name |
Canon imageRUNNER ADVANCE C5000 Series 2600.1 model Version 1.0 |
NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
17.03.2015 |
01.09.2019 |
not_valid_before |
29.03.2011 |
23.07.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0645a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0287_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0645b_pdf.pdf |
manufacturer |
Canon Inc. |
NXP Semiconductors |
manufacturer_web |
https://www.canon.com/ |
https://www.nxp.com/ |
security_level |
ALC_FLR.2, EAL3+ |
EAL5+, ASE_TSS.2, ALC_DVS.2, AVA_VAN.5 |
dgst |
dd424fd022726329 |
f094ac9f2544dfa9 |
heuristics/cert_id |
JISEC-CC-CRP-C0287 |
BSI-DSZ-CC-0645-2010 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/indirect_transitive_cves |
{} |
CVE-2021-3011 |
heuristics/extracted_sars |
ALC_FLR.2, ADV_ARC.1, ADV_FSP.3, AGD_OPE.1, ALC_CMC.3, ATE_COV.2, ALC_CMS.3, AGD_PRE.1, ALC_DEL.1, ASE_SPD.1, ALC_LCD.1, ASE_OBJ.2, ASE_REQ.2, ADV_TDS.2, AVA_VAN.2, ATE_FUN.1, ASE_TSS.1, ALC_DVS.1, ATE_IND.2, ASE_CCL.1, ATE_DPT.1, ASE_ECD.1, ASE_INT.1 |
ALC_FLR.3, ADV_INT.2, ADV_ARC.1, ALC_TAT.2, APE_REQ.2, AGD_OPE.1, ATE_COV.2, ADV_SPM.1, AGD_PRE.1, ALC_DEL.1, APE_SPD.1, ATE_DPT.3, ASE_SPD.1, ALC_CMS.5, ALC_LCD.1, ASE_OBJ.2, ASE_REQ.2, APE_OBJ.2, AVA_VAN.5, APE_ECD.1, ATE_FUN.1, ADV_TDS.4, ATE_IND.2, ALC_CMC.4, ASE_CCL.1, ALC_DVS.2, APE_CCL.1, ASE_ECD.1, ADV_IMP.1, ASE_INT.1, APE_INT.1, ASE_TSS.2, ADV_FSP.5 |
heuristics/extracted_versions |
1.0, 2600.1 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, ANSSI-CC-2011/64, BSI-DSZ-CC-0858-2013, BSI-DSZ-CC-0742-2011, ANSSI-CC-2013/29, BSI-DSZ-CC-0783-2013, ANSSI-CC-2013/31, 2011-12-INF-1089, 2011-14-INF-1095, BSI-DSZ-CC-0744-2011, BSI-DSZ-CC-0743-2011, ANSSI-CC-2013/30, BSI-DSZ-CC-0717-2011, BSI-DSZ-CC-0800-2012, 2011-15-INF-1098, 2011-13-INF-1092, BSI-DSZ-CC-0731-2011, BSI-DSZ-CC-0682-2010, BSI-DSZ-CC-0750-2011 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, ANSSI-CC-2012/30, ANSSI-CC-2011/64, OCSI/CERT/SYS/05/2016/RC, OCSI/CERT/CCL/05/2021/RC, BSI-DSZ-CC-0914-2014, BSI-DSZ-CC-0858-2013, BSI-DSZ-CC-0913-2014, BSI-DSZ-CC-0911-2014, BSI-DSZ-CC-0742-2011, ANSSI-CC-2013/29, BSI-DSZ-CC-0783-2013, OCSI/CERT/SYS/02/2016/RC, ANSSI-CC-2013/31, 2011-12-INF-1089, BSI-DSZ-CC-0912-2014, BSI-DSZ-CC-0867-2014, 2011-14-INF-1095, BSI-DSZ-CC-0744-2011, ANSSI-CC-2012/71, ANSSI-CC-2013/30, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0750-V2-2014, BSI-DSZ-CC-0717-2011, OCSI/CERT/SYS/05/2015/RC, BSI-DSZ-CC-0866-2013, CRP272, BSI-DSZ-CC-0800-2012, OCSI/CERT/CCL/06/2021/RC, BSI-DSZ-CC-0858-V2-2015, 2011-15-INF-1098, OCSI/CERT/SYS/04/2015/RC, 2011-13-INF-1092, BSI-DSZ-CC-0731-2011, NSCIB-CC-13-37760-CR2, BSI-DSZ-CC-0866-V2-2014, BSI-DSZ-CC-0682-2010, OCSI/CERT/SYS/03/2016/RC, OCSI/CERT/SYS/06/2016/RC, OCSI/CERT/CCL/09/2022/RC, BSI-DSZ-CC-0750-2011 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0287
- certification_date: 01.03.2011
- claim: EAL3+ ALC_FLR.2 PP
- enhanced:
- assurance_level: EAL3 Augmented with ALC_FLR.2
- cc_version: 3.1
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a MFP (Multifunction Product) that offers Copy, Print, Universal Send, I-Fax, and Mail Box capabilities. The TOE is capable of fully implementing the functionality required by the IEEE Std 2600.1™-2009 defined as the Protection Profile for MFP, except for the fax function which is not included in this constitution. TOE security functionality The TOE embodies the following security functions. - User Authentication Function Function for identifying and authenticating the user. - Function Use Restriction Function Function for restricting the use of the MFP depending on the authority of the user. - Job Output Restriction Function Function for restricting access to print, cancel, and other jobs to the user that executed the job and the administrator. - Forward Received Jobs Function Function for restricting the machine from forwarding received data directly to the LAN. - HDD Data Erase Function Function for erasing unnecessary data from the hard disk by overwriting the data. - HDD Data Encryption Function Function for encrypting all data stored in the HDD, and for restricting the connection of the HDD Data Encryption & Mirroring Board with the correct MFP. - LAN Data Protection Function Function for protecting all IP packets that are communicated with an IT device. - Self-Test Function Function for testing the integrity of the executable code at startup. - Audit Log Function Function for generating audit logs on security events and allowing them to be viewed by the administrator. - Management Function Function for restricting device settings that influence security to be made only by the administrator.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Canon imageRUNNER ADVANCE C5000 Series 2600.1 model
- product_type: Multifunction Product
- protection_profile: IEEE Std 2600.1-2009
- toe_version: 1.0
- vendor: Canon Inc.
- expiration_date: 01.03.2015
- supplier: Canon Inc.
- toe_japan_name: Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0287_it0294.html
- toe_overseas_name: Canon imageRUNNER ADVANCE C5000 Series 2600.1 model 1.1 (Certification of this product has been revoked 2015-03)
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0741-2011, ANSSI-CC-2013/29, BSI-DSZ-CC-0731-2011, ANSSI-CC-2011/64, ANSSI-CC-2013/31, BSI-DSZ-CC-0743-2011, BSI-DSZ-CC-0800-2012, ANSSI-CC-2012/76, BSI-DSZ-CC-0744-2011, ANSSI-CC-2012/24, BSI-DSZ-CC-0742-2011, ANSSI-CC-2013/30, ANSSI-CC-2012/80 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
2011-13-INF-1092, BSI-DSZ-CC-0741-2011, ANSSI-CC-2013/29, BSI-DSZ-CC-0731-2011, ANSSI-CC-2011/64, ANSSI-CC-2013/31, 2011-12-INF-1089, BSI-DSZ-CC-0743-2011, 2011-14-INF-1095, BSI-DSZ-CC-0800-2012, ANSSI-CC-2012/76, BSI-DSZ-CC-0744-2011, ANSSI-CC-2012/24, 2011-15-INF-1098, BSI-DSZ-CC-0742-2011, ANSSI-CC-2013/30, ANSSI-CC-2012/80 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
32475ccb695b1644 |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0287_erpt.pdf |
0645a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0645-2010
- cert_item: NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO; each including IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0287-01: 1
- Certification No. C0287: 1
|
- DE:
- BSI-DSZ-CC-0645: 2
- BSI-DSZ-CC-0645-2010: 20
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0035: 1
- BSI-CC-PP-0035-2007: 4
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 4
- EAL3 augmented: 2
|
- EAL:
- EAL 4: 5
- EAL 5: 4
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 8
- EAL5: 6
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 2
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 2
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 2
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ACCESS: 1
- A.ADMIN: 2
- A.USER: 1
- T:
- T.CONF: 4
- T.DOC: 4
- T.FUNC: 2
- T.PROT: 2
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 27
- NXP Semiconductors: 14
- Philips:
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 1
- physical probing: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 38: 1
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
- OutOfScope:
- MFP, created by the submitted print jobs. As such, the following security functions are considered out of scope of this evaluation. 1) The TOE supports various print protocols for the submission of print jobs: 1
- for use as the Web browser for operating the TOE. Any and all other Web browsers and versions are out of scope of this evaluation. 1.2 Conduct of Evaluation Evaluation Facility conducted IT security evaluation: 1
- of the print job contains an identification and authentication mechanism, that mechanism is out of scope of this evaluation. In terms of this evaluation, only Microsoft Internet Explorer 6 SP1: 1
- out of scope: 4
- protocols have their own identification and authentication mechanisms, and those mechanisms are out of scope of this evaluation. Examples of this include the identification and authentication mechanism in the: 1
|
- ConfidentialDocument:
- Card Controllers, NXP Semiconductors, Business Line Identification, Version 1.6, June 7th, 2010 (confidential document) [7] Evaluation Technical Report, V. 1.1, 15th July 2010, BSI-DSZ-CC-0645, NXP Secure PKI Smart: 1
- MSO Secure Smart Card Controller, Version 1.1, 15th July 2010, BSI-DSZ-CC-0645, T-Systems GEI GmbH (confidential document) [12] Data Sheet P5Cx128/P5Cx145 family, Secure dual interface and contact PKI smart card: 1
- MSO; P5CC145V0A, MSO; P5CD128V0A, MSO; P5CC128V0A, MSO, each including IC Dedicated Software (confidential document) [8] Configuration List for the P5Cx128V0A/P5Cx145V0A, MSO, Rev. 1.2, NXP Semiconductors, 07.07: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110630165749+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110630170428+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 626101
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20100901095848+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Secure PKI Smart Card Controllers P5CD145V0A, MSO; P5CC145V0A, MSO; P5CD128V0A, MSO and P5CC128V0A, MSO;each including IC Dedicated Software, NXP Semiconductors Germany GmbH"
- /ModDate: D:20100901153242+02'00'
- /Producer: OpenOffice.org 3.1
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0645-2010
- pdf_file_size_bytes: 839472
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0287_est.pdf |
0645b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL 3 augmented: 1
- EAL3: 8
- EAL3 augmented: 7
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 1
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL5: 32
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 11
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 5
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 24
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 1
- FCS_CKM.4: 12
- FCS_COP.1: 25
- FCS_COP.1.1: 2
- FDP:
- FDP_ACC.1: 49
- FDP_ACC.1.1: 4
- FDP_ACF.1: 34
- FDP_ACF.1.1: 4
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 4
- FDP_IFC: 1
- FDP_IFC.1: 4
- FDP_IFF: 1
- FDP_ITC.1: 6
- FDP_ITC.2: 6
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 13
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 7
- FIA_UID.1: 22
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA.1: 23
- FMT_MSA.1.1: 2
- FMT_MSA.3: 25
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 18
- FMT_MTD.1.1: 2
- FMT_SMF.1: 25
- FMT_SMF.1.1: 1
- FMT_SMR.1: 33
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_CIP_EXP: 2
- FPT_CIP_EXP.1: 16
- FPT_CIP_EXP.1.1: 2
- FPT_CIP_EXP.1.2: 3
- FPT_FDI_EXP: 3
- FPT_FDI_EXP.1: 11
- FPT_FDI_EXP.1.1: 2
- FPT_PHP.1: 6
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 15
- FTA_SSL.3.1: 2
- FTP:
- FTP_ITC.1: 12
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.4: 3
- FCS_COP.1: 22
- FCS_COP.1.1: 2
- FCS_RNG.1: 4
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 33
- FDP_ACC.1.1: 2
- FDP_ACF.1: 30
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_ITT.1: 6
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA.1: 25
- FMT_MSA.1.1: 2
- FMT_MSA.3: 18
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ADMIN: 6
- A.USER: 3
- D:
- D.CONF: 8
- D.DOC: 12
- D.FUNC: 6
- D.PROT: 6
- O:
- O.AUDIT: 8
- O.CONF: 18
- O.DOC: 18
- O.FUNC: 9
- O.HDD: 9
- O.INTERFACE: 9
- O.PROT: 9
- O.SOFTWARE: 8
- O.USER: 15
- OE:
- OE.ADMIN: 8
- OE.AUDIT: 4
- OE.AUDIT_ACCESS: 4
- OE.AUDIT_STORAGE: 4
- OE.INTERFACE: 4
- OE.PHYISCAL: 2
- OE.PHYSICAL: 2
- OE.USER: 14
- T:
- T.CONF: 6
- T.DOC: 6
- T.FUNC: 3
- T.PROT: 3
|
- O:
- O.HW_AES: 7
- O.MEM_ACCESS: 9
- O.MF_FW: 7
- O.RND: 3
- O.SFR_ACCESS: 7
- T:
|
pdf_data/st_keywords/vendor |
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 1
|
- NXP:
- NXP: 83
- NXP Semiconductors: 17
- Philips:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 3
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- malfunction: 1
- physical tampering: 4
|
- FI:
- Malfunction: 10
- fault injection: 5
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS PUB 186-2: 4
- FIPS PUB 197: 3
- FIPS PUB 46-3: 1
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46: 1
- FIPS PUB 46-3: 3
- ISO:
- ISO/IEC 14443: 14
- ISO/IEC 18092: 2
- ISO/IEC 7816: 10
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Satoshi HIROTA
- /CreationDate: D:20110623065012Z
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20110630170507+09'00'
- /Producer: Microsoft® Office Word 2007
- /Title: 文書ID:
- pdf_file_size_bytes: 1200786
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 68
|
- /Alternative descriptive title: Security Target Lite
- /Author: NXP Semiconductors
- /CertificationID: BSI-DSZ-CC-0645
- /Company: NXP Semiconductors
- /Copyright date: 2009
- /CreationDate: D:20100901120504+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /Descriptive title: Security Target Lite
- /Division: NXP Semiconductors
- /Keywords: CC, Security Evaluation, Security Target Lite, Functional Requirements, Security Functionality, Assurance Level, P5Cx128V0A/P5Cx145V0A, MSO, P5CD145, P5CD128, P5CC145, P5CC128
- /ModDate: D:20100901120517+02'00'
- /Modification date: 07 Jun 2010
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Revision: Rev. 1.6
- /Security status: public
- /Specification status: Evaluation documentation
- /Subject: Common Criteria Evaluation
- /Template date: 31 March 2009
- /Template revision: 2
- /Template version: 2.8.3B
- /Title: Security Target Lite
- /docpath: S:\DesSync\idsmx04\data\data\top_smx04_t051_lib\id_smx04_t051_top\DOCUMENTS\project_docu\SecurityEvaluation\Procedure_P5CD145\DeveloperDocuments
- /philips_smx_cl_docpath: I:\P5_CryptoLib\SmxCl\docs\99_prj_mgmt\Templates
- /relBiblioPath: ..\..\Bibliography.doc
- /status: draft
- /text_developer_long: NXP Semiconductors, Business Line Identification
- /text_developer_short: NXP
- pdf_file_size_bytes: 448823
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 67
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |