| name |
Stationäres eHealth-Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0 |
NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2, JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
NL |
| status |
active |
active |
| not_valid_after |
16.10.2030 |
29.08.2030 |
| not_valid_before |
16.10.2025 |
29.08.2025 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500053-01_Cert.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500053-01_CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0519V6b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EUCC-3110-2025-08-2500053-01_ST_lite.pdf |
| manufacturer |
Worldlline Healthcare GmbH |
NXP Semiconductors Netherlands N.V. |
| manufacturer_web |
https://de.worldline.com |
https://www.nxp.com |
| security_level |
ALC_TAT.1, ADV_FSP.4, ADV_TDS.3, ADV_IMP.1, AVA_VAN.4, EAL3+ |
ALC_FLR.2, EAL4, ALC_DVS.2, AVA_VAN.5 |
| dgst |
c9f1e8cb1664943f |
3123fc5313b0e375 |
| heuristics/cert_id |
BSI-DSZ-CC-0519-V6-2025 |
NSCIB-CC-3110-2025-08-2500053-01-CR |
| heuristics/cert_lab |
BSI |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ADV_FSP.4, AVA_VAN.4, ADV_TDS.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, ALC_CMS.3, AGD_PRE.1, ALC_DVS.1, ASE_TSS.1, ADV_IMP.1, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2 |
ALC_DEL.1, ATE_FUN.1, ALC_CMS.4, AVA_VAN.5, ASE_INT.1, ALC_COMP.1, ADV_FSP.4, ADV_TDS.3, ATE_COMP.1, AGD_OPE.1, ADV_COMP.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, ASE_SPD.1, ATE_IND.2, AVA_COMP.1, ALC_CMC.4, ALC_TAT.1, ATE_DPT.1, ASE_ECD.1, AGD_PRE.1, ALC_FLR.2, ADV_IMP.1, ALC_DVS.2, ALC_LCD.1, ASE_OBJ.2 |
| heuristics/extracted_versions |
1.2.0, 2.0.0, 3.9.2 |
8.2, 9.0, 8.1, 8.0, 1.39.0.2, 1.07.0.2, 1.06.0.2, 9.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0519-V5-2024 |
NSCIB-CC-2200030-02-CR |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0519-V3-2021, BSI-DSZ-CC-0519-V5-2024, BSI-DSZ-CC-0519-V4-2022 |
NSCIB-CC-2200030-02-CR |
| heuristics/scheme_data |
- category: eHealth
- cert_id: BSI-DSZ-CC-0519-V6-2025
- certification_date: 16.10.2025
- enhanced:
- applicant: Worldlline Healthcare GmbH Konrad-Zuse-Ring 1 24220 Flintbek
- assurance_level: EAL3+,AVA_VAN.4,ALC_TAT.1,ADV_TDS.3,ADV_IMP.1,ADV_FSP.4
- cert_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6c_pdf.pdf?__blob=publicationFile&v=3
- certification_date: 16.10.2025
- description: The Target of Evaluation (TOE) is a smart card terminal ORGA 6141 online Version 3.7.2:1.2.0. It fulfils the IT security requirements to be used with the German electronic Health Card (eHC) and the German Health Professional Card (HPC) based on the regulations of the German healthcare system.
- entries: [frozendict({'id': 'BSI', 'description': 'Management'}), frozendict({'id': 'BSI-DSZ-CC-0519-V6-2025 (16.10.2025)', 'description': 'Zertifizierungsreport / Certification Report Sicherheitsvorgaben / Security Target Zertifikat / Certificate'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI-DSZ-CC-0519-V5-2024 (24.09.2024)', 'description': 'Management'}), frozendict({'id': 'BSI-DSZ-CC-0519-V4-2022-MA-01 (04.04.2023) Maintenancereport / Maintenance Report Sicherheitsvorgaben / Security Target Folgende Änderungen waren im Fokus dieser Re-Evalauierung: Updates von Open-Sopurce-Komponenten, Fehlerbehebung im TOE und die Erweiterung des Produkts um die Remote Management Schnittstelle als zweite Adiminstrationsschnittstelle, die eingabe der SMC-B PIN über diese Remote Management Schnittstelle sowie die VPN Authentifizierung via PSK und EAP-TLS. Following changes on the evaluated product have been in the focus of this re-evaluation: Update of open-source components, Bug fixing for the TOE, Product expansion, Remote Management Interface as second administration interface, SMC-B PIN entry via the Remote Management Interface and VPN authentication method PSK and EAP-TLS.', 'description': 'Firmware'}), frozendict({'id': 'BSI', 'description': 'Management'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI', 'description': 'Maintenance Report'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change compared to 0519-V2-2018.'}), frozendict({'id': 'BSI', 'description': 'online'}), frozendict({'id': 'BSI', 'description': 'The certified product itself did not change compared to 0519-V2-2018.'}), frozendict({'id': 'BSI', 'description': 'Certificate'})]
- evaluation_facility: TÜV Informationstechnik GmbH
- expiration_date: 15.10.2030
- product: ORGA 6141 online V3.9.2:1.2.0/3.9.2:2.0.0
- protection_profile: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT) Version 3.7, BSI-CC-PP-0032-V2-2015-MA-01, 22 May 2017
- report_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6a_pdf.pdf?__blob=publicationFile&v=3
- target_link: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte05/0519V6b_pdf.pdf?__blob=publicationFile&v=3
- product: ORGA 6141 online V3.9.2:1.2.0/3.9.2:2.0.0
- subcategory: Card reader
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Gesundheitswesen_Kartenlesegeraete/0519.html
- vendor: Worldlline Healthcare GmbH
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
BSI-DSZ-CC-0519 |
NSCIB-CC-2200030-02-CR |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-0519 |
NSCIB-CC-2200030-02-CR |
| heuristics/protection_profiles |
{} |
fdb8a517d5d22602, 5a8556c83f510b57 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V3b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100V2b_pdf.pdf |
| pdf_data/cert_filename |
0519V6c_pdf.pdf |
EUCC-3110-2025-08-2500053-01_Cert.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0519-V6-2025: 1
|
- NL:
- EUCC-3110-2025-08-2500053-01: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V3-2024: 1
- BSI-CCPP-0100-V2-2025: 1
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 3: 1
- EAL 3 augmented: 1
- EAL 4: 1
|
- EAL:
- EAL2: 1
- EAL4: 1
- EAL4 augmented: 1
|
| pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- ALC:
- AVA:
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
| pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408-1: 1
- ISO/IEC 18045:2022: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
0519V6a_pdf.pdf |
EUCC-3110-2025-08-2500053-01_CR.pdf |
| pdf_data/report_frontpage |
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 augmented by ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_TAT.1 and AVA_VAN.4 valid until: 15 October 2030
- cc_version: PP conformant
- cert_id: BSI-DSZ-CC-0519-V6-2025
- cert_item: Stationäres eHealth Kartenterminal ORGA 6141 online Version 3.9.2:1.2.0 / 3.9.2:2.0.0
- cert_lab: BSI
- developer: Worldline Healthcare GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), BSI-CC-PP-0032-V3- 2023, 15.12.2022
- NL:
|
- DE:
- NL:
- cert_id: EUCC-3110-2025-08-2500053-01-CR
- cert_item: NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2, JCOP 8.2 R1.06.0.2, JCOP 9.1 R1.07.0.2
- cert_lab: TÜV Informationstechnik GmbH
- developer: NXP Semiconductors Netherlands N.V
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0519-V5-2024: 2
- BSI-DSZ-CC-0519-V6-2025: 12
- NL:
|
- NL:
- EUCC-3110-2025-08-2500053-01: 1
- NSCIB-2200030-02-CR: 1
- NSCIB-CC-2200030-02: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0032-V3-: 1
- BSI-CC-PP-0032-V3-2023: 3
|
- BSI:
- BSI-CC-PP- 0100-V2-2025: 1
- BSI-CC-PP-0099-V3-2024: 1
- BSI-CCPP-0100-V2-2025: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 3 augmented: 3
- EAL 4: 4
- EAL3+: 1
|
- EAL:
- EAL 4: 2
- EAL 4 augmented: 2
- EAL4: 9
- EAL4 augmented: 9
- EAL4+: 1
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.4: 4
- ADV_IMP.1: 4
- ADV_TDS.3: 4
- ALC:
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_COMP.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_COMP.1: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 12
- ALC_FLR.2: 11
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_SPD.1: 1
- ATE:
- ATE_COMP.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_COMP.1: 1
- AVA_VAN: 1
- AVA_VAN.5: 15
|
| pdf_data/report_keywords/cc_sfr |
- FCS:
- FCS_CKM.1.1: 10
- FCS_COP: 2
- FCS_COP.1: 1
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.APPS-PROVIDER: 2
- A.APPSPROVIDER: 1
- A.PROCESS-SEC-IC: 2
- A.TRUSTED-GUESTOS: 2
- A.USE_DIAG: 2
- A.USE_KEYS: 2
- A.VERIFICATION-AUTHORITY: 3
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 20
- NXP Semiconductors: 5
|
| pdf_data/report_keywords/eval_facility |
- TUV:
- TÜV Informationstechnik: 3
|
- DeutscheTelekom:
- Deutsche Telekom Security: 1
- TUV:
- TÜV Informationstechnik: 4
|
| pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 1
- AES-128: 2
- AES-256: 2
- HPC:
|
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
- NIST:
- secp256r1: 1
- secp384r1: 1
- secp512r1: 1
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_RSA_WITH_AES_12: 1
- TLS_DHE_RSA_WITH_AES_128: 3
- TLS_DHE_RSA_WITH_AES_25: 1
- TLS_DHE_RSA_WITH_AES_256: 2
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-COMP: 1
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
- JCOP:
- JCOP 8: 84
- JCOP 9: 46
- JCOP9: 1
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- AIS 1: 1
- AIS 32: 1
- AIS 38: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- PKCS:
- RFC:
- RFC3526: 1
- RFC4492: 3
- RFC5246: 8
- RFC5289: 4
- RFC5639: 1
- RFC7027: 1
- RFC7251: 1
- RFC8422: 1
- X509:
|
- BSI:
- ISO:
- ISO/IEC 17025: 2
- ISO/IEC 17065: 2
|
| pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 15.12.2022 [8] SVN List (Configlist SW), 2025-07-24, Worldline Healthcare GmbH (confidential document) [9] Datensatz PDXpert (Configlist HW), Version 3.9.0, 2024-07-09, Worldline Healthcare GmbH: 1
- 6] Evaluation Technical Report (ETR Summary), Version 1, 2025-10-08, TÜV Informationstechnik GmbH (confidential document) [7] Common Criteria Protection Profile Electronic Health Card Terminal (eHCT), BSI-: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
- OutOfScope:
- algorithms, protocols and implementations: ECDAA, Korean SEED, MIFARE and FeliCa, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have: 1
- out of scope: 1
|
| pdf_data/report_metadata |
- /Author: Federal Office for Information Security
- /Keywords: Common Criteria, Certification, Zertifizierung, eHealth, Kartenterminal, Worldline
- /Subject: Common Criteria, Certification, Zertifizierung, eHealth, Kartenterminal, Worldline
- /Title: Certification Report BSI-DSZ-CC-0519-V6-2025
- pdf_file_size_bytes: 365567
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/dok/Zertifizierung-Gesamtlisten, https://www.bsi.bund.de/AIS, https://www.sogis.eu/, http://www.commoncriteriaportal.org/cc/
- pdf_is_encrypted: False
- pdf_number_of_pages: 24
|
|
| pdf_data/st_filename |
0519V6b_pdf.pdf |
EUCC-3110-2025-08-2500053-01_ST_lite.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0032: 1
- BSI-CC-PP-0032-: 1
- BSI-CC-PP-0032-V3-2023: 1
- BSI-CC-PP-0046: 1
- BSI-CC-PP-0082: 1
- BSI-CC-PP-0098: 1
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V3-2024: 2
- BSI-CC-PP-0100-V2-2025: 1
- BSI-PP-0084: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL 3 augmented: 2
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 2
|
- EAL:
- EAL4: 5
- EAL4 augmented: 3
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 5
- ADV_IMP.1: 6
- ADV_TDS.3: 4
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- AGD:
- ALC:
- ALC_DVS.2: 3
- ALC_FLR.2: 3
- ASE:
- ASE_CCL: 2
- ASE_ECD: 1
- ASE_INT: 2
- ASE_REQ: 3
- ASE_SPD: 2
- ASE_TSS: 2
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 23
- FCS_CKM.1: 14
- FCS_CKM.2: 4
- FCS_CKM.4: 36
- FCS_CKM.4.1: 1
- FCS_COP: 54
- FCS_COP.1: 10
- FDP:
- FDP_ACC: 31
- FDP_ACC.1: 12
- FDP_ACF: 26
- FDP_ACF.1: 15
- FDP_IFC: 24
- FDP_IFC.1: 12
- FDP_IFF: 24
- FDP_IFF.1: 17
- FDP_ITC.1: 15
- FDP_ITC.2: 12
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 18
- FIA_AFL.1: 5
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 10
- FIA_SOS.1.1: 1
- FIA_UAU.1: 15
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 45
- FMT_MSA.1: 8
- FMT_MSA.2: 10
- FMT_MSA.2.1: 1
- FMT_MSA.3: 15
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 24
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_ITT.1: 9
- FPT_ITT.1.1: 1
- FPT_PHP.1: 10
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FPT_TST.1: 12
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 4
- FTP_TRP: 9
- FTP_TRP.1: 3
|
- FAU:
- FAU_ARP.1: 14
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAS: 4
- FAU_SAS.1: 8
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 6
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM.1: 18
- FCS_CKM.1.1: 5
- FCS_CKM.2: 6
- FCS_CKM.2.1: 2
- FCS_CKM.3: 3
- FCS_CKM.3.1: 1
- FCS_CKM.5: 9
- FCS_CKM.6: 7
- FCS_CKM.6.1: 5
- FCS_CKM.6.2: 4
- FCS_COP.1: 12
- FCS_COP.1.1: 18
- FCS_RBG.1: 1
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FCS_RNG.2: 1
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 53
- FDP_ACC.1.1: 2
- FDP_ACC.2: 24
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 4
- FDP_ACF: 1
- FDP_ACF.1: 40
- FDP_ACF.1.1: 7
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 9
- FDP_IFC: 2
- FDP_IFC.1: 46
- FDP_IFC.1.1: 2
- FDP_IFC.2: 24
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 3
- FDP_IFF: 3
- FDP_IFF.1: 37
- FDP_IFF.1.1: 5
- FDP_IFF.1.2: 7
- FDP_IFF.1.3: 7
- FDP_IFF.1.4: 7
- FDP_IFF.1.5: 6
- FDP_ITC: 1
- FDP_ITC.1: 9
- FDP_ITC.2: 17
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 2
- FDP_RIP.1: 66
- FDP_RIP.1.1: 9
- FDP_ROL.1: 15
- FDP_ROL.1.1: 2
- FDP_ROL.1.2: 3
- FDP_SDI.1: 2
- FDP_SDI.2: 8
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 6
- FIA_ATD.1.1: 2
- FIA_UAU.1: 19
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 3
- FIA_UAU.4: 9
- FIA_UAU.4.1: 3
- FIA_UID: 1
- FIA_UID.1: 61
- FIA_UID.1.1: 7
- FIA_UID.1.2: 5
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB.1: 4
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MSA: 7
- FMT_MSA.1: 75
- FMT_MSA.1.1: 11
- FMT_MSA.2: 3
- FMT_MSA.2.1: 2
- FMT_MSA.3: 71
- FMT_MSA.3.1: 11
- FMT_MSA.3.2: 10
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_MTD.3: 5
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_SMF: 3
- FMT_SMF.1: 75
- FMT_SMF.1.1: 8
- FMT_SMR: 2
- FMT_SMR.1: 96
- FMT_SMR.1.1: 7
- FMT_SMR.1.2: 7
- FPR:
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS.1: 3
- FPT_EMS.1.1: 3
- FPT_FLS.1: 34
- FPT_FLS.1.1: 8
- FPT_PHP.3: 4
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 5
- FPT_RCV.3.1: 2
- FPT_RCV.3.2: 2
- FPT_RCV.3.3: 2
- FPT_RCV.3.4: 1
- FPT_TDC.1: 5
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 2
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 15
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 2
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.CONNECTOR: 3
- A.ENV: 6
- A.PUSH_SERV: 1
- A.PUSH_SERVER: 3
- A.SAC: 6
- A.SM: 5
- O:
- O.-: 1
- O.AC-: 1
- O.ACCESS_-: 2
- O.ACCESS_CONTROL: 7
- O.MANAGEMENT: 8
- O.PIN_ENTRY: 6
- O.PROTEC-: 1
- O.PROTECTION: 7
- O.SECURE_CHANNEL: 4
- O.STATE: 8
- OE:
- OE.AD-: 1
- OE.ADMIN: 5
- OE.CONNECTOR: 7
- OE.ENV: 14
- OE.PUSH_SERVER: 2
- OE.SAC: 10
- OE.SM: 4
- OSP:
- T:
- T.COM: 3
- T.DATA: 3
- T.F-CON-: 1
- T.F-CONNECTOR: 2
- T.F-SAC: 7
- T.PIN: 6
|
- A:
- A.APPS-PROVIDER: 5
- A.CAP_FILE: 3
- A.DELETION: 1
- A.PROCESS-SEC-IC: 4
- A.TRUSTED-GUESTOS: 4
- A.USE_DIAG: 5
- A.USE_KEYS: 5
- A.VERIFICATION: 2
- A.VERIFICATION-: 1
- A.VERIFICATION-AUTHORITY: 4
- D:
- D.API_DATA: 3
- D.APP_: 1
- D.APP_CODE: 6
- D.APP_C_: 1
- D.APP_C_DATA: 4
- D.APP_I_: 1
- D.APP_I_DATA: 6
- D.APP_KEYS: 7
- D.APSD_KEYS: 4
- D.CARD_MNGT_DATA: 3
- D.CONFIG_ITEM: 7
- D.CRYPTO: 4
- D.ISD_KEYS: 4
- D.JCS_CODE: 6
- D.JCS_DATA: 9
- D.PIN: 9
- D.PROFILE_: 1
- D.RESTRICTED_MODE_: 1
- D.RESTRICTED_MODE_STATE: 1
- D.SEC_: 1
- D.SEC_DATA: 5
- D.TOE_: 1
- D.TOE_IDENTIFICATION: 1
- D.TOE_IDENTIFIER: 3
- D.UPDATE_: 1
- D.UPDATE_IMAGE: 25
- D.VASD_KEYS: 3
- O:
- O.APPLET: 14
- O.APPLET_: 1
- O.APPLET_CURRENT: 1
- O.APPLET_LOADED: 2
- O.BIO-MNGT: 1
- O.CODE_CAP_: 1
- O.CODE_CAP_FILE: 11
- O.DELETION: 3
- O.EXT-MEM: 1
- O.INSTALL: 2
- O.JAVAOBJECT: 57
- O.LOAD: 3
- O.REMOTE: 1
- O.SENSITIVE_ARRAYS_INTEG: 1
- O.SENSITIVE_RESULTS_INTEG: 1
- OE:
- OE.APPS-PROVIDER: 4
- OE.CAP_FILE: 5
- OE.CARD-MANAGEMENT: 3
- OE.CODE-: 1
- OE.CODE-EVIDENCE: 12
- OE.CONFID-UPDATE-: 2
- OE.CONFID-UPDATE-IMAGE: 2
- OE.IC: 3
- OE.KEY-CHANGE: 5
- OE.PROCESS_SEC_IC: 4
- OE.RE: 7
- OE.SCP: 16
- OE.SECURITY-DOMAINS: 4
- OE.TRUSTED-GUESTOS: 4
- OE.USE_DIAG: 5
- OE.USE_KEYS: 5
- OE.VERIFICATION: 17
- OE.VERIFICATION-: 2
- OE.VERIFICATION-AUTHORITY: 2
- OP:
- OP.ARRAY_: 1
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 3
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CONT_ACCESS: 7
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_FILE: 3
- OP.DELETE_CAP_FILE_: 1
- OP.DELETE_CAP_FILE_APPLET: 2
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MODIFY_CONFIG_ITEM: 1
- OP.PUT: 6
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.READ_CONFIG_ITEM: 1
- OP.THROW: 5
- OP.TRIGGER_UPDATE: 4
- OP.TYPE_ACCESS: 5
- OP.USE_CONFIG_ITEM: 1
- OSP:
- OSP.KEY-CHANGE: 4
- OSP.PROCESS-TOE: 4
- OSP.SECURITY-DOMAINS: 4
- OSP.VERIFICATION: 2
- OT:
- OT.ALARM: 14
- OT.APPLI-AUTH: 8
- OT.ARRAY_VIEWS_CONFID: 2
- OT.ARRAY_VIEWS_INTEG: 2
- OT.ARRAY_VIEW_CONFID: 1
- OT.ARRAY_VIEW_INTEG: 1
- OT.ATTACK-COUNTER: 5
- OT.AUTH-LOAD-UPDATE-: 2
- OT.AUTH-LOAD-UPDATE-IMAGE: 3
- OT.CARD-CONFIGURATION: 5
- OT.CARD-MANAGEMENT: 22
- OT.CIPHER: 4
- OT.COMM_: 2
- OT.COMM_AUTH: 6
- OT.COMM_CONFIDENTIALITY: 3
- OT.COMM_INTEGRITY: 6
- OT.CONFID-UPDATE-: 2
- OT.CONFID-UPDATE-IMAGE: 3
- OT.CONT-DOS: 1
- OT.CONT-PRIV: 1
- OT.CONT-SEP: 1
- OT.CONT_DOS: 4
- OT.CONT_PRIV: 6
- OT.CONT_SEP: 8
- OT.DELETION: 1
- OT.DOMAIN-RIGHTS: 7
- OT.FIREWALL: 10
- OT.GLOBAL_ARRAYS_: 6
- OT.GLOBAL_ARRAYS_CONFID: 1
- OT.GLOBAL_ARRAYS_INTEG: 1
- OT.IDENTIFICATION: 5
- OT.INSTALL: 1
- OT.INTERNALSECURE-: 1
- OT.KEY-MNGT: 4
- OT.LOAD: 1
- OT.NATIVE: 6
- OT.OBJ-DELETION: 3
- OT.OPERATE: 20
- OT.PIN-MNGT: 4
- OT.REALLOCATION: 4
- OT.RESOURCES: 5
- OT.RESTRICTED-MODE: 6
- OT.RND: 5
- OT.SCP: 34
- OT.SECURE-CHANNELS: 1
- OT.SECURE_AC_: 2
- OT.SECURE_AC_ACTIVATION: 3
- OT.SECURE_LOAD_: 1
- OT.SECURE_LOAD_ACODE: 6
- OT.SENSITIVE_RESULTS_: 2
- OT.SENSITIVE_RESULTS_INTEG: 3
- OT.SID: 8
- OT.TOE_IDENTIFICATION: 5
- OT.TRANSACTION: 4
- R:
- SA:
- SA.ALARM: 2
- SA.CARD-MANAGEMENT: 1
- SA.CIPHER: 2
- SA.CONFID-APPLI-DATA: 2
- SA.CONFID-JCS-CODE: 1
- SA.CONFID-JCS-DATA: 2
- SA.CONFID-UPDATE-: 1
- SA.CONFID-UPDATE-IMAGE: 1
- SA.CONFIG-APPLET: 1
- SA.CONTEXT-SEPARATION: 1
- SA.DELETION: 1
- SA.EXE-APPLI-CODE: 3
- SA.EXE-JCS-: 1
- SA.EXE-JCS-CODE: 2
- SA.FIREWALL: 2
- SA.INSTALL: 1
- SA.INTEG-APPLI-CODE: 3
- SA.INTEG-APPLI-DATA: 2
- SA.INTEG-JCS-CODE: 2
- SA.INTEG-JCS-DATA: 1
- SA.INTEG-UPDATE-IMAGE: 2
- SA.KEY-: 1
- SA.KEY-MNGT: 1
- SA.NATIVE: 3
- SA.OBJ-DELETION: 2
- SA.OPERATE: 1
- SA.OSU: 1
- SA.PIN-MNGT: 2
- SA.RESOURCES: 2
- SA.RM: 1
- SA.SCP: 5
- SA.SID: 3
- SA.TRANSACTION: 1
- SA.VERIFICATION: 3
- T:
- T.COM_EXPLOIT: 4
- T.CONFID-APPLI-DATA: 5
- T.CONFID-CONT: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.CONFID-UPDATE-IMAGE: 4
- T.CONFIG: 4
- T.CONT-DOS: 4
- T.CONT-SID: 4
- T.DELETION: 3
- T.EXE-CODE: 7
- T.EXE-CODE-REMOTE: 1
- T.EXE-CONT: 4
- T.INSTALL: 3
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 8
- T.INTEG-APPLI-DATA: 12
- T.INTEG-CODE: 1
- T.INTEG-CONT: 3
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.INTEG-UPDATE-IMAGE: 4
- T.INTERRUPT-OSU: 4
- T.LIFE_CYCLE: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 2
- T.PHYSICAL: 2
- T.RESOURCES: 3
- T.RESTRICTED-: 1
- T.RESTRICTED-MODE: 3
- T.RND: 5
- T.SID: 8
- T.UNAUTH-LOAD-UPDATE-: 1
- T.UNAUTH-LOAD-UPDATE-IMAGE: 3
- T.UNAUTHORIZED_CARD_: 1
- T.UNAUTHORIZED_CARD_MNGT: 3
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 625
- NXP Semiconductors: 24
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 7
- AES128: 1
- AES256: 1
- HPC:
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 1
- TDES: 2
- Triple-DES: 4
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 3
- HMAC: 10
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 3
- SHA-512: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- XTS:
|
| pdf_data/st_keywords/ecc_curve |
- Brainpool:
- brainpoolP256r1: 1
- brainpoolP384r1: 2
- NIST:
|
- Brainpool:
- Curve:
- Edwards:
- NIST:
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ..................................................10: 1
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Fault Injection: 1
- Physical Tampering: 2
- malfunction: 2
- physical tampering: 2
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 2
- other:
|
| pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI 7500: 1
- BSI TR-03120: 2
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
- JCOP:
- JCOP 8: 421
- JCOP 9: 49
- JCOP8: 9
- JCOP9: 14
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- ISO:
- PKCS:
- RFC:
- RFC3268: 3
- RFC5246: 1
- RFC5289: 3
- RFC7251: 2
- X509:
|
- BSI:
- AIS 20: 2
- AIS20: 2
- AIS31: 1
- CC:
- CCMB-2022-11-001: 2
- CCMB-2022-11-002: 2
- CCMB-2022-11-003: 2
- CCMB-2022-11-004: 2
- CCMB-2022-11-005: 2
- CCMB-2022-11-006: 2
- FIPS:
- FIPS 140-3: 1
- FIPS 197: 2
- FIPS PUB 186-3: 1
- ISO:
- RFC:
- RFC 5639: 1
- RFC 7748: 1
- RFC 8032: 1
- SCP:
- SCP03: 1
- SCP80: 1
- SCP81: 1
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- JC3.1: 1
- Java Card 3.1: 1
|
| pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 2
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_ISO9797_M2_STANDARD: 1
- ALG_AES_CBC_ISO9797_STANDARD: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_CBC_PKCS7: 2
- ALG_AES_CFB: 1
- ALG_AES_CMAC16: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_CMAC8: 1
- ALG_AES_CMAC_128: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_ECB_PKCS7: 2
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_CBC_PKCS7: 1
- ALG_DES_CMAC8: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_ECB_PKCS7: 1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 2
- ECDSA:
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_ISO9796_MR: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 3
- ALG_SHA_384: 3
- ALG_SHA_512: 3
- XDH:
- curves:
- misc:
- LENGTH_AES_128: 4
- LENGTH_AES_192: 4
- LENGTH_AES_256: 4
- LENGTH_DES3_2KEY: 4
- LENGTH_DES3_3KEY: 4
- LENGTH_EC_FP_128: 2
- LENGTH_EC_FP_160: 1
- LENGTH_EC_FP_192: 2
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 3
- LENGTH_EC_FP_384: 1
- LENGTH_EC_FP_528: 2
- LENGTH_RSA_1024: 1
- LENGTH_SHA: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 2
- LENGTH_SHA_384: 1
- LENGTH_SHA_512: 2
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_AES_CMAC128: 1
- SIG_CIPHER_AES_CMAC16: 1
- SIG_CIPHER_AES_CMAC8: 1
- SIG_CIPHER_DES_CMAC8: 1
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
|
| pdf_data/st_keywords/javacard_packages |
|
- com:
- com.nxp.id.jcopx.security: 1
- java:
- javacard:
- javacard.framework: 1
- javacard.security: 3
- javacardx:
- javacardx.crypto: 1
- javacardx.security: 1
- org:
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Keywords: ORGA 6141, online;Security, Target;Sicherheitsvorgaben
- /Subject: Security Target ORGA 6141 online
- /Title: Common-Criteria 3.1-Document
- pdf_file_size_bytes: 1835805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 66
|
- /Author: NXP B.V.
- /CreationDate: D:20250826111917+02'00'
- /Creator: DITA Open Toolkit 3.7 - NDF 08012025
- /Keywords: NXP, ASE, JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL4 augmented
- /Producer: Apache FOP Version 2.6
- /Subject: NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Series - Secure Element
- /Title: Security Target Lite
- pdf_file_size_bytes: 1112467
- pdf_hyperlinks: mailto:[email protected], https://www.nxp.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 163
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |