name |
OSⅣ/MSP SECURE AF2 V10L10 C06121 |
NXP JCOP3 P60 |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
NL |
status |
archived |
active |
not_valid_after |
07.10.2013 |
25.04.2028 |
not_valid_before |
27.04.2007 |
25.04.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-23-2200035-01.1-Cert.pdf |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0092_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200035-01-CRv1.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-2200035-01-STv4_8.pdf |
manufacturer |
Fujitsu Limited |
NXP Semiconductors |
manufacturer_web |
|
https://www.nxp.com/ |
security_level |
EAL1 |
ALC_FLR.1, ALC_DVS.2, AVA_VAN.5, ASE_TSS.2, EAL5+ |
dgst |
ddba5b2783f6f7eb |
2d1626d40aa004da |
heuristics/cert_id |
JISEC-CC-CRP-C0092 |
NSCIB-CC-2200035-01-CR |
heuristics/cert_lab |
[] |
|
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AVA_VAN.5, ASE_TSS.2, ALC_FLR.1, AGD_OPE.1, ALC_DVS.2 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2023/38 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1059-V5-2022 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2023/38 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1059-V3-2019, BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1059-V2-2019, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-0973-2016, BSI-DSZ-CC-1059-V4-2021 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0092
- certification_date: 01.04.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is the OS (Operating System) for enterprise computing which has been enhanced on the security functions of access control, identification and authentication of user and so on. The applications on the TOE which the users can use are operable in multi-user and multi-task environments. And the relationships of access between a user and resources can be defined in detail by this TOE. Based on these definitions the access control is performed and only the permitted user can use the resources securely within the permitted range. This TOE has the following security functions. - identification and authentication - access control - auditing - security management - TOE protection
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: OSIV/MSP SECURE AF2
- product_type: IT Product (Operating System)
- toe_version: V10L10 C06121
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0092_it6104.html
- toe_japan_name: OSIV/MSP SECURE AF2 V10L10 C06121
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
|
NSCIB-23-2200035-01.1-Cert.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- NL:
- CC-21-98209: 1
- NSCIB-2200035-01: 1
- NSCIB-CC-23-2200035-01: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 7: 1
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
- ASE:
- AVA:
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Denise Cater
- /CreationDate: D:20230706163212+01'00'
- /Creator: Microsoft® Word 2021
- /ModDate: D:20230706163212+01'00'
- /Producer: Microsoft® Word 2021
- /Title: NSCIB Certificate
- pdf_file_size_bytes: 144055
- pdf_hyperlinks: https://www.tuv-nederland.nl/
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0092_ecvr.pdf |
NSCIB-2200035-01-CRv1.pdf |
pdf_data/report_frontpage |
|
- NL:
- cert_id: NSCIB-CC-2200035-01-CR
- cert_item: JCOP3 P60
- cert_lab: SGS Brightsight B.V.
- developer: NXP Semiconductors GmbH
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0092: 1
|
- DE:
- BSI-DSZ-CC-1059: 1
- BSI-DSZ-CC-1059-V5-2022: 1
- FR:
- NL:
- NSCIB-2200035-01: 1
- NSCIB-CC-15-67206-CR3: 1
- NSCIB-CC-2200035-01-CR: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 3
- EAL6+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 2
- ASE:
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 3
- NXP Semiconductors: 5
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- BrightSight:
- SGS:
- SGS: 3
- SGS Brightsight: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- CMAC: 2
- HMAC: 1
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 2
- SHA-512: 2
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- other:
- JIL: 2
- JIL-AAPS: 1
- JIL-AM: 2
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- ISO:
- ISO/IEC 14443: 8
- ISO/IEC 7816: 8
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- Global Platform (version 2.2.1: 1
- Global Platform 2.2.1: 2
- JavaCard:
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- or non-standard algorithms, protocols and implementations: • MIFARE and FIDO U2F support (out of scope as there are no security claims) Not all key sizes specified in the [ST] have sufficient: 1
- out of scope: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070501103509+09'00'
- /ModDate: D:20070501103509+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13066
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
NSCIB-2200035-01-STv4_8.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- NL:
- NSCIB-CC-2200035-01: 2
- NSCIB-CC-67206-CR3: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-PP-0055: 1
- BSI-PP-0084: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 9
- EAL5 augmented: 4
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- AGD:
- ALC:
- ALC_DVS.2: 4
- ALC_FLR.1: 4
- ASE:
- ASE_CCL: 2
- ASE_ECD: 1
- ASE_INT: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ASE_TSS: 2
- ASE_TSS.2: 3
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 20
- FAU_ARP.1.1: 1
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAS: 3
- FAU_SAS.1: 7
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 8
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 4
- FCS_CKM.2: 9
- FCS_CKM.2.1: 1
- FCS_CKM.3: 7
- FCS_CKM.3.1: 1
- FCS_CKM.4: 16
- FCS_CKM.4.1: 4
- FCS_COP.1: 14
- FCS_COP.1.1: 16
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 65
- FDP_ACC.1.1: 3
- FDP_ACC.2: 16
- FDP_ACC.2.1: 4
- FDP_ACC.2.2: 3
- FDP_ACF.1: 49
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 9
- FDP_IFC: 2
- FDP_IFC.1: 37
- FDP_IFC.1.1: 1
- FDP_IFC.2: 13
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF: 1
- FDP_IFF.1: 22
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 3
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC: 1
- FDP_ITC.1: 8
- FDP_ITC.2: 19
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP.1: 69
- FDP_RIP.1.1: 8
- FDP_ROL.1: 19
- FDP_ROL.1.1: 2
- FDP_ROL.1.2: 3
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 1
- FDP_UIT.1: 5
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 17
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 1
- FIA_UID.1: 37
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 5
- FIA_UID.2.1: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 5
- FMT_MSA.1: 73
- FMT_MSA.1.1: 8
- FMT_MSA.2: 4
- FMT_MSA.2.1: 2
- FMT_MSA.3: 69
- FMT_MSA.3.1: 10
- FMT_MSA.3.2: 9
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 69
- FMT_SMF.1.1: 7
- FMT_SMR: 2
- FMT_SMR.1: 74
- FMT_SMR.1.1: 5
- FMT_SMR.1.2: 5
- FPR:
- FPR_UNO.1: 10
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS.1: 42
- FPT_FLS.1.1: 5
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 6
- FPT_RCV.3.1: 2
- FPT_RCV.3.2: 2
- FPT_RCV.3.3: 2
- FPT_RCV.3.4: 1
- FPT_TDC.1: 6
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 16
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 8
- A.APPS-: 1
- A.APPS-PROVIDER: 9
- A.DELETION: 1
- A.PROCESS-SEC-IC: 9
- A.USE_DIAG: 10
- A.USE_KEYS: 10
- A.VERIFICATION: 8
- A.VERIFICATION-AUTHORITY: 10
- D:
- D.ADMIN_CONF_DATA: 1
- D.API_: 1
- D.API_DATA: 2
- D.APP_: 3
- D.APP_CODE: 5
- D.APP_C_: 1
- D.APP_C_DATA: 4
- D.APP_I_: 2
- D.APP_I_DATA: 4
- D.APP_KEYS: 9
- D.APSD_KEYS: 3
- D.CARD_MNGT_DATA: 3
- D.CRYPTO: 6
- D.GP_CODE: 1
- D.ISD_KEYS: 4
- D.JCS_: 1
- D.JCS_CODE: 3
- D.JCS_DATA: 4
- D.PERSO_CONF_DATA: 1
- D.PIN: 10
- D.SEC_DATA: 6
- D.TSF_KEYS: 2
- D.VASD_KEYS: 3
- O:
- O.APPLET: 16
- O.CODE_PKG: 12
- O.CONFIG-ITEM: 7
- O.CONFIG-SERVICE: 2
- O.DELETION: 4
- O.EXT-MEM: 1
- O.EXT_: 4
- O.EXT_MEM_IN: 2
- O.EXT_MEM_IN-STANCE: 2
- O.EXT_MEM_INSTANCE: 4
- O.INSTALL: 3
- O.JAVAOBJECT: 54
- O.LOAD: 4
- O.NON_: 1
- O.NON_SB_: 1
- O.NON_SB_SFR: 3
- O.PUF: 1
- O.REMOTE: 1
- O.SB_SFR: 5
- OE:
- OE.APPLET: 8
- OE.APPS-PROVIDER: 6
- OE.CARD-MANAGEMENT: 3
- OE.CODE-EVIDENCE: 21
- OE.KEY-: 1
- OE.KEY-CHANGE: 6
- OE.PROCESS_SEC_IC: 6
- OE.SCP: 12
- OE.SECURITY-DOMAINS: 6
- OE.USE_DIAG: 7
- OE.USE_KEYS: 7
- OE.VERIFICATION: 29
- OE.VERIFICATION-AUTHORITY: 5
- OE.VERIFICATION_AUTHORITY: 1
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.CREATE_EXT_MEM_: 1
- OP.CREATE_EXT_MEM_INSTANCE: 2
- OP.DELETE_: 2
- OP.DELETE_AP-: 1
- OP.DELETE_APPLET: 2
- OP.DELETE_PCKG: 2
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_: 2
- OP.INSTANCE_FIELD: 2
- OP.INVK_: 2
- OP.INVK_INTER-: 1
- OP.INVK_INTERFACE: 4
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MODIFY_CON-: 1
- OP.MODIFY_CONFIG_: 1
- OP.MODIFY_CONFIG_ITEM: 2
- OP.PUT: 6
- OP.READ_: 1
- OP.READ_CON-FIG_ITEM: 1
- OP.READ_CONFIG_ITEM: 2
- OP.READ_EXT_: 1
- OP.READ_EXT_MEM: 2
- OP.SB_AC-CESS: 1
- OP.SB_ACCESS: 3
- OP.SB_ACCESS_SFR: 4
- OP.SECURE_: 1
- OP.SECURE_CARD: 3
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OP.USE_CONFIG_ITEM: 3
- OP.WRITE_EXT_: 1
- OP.WRITE_EXT_MEM: 2
- OSP:
- OSP.KEY-CHANGE: 9
- OSP.PROCESS-TOE: 9
- OSP.SECURE-BOX: 9
- OSP.SECURITY-DOMAINS: 9
- OSP.VERIFICATION: 7
- OT:
- OT.ALARM: 18
- OT.APPLI-AUTH: 15
- OT.CARD-: 2
- OT.CARD-MANAGEMENT: 33
- OT.CIPHER: 9
- OT.COMM_AUTH: 11
- OT.COMM_CONFIDENTIALITY: 9
- OT.COMM_INTEGRITY: 9
- OT.CONFIG-LIMIT: 9
- OT.DOMAIN-RIGHTS: 12
- OT.EXT-MEM: 17
- OT.FIREWALL: 14
- OT.GLOBAL_ARRAYS_CONFID: 8
- OT.GLOBAL_ARRAYS_INTEG: 8
- OT.IDENTIFICATION: 10
- OT.KEY-MNGT: 6
- OT.NATIVE: 12
- OT.OBJ-DELETION: 7
- OT.OPERATE: 29
- OT.PIN-MNGT: 9
- OT.REALLOCATION: 9
- OT.RESOURCES: 7
- OT.RND: 10
- OT.SCP: 54
- OT.SEC_BOX_FW: 9
- OT.SID: 18
- OT.TRANSACTION: 7
- R:
- SA:
- SA.ALARM: 3
- SA.CARD-MANAGEMENT: 2
- SA.CIPHER: 3
- SA.CONFID-APPLI-DATA: 3
- SA.CONFID-JCS-CODE: 3
- SA.CONFID-JCS-DATA: 3
- SA.DELETION: 2
- SA.EXE-: 1
- SA.EXE-APPLI-CODE: 4
- SA.EXE-JCS-CODE: 3
- SA.EXT-MNGT: 2
- SA.FIREWALL: 3
- SA.INSTALL: 3
- SA.INTEG-APPLI-CODE: 4
- SA.INTEG-APPLI-DATA: 4
- SA.INTEG-JCS-CODE: 3
- SA.INTEG-JCS-DATA: 3
- SA.KEY-MNGT: 3
- SA.NATIVE: 5
- SA.OBJ-DELETION: 4
- SA.OPERATE: 3
- SA.PIN-MNGT: 3
- SA.RESOURCES: 4
- SA.SCP: 6
- SA.SID: 4
- SA.TRANSACTION: 3
- SA.VERIFICATION: 4
- T:
- T.COM_EXPLOIT: 8
- T.CONFID-APPLI-DATA: 6
- T.CONFID-JCS-CODE: 6
- T.CONFID-JCS-DATA: 6
- T.CONFIG: 8
- T.DELETION: 2
- T.EXE-CODE: 12
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 2
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-CODE: 13
- T.INTEG-APPLI-DATA: 16
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 6
- T.LIFE_CYCLE: 7
- T.NATIVE: 6
- T.OBJ-DELETION: 6
- T.OS_OPERATE: 8
- T.PHYSICAL: 6
- T.RESOURCES: 6
- T.RND: 8
- T.SID: 13
- T.UNAUTHORIZED_CARD_MNGT: 9
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 154
- NXP Semiconductors: 22
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 3
- TDES: 1
- Triple-DES: 1
- TripleDES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ..........7: 1
- Crypto Library 1.3.1.3: 1
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Fault Injection: 2
- Physical Tampering: 3
- fault injection: 1
- malfunction: 3
- physical tampering: 2
- SCA:
- DPA: 4
- SPA: 2
- physical probing: 3
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 14888-3: 1
- PKCS:
- SCP:
- SCP01: 1
- SCP02: 1
- SCP03: 1
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_: 1
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CMAC16: 1
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_ECB_ISO9797_: 1
- ALG_DES_ECB_ISO9797_M2: 1
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC8_ISO9797_1_M2_: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ECDSA:
- ALG_ECDSA_SHA_: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- RNG:
- ALG_PSEUDO_RANDOM: 1
- ALG_SECURE_RANDOM: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_ISO9796: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_ISO9796: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 2
- ALG_SHA_256: 2
- ALG_SHA_384: 3
- ALG_SHA_512: 2
- misc:
- CIPHER_ECDSA: 1
- LENGTH_AES_128: 2
- LENGTH_AES_192: 2
- LENGTH_AES_256: 3
- LENGTH_DES3_2KEY: 2
- LENGTH_DES3_3KEY: 1
- LENGTH_EC_: 2
- LENGTH_EC_FP_160: 4
- LENGTH_EC_FP_192: 3
- LENGTH_EC_FP_224: 3
- LENGTH_EC_FP_256: 5
- LENGTH_EC_FP_320: 3
- LENGTH_EC_FP_384: 3
- LENGTH_EC_FP_521: 3
- LENGTH_RSA_1024: 1
- LENGTH_RSA_2048: 1
- LENGTH_RSA_4096: 2
- LENGTH_SHA: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 1
- LENGTH_SHA_384: 1
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 2
- javacard.security: 3
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- 134 NXP Semiconductors JCOP 3 P60 Security Target Lite Figure 1. Component of the TOE 1 MIFARE is out of scope of the certified Micro Controller. Figure 1.1 also shows applets and the Secure Box Native Library: 1
- Controller, called MC FW including MIFARE implementations, where the MIFARE implementations are out of scope of the certified Micro Controller. • Software for implementing cryptographic operations on the: 1
- out of scope: 2
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |