1: 3
    • FPT_ISA: 1
    • FPT_ISA.1: 2
    • FPT_ISA.1.5: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_RCV.3: 1
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_STM: 2
    • FPT_TCT: 1
    • FPT_TCT.1: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.2: 2
    • FPT_TIT: 1
    • FPT_TIT.1: 1
    • FPT_TST.1: 1
    • FPT_TST.1.1: 1
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 15
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 2
    • FTP_TST.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.CLOUD: 3
    • A.CONNECTIVITY: 4
    • A.DDOS: 3
    • A.MALWARE: 4
    • A.THIRDPARTY: 3
    • A.TIMESTAMP: 4
    • A.TRUSTED_ADMIN: 4
    • A.TRUSTED_DEV: 3
  • O:
    • O.SEC_ACCESS: 5
    • O.SEC_AUTHENTICATE: 5
    • O.SEC_COMMUNICATION: 5
    • O.SEC_PASSWORD_GENER: 1
    • O.SEC_PASSWORD_GENERATION: 3
  • OE:
    • OE.ADMINISTRATOR: 3
    • OE.ANTI_DDOS: 3
    • OE.ANTI_MALWARE: 3
    • OE.DEVELOPER: 3
    • OE.SAFE_CLOUD: 3
    • OE.SAFE_CONNECTIVITY: 3
    • OE.SYN_TIMESTAMP: 3
    • OE.THIRDPARTY: 3
  • T:
    • T.BROKEN_AUTH: 4
    • T.INTERCEPTION: 4
    • T.UNAUTHORIZED_AC: 1
    • T.UNAUTHORIZED_ACCESS: 2
    • T.WEAK_PASSWORD_: 1
    • T.WEAK_PASSWORD_GENE: 1
    • T.WEAK_PASSWORD_GENERATION: 1
  • A:
    • A.APPS-PROVIDER: 5
    • A.PROCESS-SEC-IC: 4
    • A.USE_DIAG: 5
    • A.USE_KEYS: 5
    • A.VERIFICATION-AU: 1
    • A.VERIFICATION-AUTHORITY: 4
  • D:
    • D.API_DATA: 1
    • D.APP_CODE: 2
    • D.APP_C_: 1
    • D.APP_C_DATA: 2
    • D.APP_I_DATA: 4
    • D.APP_KEYS: 6
    • D.APSD_KEYS: 5
    • D.ATTACK_COUNTER: 7
    • D.CARD_: 1
    • D.CARD_MNGT_DATA: 2
    • D.CONFIG_ITEM: 7
    • D.CRYPTO: 3
    • D.ISD_KEYS: 4
    • D.JCS_: 1
    • D.JCS_CODE: 5
    • D.JCS_DATA: 4
    • D.MODULE_CODE: 1
    • D.MODULE_DATA: 1
    • D.PIN: 8
    • D.SEC_DATA: 2
    • D.TOE_IDENTIFICATION: 2
    • D.TOE_IDENTIFIER: 3
    • D.UPDATE_IMAGE: 25
    • D.VASD_KEYS: 3
  • OE:
    • OE.APPLET: 1
    • OE.APPS-PROVIDER: 4
    • OE.CAP_FILE: 1
    • OE.CARD-MANAGEMENT: 2
    • OE.CODE-EVIDENCE: 2
    • OE.CONFID-UPDATE-: 1
    • OE.CONFID-UPDATE-IMAGE: 3
    • OE.IC: 3
    • OE.KEY-: 1
    • OE.KEY-CHANGE: 4
    • OE.PROCESS_SEC_: 1
    • OE.PROCESS_SEC_IC: 3
    • OE.RE: 7
    • OE.SCP: 18
    • OE.SECURITY-DOMA: 1
    • OE.SECURITY-DOMAINS: 3
    • OE.USE_DIAG: 5
    • OE.USE_KEYS: 5
    • OE.VERIFICATION: 3
    • OE.VERIFICATION-A: 1
    • OE.VERIFICATION-AUTHOR: 1
    • OE.VERIFICATION-AUTHORITY: 2
  • OP:
    • OP.MODIFY_: 1
    • OP.READ_CONFIG_: 1
    • OP.TRIGGER_: 1
    • OP.TRIGGER_UPDATE: 2
    • OP.USE_CONFIG_: 1
  • OSP:
    • OSP.KEY-CHANGE: 4
    • OSP.PROCESS-TOE: 4
    • OSP.SECURITY-DOM: 1
    • OSP.SECURITY-DOMAINS: 3
  • OT:
    • OT.ALARM: 4
    • OT.APPLI-AUTH: 5
    • OT.ARRAY_VIEWS_CONFID: 1
    • OT.ATTACK-COUNT: 1
    • OT.ATTACK-COUNTE: 1
    • OT.ATTACK-COUNTER: 3
    • OT.AUTH-LOAD-: 1
    • OT.AUTH-LOAD-UPD: 2
    • OT.AUTH-LOAD-UPDATE-IMAGE: 2
    • OT.CARD-: 1
    • OT.CARD-CONFIGUR: 2
    • OT.CARD-CONFIGURATION: 3
    • OT.CARD-MANAGEM: 3
    • OT.CARD-MANAGEMENT: 3
    • OT.CIPHER: 3
    • OT.COMM_: 5
    • OT.COMM_AUTH: 6
    • OT.COMM_CONFIDENTIALITY: 3
    • OT.COMM_INTEGRITY: 3
    • OT.CONFID-UPDATE-: 2
    • OT.CONFID-UPDATE-IMAGE: 3
    • OT.CRT-MNGT: 1
    • OT.DELETION: 2
    • OT.DOMAIN-RIGHTS: 7
    • OT.EXT-MEM: 1
    • OT.FIREWALL: 3
    • OT.GLOBAL_: 1
    • OT.GLOBAL_ARRAYS_CONFID: 1
    • OT.IDENTIFICATION: 6
    • OT.INSTALL: 2
    • OT.KEY-MNGT: 3
    • OT.LOAD: 2
    • OT.NATIVE: 1
    • OT.OPERATE: 5
    • OT.PIN-MNGT: 1
    • OT.REALLOCATION: 2
    • OT.REMOTE: 1
    • OT.RESOURCE: 1
    • OT.RESTRICTED-MO: 3
    • OT.RESTRICTED-MODE: 3
    • OT.RND: 4
    • OT.RNG: 1
    • OT.SCP: 24
    • OT.SECURE_AC_: 2
    • OT.SECURE_AC_ACTIVATION: 3
    • OT.SECURE_LOAD_: 4
    • OT.SECURE_LOAD_ACODE: 3
    • OT.SENSITIVE_RESULTS_INTEG: 1
    • OT.SID: 2
    • OT.TOE_: 2
    • OT.TOE_IDENTIFICATION: 3
    • OT.TRANSACTION: 2
  • SA:
    • SA.CONFID-UPDATE: 1
    • SA.CONFID-UPDATE-IMAGE: 1
    • SA.CONFIG-APPLET: 1
    • SA.INTEG-APPLI-DATA: 1
    • SA.INTEG-UPDATE-I: 1
    • SA.INTEG-UPDATE-IMAGE: 1
    • SA.OSU: 1
    • SA.RM: 1
    • SA.SCP: 3
  • T:
    • T.ATTACK-COUNTER: 3
    • T.COM_EXPLOIT: 4
    • T.CONFID-APPLI-DATA: 6
    • T.CONFID-JCS-CODE: 2
    • T.CONFID-JCS-DATA: 2
    • T.CONFID-UPDATE-I: 1
    • T.CONFID-UPDATE-IMAGE: 2
    • T.CONFIG: 4
    • T.DELETION: 4
    • T.EXE-: 1
    • T.EXE-CODE: 3
    • T.EXE-CODE-REMOTE: 1
    • T.INSTALL: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 3
    • T.INTEG-APPLI-DATA: 10
    • T.INTEG-JCS-CODE: 2
    • T.INTEG-JCS-DATA: 2
    • T.INTEG-UPDATE-IM: 1
    • T.INTEG-UPDATE-IMAGE: 3
    • T.INTERRUPT-OSU: 4
    • T.LIFE_CYCLE: 4
    • T.NATIVE: 2
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 3
    • T.RESOURCES: 1
    • T.RND: 3
    • T.SID: 4
    • T.UNAUTH-LOAD-UP: 1
    • T.UNAUTH-LOAD-UPDATE-IMAGE: 3
    • T.UNAUTHORIZED_: 1
    • T.UNAUTHORIZED_CARD_MNGT: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 7
  • Samsung:
    • Samsung: 4
  • NXP:
    • NXP: 341
    • NXP Semiconductors: 25
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 16
      • AES-: 1
      • AES-128: 1
      • AES-256: 16
  • DES:
    • 3DES:
      • 3DES: 3
      • Triple-DES: 1
      • TripleDES: 1
    • DES:
      • DES: 4
  • constructions:
    • MAC:
      • CBC-MAC: 2
      • CMAC: 10
      • HMAC: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 2
      • ECDHE: 3
    • ECDSA:
      • ECDSA: 10
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
    • RSA-CRT: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 3
      • SHA-384: 2
      • SHA-512: 2
    • SHA3:
      • SHA-3: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 3
      • TLSv1.2: 2
  • PACE:
    • PACE: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 8
    • RNG: 10
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • CCM:
    • CCM: 43
  • CFB:
    • CFB: 2
  • ECB:
    • ECB: 2
  • GCM:
    • GCM: 10
  • OFB:
    • OFB: 2
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP256r1: 9
    • brainpoolP384r1: 9
    • brainpoolP521r1: 9
  • NIST:
    • Curve P-256: 8
    • Curve P-384: 8
    • Curve P-521: 8
    • NIST P-256: 1
    • P-256: 9
    • P-384: 8
    • P-521: 8
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • SPA: 1
  • FI:
    • DFA: 2
    • Fault Injection: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • SPA: 1
    • physical probing: 2
    • side channel: 2
    • side-channel: 1
    • timing attack: 1
  • other:
    • JIL: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 1
    • JCOP 4: 1
    • JCOP 6: 184
    • JCOP6: 20
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 180-4: 1
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS 202-2015: 1
    • FIPS PUB 186-4: 30
  • PKCS:
    • PKCS1: 2
  • RFC:
    • RFC5639: 30
  • SCP:
    • SCP80: 1
    • SCP81: 1
  • X509:
    • X.509: 2
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 3.1: 1
pdf_data/st_keywords/javacard_api_const
  • ALG:
    • AES:
      • ALG_AES_BLOCK_128_CBC_NOPAD: 1
      • ALG_AES_BLOCK_128_CBC_NOPAD_: 1
      • ALG_AES_BLOCK_128_ECB_NOPAD: 1
      • ALG_AES_CBC_ISO9797_M2: 1
      • ALG_AES_CBC_ISO9797_M2_STANDARD: 1
      • ALG_AES_CBC_PKCS5: 1
      • ALG_AES_CMAC16: 1
      • ALG_AES_CMAC16_STANDARD: 1
      • ALG_AES_ECB_ISO9797_M2: 1
      • ALG_AES_ECB_PKCS5: 1
      • ALG_AES_XTS: 1
    • DES:
      • ALG_DES_CBC_ISO9797_M1: 1
      • ALG_DES_CBC_ISO9797_M2: 1
      • ALG_DES_CBC_NOPAD: 1
      • ALG_DES_CBC_PKCS5: 1
      • ALG_DES_CMAC8: 1
      • ALG_DES_ECB_ISO9797_M1: 1
      • ALG_DES_ECB_ISO9797_M2: 2
      • ALG_DES_ECB_NOPAD: 1
      • ALG_DES_ECB_PKCS5: 1
      • ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC4_ISO9797_M1: 1
      • ALG_DES_MAC4_ISO9797_M2: 1
      • ALG_DES_MAC4_PKCS5: 1
      • ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
      • ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
      • ALG_DES_MAC8_ISO9797_M1: 1
      • ALG_DES_MAC8_ISO9797_M2: 1
      • ALG_DES_MAC8_NOPAD: 1
      • ALG_DES_MAC8_PKCS5: 1
    • EC:
      • ALG_EC_SVDP_DH: 1
      • ALG_EC_SVDP_DHC: 1
      • ALG_EC_SVDP_DHC_KDF: 1
      • ALG_EC_SVDP_DHC_PLAIN: 1
      • ALG_EC_SVDP_DH_KDF: 1
      • ALG_EC_SVDP_DH_PLAIN: 1
      • ALG_EC_SVDP_DH_PLAIN_XY: 1
    • ECDSA:
      • ALG_ECDSA_SHA_224: 1
      • ALG_ECDSA_SHA_256: 2
      • ALG_ECDSA_SHA_384: 1
      • ALG_ECDSA_SHA_512: 1
    • HMAC:
      • ALG_HMAC_SHA_256: 1
      • ALG_HMAC_SHA_384: 1
      • ALG_HMAC_SHA_512: 1
    • MD:
      • ALG_MD5: 1
    • RSA:
      • ALG_RSA_NOPAD: 1
      • ALG_RSA_PKCS1: 1
      • ALG_RSA_PKCS1_OAEP: 1
      • ALG_RSA_SHA_224_PKCS1: 1
      • ALG_RSA_SHA_224_PKCS1_PSS: 1
      • ALG_RSA_SHA_256_PKCS1: 1
      • ALG_RSA_SHA_256_PKCS1_PSS: 1
      • ALG_RSA_SHA_384_PKCS1: 2
      • ALG_RSA_SHA_512_PKCS1: 1
      • ALG_RSA_SHA_512_PKCS1_PSS: 1
      • ALG_RSA_SHA_PKCS1: 1
    • SHA:
      • ALG_SHA_224: 1
      • ALG_SHA_256: 3
      • ALG_SHA_384: 2
      • ALG_SHA_512: 2
  • misc:
    • LENGTH_AES_128: 3
    • LENGTH_AES_192: 3
    • LENGTH_AES_256: 4
    • LENGTH_DES3_: 2
    • LENGTH_DES3_2KEY: 4
    • LENGTH_DES3_3KEY: 2
    • LENGTH_EC_FP_128: 1
    • LENGTH_EC_FP_192: 1
    • LENGTH_EC_FP_224: 2
    • LENGTH_EC_FP_256: 2
    • LENGTH_EC_FP_384: 2
    • LENGTH_EC_FP_521: 1
    • LENGTH_RSA_1024: 1
    • LENGTH_SHA: 1
    • LENGTH_SHA_224: 1
    • LENGTH_SHA_256: 2
    • LENGTH_SHA_384: 1
    • LENGTH_SHA_512: 2
    • PAD_PKCS1_OAEP: 1
    • SIG_CIPHER_AES_CMAC16: 1
    • SIG_CIPHER_DES_CMAC8: 1
    • SIG_CIPHER_ECDSA: 1
    • SIG_CIPHER_RSA: 1
pdf_data/st_keywords/javacard_packages
  • com:
    • com.felicanetworks.javacard.crypto.twopassauth: 1
    • com.nxp.id.jcop.globalplatform: 1
    • com.nxp.id.jcopx.accelerator: 1
    • com.nxp.id.jcopx.authority: 1
    • com.nxp.id.jcopx.blob: 1
    • com.nxp.id.jcopx.egovaccelerators: 1
    • com.nxp.id.jcopx.iar: 1
    • com.nxp.id.jcopx.m4mext: 1
    • com.nxp.id.jcopx.math: 1
    • com.nxp.id.jcopx.mifare.mifaredesfire: 1
    • com.nxp.id.jcopx.mifare.mifareplus: 1
    • com.nxp.id.jcopx.oscca: 1
    • com.nxp.id.jcopx.security: 1
    • com.nxp.id.jcopx.strongbox: 1
    • com.nxp.id.jcopx.uicc.auth: 1
    • com.nxp.id.jcopx.uicc.globalplatform: 1
    • com.nxp.id.jcopx.uicc.interfacebroker: 1
    • com.nxp.id.jcopx.uicc.interfacebroker.sim: 1
    • com.nxp.id.jcopx.uicc.interfacebroker.uicc: 1
    • com.nxp.id.jcopx.uicc.system: 1
    • com.nxp.id.jcopx.uicc.toolkit: 1
    • com.nxp.id.jcopx.util: 1
    • com.sec.mobile.fra: 1
    • com.sony.javacard.crypto: 1
    • com.sony.javacard.crypto.a4: 1
    • com.sony.javacard.crypto.a5: 1
    • com.sony.javacard.crypto.a6: 1
    • com.sony.javacard.crypto.advance: 1
    • com.sony.javacard.crypto.advance.e3: 1
    • com.sony.javacard.crypto.advance.e4: 1
  • de:
    • de.bsi.csp: 1
  • java:
    • java.io: 1
    • java.lang: 1
  • javacard:
    • javacard.crypto: 4
    • javacard.crypto.advance: 3
    • javacard.crypto.twopassauth: 1
    • javacard.framework: 1
    • javacard.security: 1
  • javacardx:
    • javacardx.apdu: 1
    • javacardx.crypto: 1
    • javacardx.framework.time: 1
    • javacardx.framework.util.intx: 1
    • javacardx.security: 1
    • javacardx.security.cert: 3
    • javacardx.security.derivation: 1
    • javacardx.security.util: 1
  • org:
    • org.globalplatform: 1
    • org.globalplatform.contactless: 1
    • org.globalplatform.upgrade: 1
    • org.mifare4mobile: 1
    • org.mifare4mobile.hostinterface: 1
    • org.mifare4mobile.parser: 1
    • org.mifare4mobile.userverifier: 1
  • uicc:
    • uicc.access: 1
    • uicc.access.bertlvfile: 1
    • uicc.access.fileadministration: 1
    • uicc.auth: 1
    • uicc.globalplatform: 1
    • uicc.hci.framework: 1
    • uicc.hci.services.cardemulation: 1
    • uicc.hci.services.cltobserver: 1
    • uicc.hci.services.connectivity: 1
    • uicc.hci.services.readermode: 1
    • uicc.interfacebroker: 1
    • uicc.interfacebroker.sim: 1
    • uicc.interfacebroker.uicc: 1
    • uicc.isim.access: 1
    • uicc.services.highupdatearray: 1
    • uicc.system: 2
    • uicc.toolkit: 2
    • uicc.usim.access: 1
    • uicc.usim.geolocation: 1
    • uicc.usim.suci: 1
    • uicc.usim.toolkit: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
    • environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
    • infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
    • inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
    • out of scope: 5
    • together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
pdf_data/st_metadata
  • /Author: CLAIREHYC
  • /CreationDate: D:20210701124256+08'00'
  • /Creator: PDFCreator Free 4.2.0
  • /Keywords:
  • /ModDate: D:20210701124256+08'00'
  • /Producer: GPL Ghostscript 9.52
  • /Subject:
  • /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
  • pdf_file_size_bytes: 1022047
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: NXP B.V.
  • /CreationDate: D:20221128141941Z
  • /Creator: DITA Open Toolkit 3.3.1
  • /Keywords: Common Criteria, Security Target, NXP JCOP 6.2 on SN220 Secure Element
  • /ModDate: D:20221128142132-00'00'
  • /Producer: Apache FOP Version 2.3
  • /Subject: NXP JCOP 6.2 on SN220 Secure Element
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1224622
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 126
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different