This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 BSI-DSZ-CC-0973-V2-2016 |
S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Revision 1 & 2) ANSSI-CC-2019/22 |
|
---|---|---|
name | NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software --- The certificate comprises four major configurations with two different EAL levels. For details see the ST. P6022P/X VB: EAL6 augmented by ALC_FLR.1, ASE_TSS.2 P6022M/D/J VB: EAL 5 augmented by AVA_VAN.5, ALC_DVS.2, ASE_TSS.2 | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software (Revision 1 & 2) |
not_valid_before | 2016-10-11 | 2019-05-13 |
not_valid_after | 2021-10-11 | 2024-05-13 |
scheme | DE | FR |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973V2b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-22fr.pdf |
manufacturer | NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity | Samsung Electronics Co., Ltd. |
manufacturer_web | https://www.nxp.com | https://www.samsung.com |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0973V2a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019-22fr.pdf |
state/report/pdf_hash | 052f73d525607b99d226263203b8fe795051fbb8cefd76104f0f903ccf524c72 | bf4096c62e59769d5cadddc47f5135e3127d4e8a12e41a8b7e9260451b8ec6ed |
state/report/txt_hash | 0cc5786a58105372dc2412cf2e10e72a8bc15a41491f706651056b1bcf214c57 | d828d1eb1dcb295dadf75014efa2a41546865258b7d0af1c104e6ce1c2637bdf |
state/st/pdf_hash | 7219d7a2224b312ce746075874113349d0d1e8cfd5b4813a11380f2afb8ffa78 | bf4096c62e59769d5cadddc47f5135e3127d4e8a12e41a8b7e9260451b8ec6ed |
state/st/txt_hash | 8770273c851f45d92942a55366a87b11757985ce578572e639ebcba897ac3de4 | d828d1eb1dcb295dadf75014efa2a41546865258b7d0af1c104e6ce1c2637bdf |
heuristics/cert_id | BSI-DSZ-CC-0973-V2-2016 | ANSSI-CC-2019/22 |
heuristics/cert_lab | BSI | CEA |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2018/03, ANSSI-CC-2017/72, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/49, ANSSI-CC-2017/68, ANSSI-CC-2017/69, ANSSI-CC-2018/06, BSI-DSZ-CC-0995-2018, BSI-DSZ-CC-1022-2018, ANSSI-CC-2018/05, ANSSI-CC-2017/70, BSI-DSZ-CC-1024-2018, ANSSI-CC-2017/71, BSI-DSZ-CC-1023-2018, ANSSI-CC-2018/04, BSI-DSZ-CC-1001-2018 | ANSSI-CC-2020/06 |
heuristics/report_references/directly_referencing | BSI-DSZ-CC-0973-2016 | ANSSI-CC-2018/31 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2020/26, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2019/43-R01, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-1059-V2-2019, ANSSI-CC-2020/53-R01, ANSSI-CC-2017/49, ANSSI-CC-2020/50-R01, ANSSI-CC-2020/53, ANSSI-CC-2020/51-R01, NSCIB-CC-23-67206-CR, BSI-DSZ-CC-1036-2019, BSI-DSZ-CC-1118-2020, BSI-DSZ-CC-1121-V2-2021, ANSSI-CC-2017/71, BSI-DSZ-CC-1034-2019, ANSSI-CC-2020/50, BSI-DSZ-CC-1059-V3-2019, ANSSI-CC-2019/34, ANSSI-CC-2020/51, BSI-DSZ-CC-1103-2019, ANSSI-CC-2019/50, BSI-DSZ-CC-1065-2020, ANSSI-CC-2019/36, ANSSI-CC-2019/48, ANSSI-CC-2020/36, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-1078-2019, ANSSI-CC-2020/26-R01, ANSSI-CC-2018/06, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1059-V5-2022, ANSSI-CC-2020/35, BSI-DSZ-CC-1022-2018, BSI-DSZ-CC-1064-2020, ANSSI-CC-2018/15, NSCIB-CC-2200035-01-CR, BSI-DSZ-CC-1148-V3-2023, ANSSI-CC-2018/18, BSI-DSZ-CC-1001-2018, BSI-DSZ-CC-1059-2018, ANSSI-CC-2017/69, ANSSI-CC-2019/43, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1034-V2-2021, BSI-DSZ-CC-1147-2020, ANSSI-CC-2019/35, BSI-DSZ-CC-0996-2018, ANSSI-CC-2017/68, ANSSI-CC-2018/17, ANSSI-CC-2017/72, ANSSI-CC-2019/33, ANSSI-CC-2020/46, BSI-DSZ-CC-0995-2018, ANSSI-CC-2020/48, ANSSI-CC-2020/52-R01, ANSSI-CC-2019/28, ANSSI-CC-2019/47, ANSSI-CC-2019/49, ANSSI-CC-2020/38, ANSSI-CC-2017/70, BSI-DSZ-CC-1059-V4-2021, ANSSI-CC-2018/04, ANSSI-CC-2020/52, ANSSI-CC-2023/38, ANSSI-CC-2018/05, ANSSI-CC-2018/16, BSI-DSZ-CC-1023-2018, ANSSI-CC-2020/47, ANSSI-CC-2018/03, BSI-DSZ-CC-1211-2023, NSCIB-CC-98209-CR5, ANSSI-CC-2019/41, ANSSI-CC-2020/37 | ANSSI-CC-2020/06 |
heuristics/report_references/indirectly_referencing | BSI-DSZ-CC-0973-2016 | ANSSI-CC-2016/01, ANSSI-CC-2016/65, ANSSI-CC-2014/20, ANSSI-CC-2015/60, ANSSI-CC-2014/84, ANSSI-CC-2018/31 |
heuristics/scheme_data | None |
|
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-1023-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1022-2018 | None |
heuristics/st_references/directly_referencing | None | ANSSI-CC-2018/31 |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-1023-2018, BSI-DSZ-CC-1024-2018, BSI-DSZ-CC-1022-2018 | None |
heuristics/st_references/indirectly_referencing | None | ANSSI-CC-2018/31 |
pdf_data/report_filename | 0973V2a_pdf.pdf | anssi-cc-2019-22fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto | |
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI/BSI-CC-PP-0084-2014 | 4 | 1 |
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sar/ADV |
|
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL | 2 | 1 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 3 | 2 |
pdf_data/report_keywords/cc_sar/ASE |
|
|
pdf_data/report_keywords/cc_sar/ASE/ASE_TSS.2 | 9 | 2 |
pdf_data/report_keywords/cc_sar/ATE |
|
|
pdf_data/report_keywords/cc_sar/ATE/ATE_IND | 2 | 1 |
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN | 3 | 2 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 7 | 1 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 5 | 2 |
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/TRNG |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 17 | 1 |
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 5 | 2 |
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//Author | Bundesamt für Sicherheit in der Informationstechnik | DUCLOS Charlene |
pdf_data/report_metadata//CreationDate | D:20161019121338+02'00' | D:20190624113019+02'00' |
pdf_data/report_metadata//Creator | Writer | Microsoft® Word 2010 |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Smartcard, NXP Secure Smart Card Controller P6022y VB including IC Dedicated Software, NXP Semiconductors Germany GmbH" | ANSSI-CC-CER-F-07.29 |
pdf_data/report_metadata//ModDate | D:20161020141130+02'00' | D:20190624113019+02'00' |
pdf_data/report_metadata//Producer | LibreOffice 4.2 | Microsoft® Word 2010 |
pdf_data/report_metadata//Subject | Common Criteria Certification | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0973-V2-2016 | ANSSI-CC-2019/22 |
pdf_data/report_metadata/pdf_file_size_bytes | 1339836 | 831150 |
pdf_data/report_metadata/pdf_hyperlinks | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte | mailto:[email protected], http://www.ssi.gouv.fr/ |
pdf_data/report_metadata/pdf_number_of_pages | 44 | 17 |
pdf_data/st_filename | 0973V2b_pdf.pdf | anssi-cc-2019-22fr.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 3 | 1 |
pdf_data/st_keywords/cc_cert_id | |
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0084-2014 | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP | 8 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP | 2 | 1 |
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD |
|
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE | 2 | 1 |
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_CMC | 5 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_CMS | 8 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL | 2 | 1 |
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS | 2 | 1 |
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.2 | 10 | 2 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV | 2 | 1 |
pdf_data/st_keywords/cc_sar/AVA/AVA_VAN.5 | 7 | 1 |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/eval_facility | |
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/TRNG |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 122 | 1 |
pdf_data/st_keywords/symmetric_crypto/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 6 | 2 |
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | NXP Semiconductors | DUCLOS Charlene |
pdf_data/st_metadata//CreationDate | D:20160816135914+02'00' | D:20190624113019+02'00' |
pdf_data/st_metadata//Creator | DITA Open Toolkit | Microsoft® Word 2010 |
pdf_data/st_metadata//Keywords | CC Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level 5+/6+, P6022y VB, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB | ANSSI-CC-CER-F-07.29 |
pdf_data/st_metadata//ModDate | D:20160816135946+02'00' | D:20190624113019+02'00' |
pdf_data/st_metadata//Producer | Apache FOP Version 1.1 | Microsoft® Word 2010 |
pdf_data/st_metadata//Subject | NXP Secure Smart Card Controller P6022y VB | S3FT9MF/S3FT9MT/S3FT9MS 16-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated software |
pdf_data/st_metadata//Title | Security Target Lite | ANSSI-CC-2019/22 |
pdf_data/st_metadata/pdf_file_size_bytes | 854200 | 831150 |
pdf_data/st_metadata/pdf_hyperlinks | mailto:[email protected], http://www.ssi.gouv.fr/ | |
pdf_data/st_metadata/pdf_number_of_pages | 130 | 17 |
dgst | cdffae2b624bf6c7 | f0530d1f25533d1b |