name |
NXP Mifare DESFire8 MF3ICD81 V0C/004 Secure SmartCard Controller with Embedded Software |
IBM WebSphere Business Integration Message Broker, Version 5.0, Fix Pack 4 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
scheme |
DE |
US |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
06.09.2012 |
not_valid_before |
01.04.2009 |
15.12.2005 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0487a.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10019-vr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0487b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10019-st.pdf |
manufacturer |
NXP Semiconductors |
IBM Corporation |
manufacturer_web |
https://www.nxp.com/ |
https://www.ibm.com |
security_level |
ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2 |
EAL3+, ALC_FLR.2 |
dgst |
d263edc36f0baf6c |
a5ac2d78851331c9 |
heuristics/cert_id |
BSI-DSZ-CC-0487-2009 |
CCEVS-VR-0087-2005 |
heuristics/cert_lab |
BSI |
US |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_IMP.2, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, AVA_MSU.3 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1, ALC_FLR.2 |
heuristics/extracted_versions |
004 |
5.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
BSI-DSZ-CC-0712-2011 |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
BSI-DSZ-CC-0712-2011 |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- category: Secure Messaging
- certification_date: 15.12.2005
- evaluation_facility: Leidos Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10019
- product: IBM Websphere Business Integration Message Broker Version 5.0, Fix Pack 4
- scheme: US
- url: https://www.niap-ccevs.org/product/10019
- vendor: IBM Corporation
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
0487a.pdf |
st_vid10019-vr.pdf |
pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0487-2009
- cert_item: NXP Mifare DESFire8 MF3ICD81 V0C/004 Secure SmartCard Controller with Embedded Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- US:
|
- DE:
- US:
- cert_id: CCEVS-VR-05-0087
- cert_item: IBM UK Ltd IBM WebSphere Business Integration Message Broker Version 5.0, Fix Pack 4
- cert_lab: US NIAP
|
pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0487: 1
- BSI-DSZ-CC-0487-2009: 19
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP- 0002-2001: 1
- BSI-PP-0002-: 1
- BSI-PP-0002-2001: 2
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 4: 9
- EAL 4 augmented: 3
- EAL 7: 1
- EAL1: 5
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 6
- EAL5+: 1
- EAL6: 3
- EAL7: 4
|
- EAL:
- EAL 3: 3
- EAL 3 augmented: 2
- EAL3: 3
|
pdf_data/report_keywords/cc_sar |
- ACM:
- ACM_AUT: 2
- ACM_AUT.1: 1
- ACM_CAP: 2
- ACM_CAP.4: 1
- ACM_SCP: 2
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 1
- ADO_IGS: 2
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 2
- ADV_HLD: 2
- ADV_IMP: 2
- ADV_IMP.2: 5
- ADV_INT: 2
- ADV_LLD: 2
- ADV_RCR: 2
- ADV_SPM: 2
- AGD:
- ALC:
- ALC_DVS: 2
- ALC_DVS.2: 6
- ALC_FLR: 2
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 2
- ALC_TAT.1: 1
- APE:
- APE_DES: 1
- APE_ENV: 1
- APE_INT: 1
- APE_OBJ: 1
- APE_REQ: 1
- APE_SRE: 1
- ASE:
- ASE_DES: 1
- ASE_ENV: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_PPC: 1
- ASE_REQ: 1
- ASE_SRE: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_IND: 2
- AVA:
- AVA_CCA: 2
- AVA_MSU: 2
- AVA_MSU.3: 5
- AVA_SOF: 3
- AVA_VLA: 3
- AVA_VLA.2: 1
- AVA_VLA.3: 1
- AVA_VLA.4: 6
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
- NXP:
- NXP: 11
- NXP Semiconductors: 15
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI 7149: 1
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- AIS 25: 3
- AIS 26: 3
- AIS 31: 3
- AIS 32: 1
- AIS 34: 4
- AIS 35: 3
- AIS 36: 1
- AIS 37: 1
- FIPS:
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- 2009, T-Systems GEI GmbH (confidential document) [8] MF3ICD81 Configuration List, NXP Semiconductors, Rev. 1.2, 13. March 2009 (confidential: 1
- IC with DES/3DES and AES Security, NXP Semiconductors, Rev. 1.5, 17 September 2008 (confidential document) [7] Evaluation Technical Report, NXP Mifare DESFire8 MF3ICD81, BSI-DSZ-CC-0487 Version 1.4, March: 1
- read the Functional Specification [11] chapter 9.4.7. and the Configuration List [8] chapter 3.1.2 (confidential document). 3 Security Policy The Security Policy is expressed by the set of Security Functional Requirements: 1
|
|
pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20090416145259+02'00'
- /Creator: Writer
- /Keywords: "NXP Mifare DESFire8 MF3ICD81 V0C/004 Secure SmartCard Controller with Embedded Software, NXP Seminconductors Germany GmbH, BSI-DSZ-CC-0487-2009"
- /ModDate: D:20090416150123+02'00'
- /Producer: StarOffice 9
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0487-2009
- pdf_file_size_bytes: 684198
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: Validator
- /CreationDate: D:20060105132344-05'00'
- /Creator: Acrobat PDFMaker 5.0 for Word
- /ModDate: D:20060105133010-05'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Validation Report for IBM WBI
- pdf_file_size_bytes: 328561
- pdf_hyperlinks: http://publib.boulder.ibm.com/infocenter/wbihelp/index.jsp, http://www.ibm.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 16
|
pdf_data/st_filename |
0487b.pdf |
st_vid10019-st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4 augmented: 2
- EAL4: 6
- EAL4 augmented: 1
- EAL4+: 2
|
- EAL:
- EAL 3: 12
- EAL 3 augmented: 9
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 1
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.2: 2
- ADO_IGS: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 2
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 2
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 4
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 2
- AGD_ADM.1: 2
- AGD_USR: 2
- AGD_USR.1: 2
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_LCD: 1
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU: 2
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 4
|
- ACM:
- ACM_CAP: 1
- ACM_CAP.3: 17
- ACM_SCP: 1
- ACM_SCP.1: 5
- ADO:
- ADO_DEL: 1
- ADO_DEL.1: 6
- ADO_IGS: 1
- ADO_IGS.1: 6
- ADV:
- ADV_FSP: 1
- ADV_FSP.1: 9
- ADV_HLD: 1
- ADV_HLD.2: 14
- ADV_RCR: 1
- ADV_RCR.1: 5
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 12
- AGD_USR: 1
- AGD_USR.1: 10
- ALC:
- ALC_DVS: 1
- ALC_DVS.1: 7
- ALC_FLR: 1
- ALC_FLR.2: 25
- ATE:
- ATE_COV: 1
- ATE_COV.2: 6
- ATE_DPT: 1
- ATE_DPT.1: 5
- ATE_FUN: 1
- ATE_FUN.1: 10
- ATE_IND: 1
- ATE_IND.2: 8
- AVA:
- AVA_MSU: 1
- AVA_MSU.1: 10
- AVA_SOF: 1
- AVA_SOF.1: 7
- AVA_VLA: 1
- AVA_VLA.1: 9
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_COP.1: 20
- FCS_COP.1.1: 2
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC.1: 11
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 11
- FDP_ITC.1: 6
- FDP_ITC.2: 15
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_ITT.1: 6
- FDP_ROL.1: 6
- FDP_ROL.1.1: 1
- FDP_ROL.1.2: 1
- FDP_SDI.1: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.2: 5
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 4
- FIA_UID.2: 8
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.2: 16
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 9
- FMT_SMF.1.1: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNL.1: 6
- FPR_UNL.1.1: 1
- FPT:
- FPT_AMT.1: 1
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FPT_RPL.1: 8
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SEP.1: 6
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 3
|
- FAU:
- FAU_GEN: 6
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 4
- FAU_GEN.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 3
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_UAU.2: 1
- FCO:
- FCO_NRO: 2
- FCO_NRO.1: 5
- FCO_NRO.1.1: 1
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 1
- FCO_NRR: 2
- FCO_NRR.1: 5
- FCO_NRR.1.1: 1
- FCO_NRR.1.2: 1
- FCO_NRR.1.3: 1
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_COP: 4
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 14
- FDP_ACC.1: 2
- FDP_ACC.2: 4
- FDP_ACF: 9
- FDP_ACF.1: 11
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITT: 2
- FIA:
- FIA_UAU: 2
- FIA_UAU.2: 2
- FIA_UAU.2.1: 1
- FIA_UID: 11
- FIA_UID.1: 5
- FIA_UID.2: 4
- FMT:
- FMT_MSA: 20
- FMT_MSA.1: 3
- FMT_MSA.2: 3
- FMT_MSA.3: 4
- FMT_SMF: 3
- FMT_SMF.1: 5
- FMT_SMF.1.1: 1
- FMT_SMR: 3
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 8
- FPT_ITT.1: 6
- FPT_RVM: 12
- FPT_RVM.1: 2
- FPT_SEP: 2
- FPT_SEP.1: 3
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
- FPT_STM: 2
- FPT_STM.1: 4
- FPT_STM.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.INSTALL: 2
- A.INSTALL_REQ: 2
- A.NO_EVIL: 4
- A.PHYSICAL: 2
- A.PLATFORM: 4
- O:
- O.ACCESS: 5
- O.ADMIN_ROLE: 3
- O.AUDIT_GENERATION: 5
- O.MANAGE: 3
- O.NON_REPUDIATION: 3
- O.SECURE_TRANS: 4
- O.TOE_PROTECTION: 5
- O.USER_IDENTIFICATION: 3
- OE:
- OE..USER_AUTHENTICATION: 2
- OE.ADMIN_GUIDANCE: 2
- OE.AUDIT: 2
- OE.AUDIT_STORAGE: 3
- OE.CONFIG: 2
- OE.INSTALL: 2
- OE.PHYSICAL: 2
- OE.PLATFORM: 2
- OE.SELF_PROTECTION: 2
- OE.TIME: 5
- OE.TOE_PROTECTION: 3
- OE.USER_AUTHENTICATION: 3
- OE.USER_IDENTIFICATION: 3
- T:
- T.ADMIN_ERROR: 4
- T.MESSAGE_DENIAL: 2
- T.NETWORK: 4
- T.ROLE: 2
- T.TSF_COMPROMISE: 4
- T.UNAUTH_ACCESS: 2
- T.UNDETECTED_ACTIONS: 4
|
pdf_data/st_keywords/vendor |
- NXP:
- NXP: 71
- NXP Semiconductors: 14
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 9
- fault injection: 2
- malfunction: 2
- SCA:
- Leak-Inherent: 8
- Physical Probing: 2
- physical probing: 1
- timing attacks: 1
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46-3: 3
|
- FIPS:
- FIPS 140-2: 2
- FIPS 46-3: 1
- FIPS PUB 140-2: 1
- FIPS PUB 180-1: 1
- FIPS PUB 186-2: 1
- FIPS PUB 197: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- TSF shall ensure that only secure values are accepted for security attributes.” This is clearly out of scope for the TOE. The design concept of the TOE and the systems in which the TOE is used is based on the: 2
- out of scope: 2
|
|
pdf_data/st_metadata |
- /Alternative descriptive title: Security Target Lite
- /Author: NXP Business Line Identification - HGA, KKG
- /CertificationID: BSI-DSZ-CC-0487
- /Copyright date: 2007
- /CreationDate: D:20081010151413+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: Security Target, Mifare, MF3ICD81
- /ModDate: D:20090416140134+02'00'
- /Modification date: 10 October 2008
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: Rev.1.1
- /Security status: Public
- /SourceModified: D:20081010131123
- /Specification status: Evaluation Documentation
- /Status:
- /Subject: MF3ICD81
- /Template date: 1 October 2006
- /Template version: 2.8.1
- /Title: Security Target Lite Mifare DESFire8 MF3ICD81
- /docpath: H:\work\SMX02\Evaluation\Procedure_P5CC037V0A\DeveloperDocuments
- /list_of_authors: Hans-Gerd Albertsen, Kurt Koenig
- /philips_smx_cl_docpath: H:\work\SMX02\Evaluation\Procedure_P5CC037V0A\DeveloperDocuments
- /relBibilioPath: ..\..\Bibliography.doc
- /text_cert_body_long: Bundesamt für Sicherheit in der Informationstechnik
- /text_cert_body_short: BSI
- /text_developer_long: NXP Semiconductors, Business Line Identification
- /text_developer_short: NXP
- /text_product_letter: A
- /text_product_long: NXP Mifare DESFire8 MF3ICD81
- /text_product_minor: V0A
- /text_product_short: MF3ICD81
- /text_sponsor_long: NXP Semiconductors, Business Line Identification
- /text_sponsor_short: NXP
- pdf_file_size_bytes: 463871
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |