name |
OSⅣ/MSP SECURE AF2 V10L10 C06121 |
NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software |
category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.10.2013 |
23.07.2022 |
not_valid_before |
27.04.2007 |
24.07.2017 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0092_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0977a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0977b_pdf.pdf |
manufacturer |
Fujitsu Limited |
NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity |
manufacturer_web |
|
https://www.nxp.com |
security_level |
EAL1 |
EAL6+, ALC_FLR.1, ASE_TSS.2 |
dgst |
ddba5b2783f6f7eb |
ba3168814159bc7c |
heuristics/cert_id |
JISEC-CC-CRP-C0092 |
BSI-DSZ-CC-0977-2017 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_IMP.2, AVA_VAN.5, ADV_ARC.1, ADV_FSP.5, ALC_CMC.5, ADV_TDS.5, AGD_OPE.1, ATE_DPT.3, ADV_CMS.5, ATE_COV.3, ASE_REQ.2, ASE_TSS.2, APE_SPD.1, ADV_SPM.1, APE_REQ.2, ATE_FUN.2, ADV_CMC.5, APE_INT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_INT.3, ALC_DEL.1, APE_CCL.1, ASE_OBJ.2, ALC_FLR.1, ASE_INT.1, APE_ECD.1, ASE_SPD.1, ALC_TAT.3, APE_OBJ.2, ALC_CMS.5, ALC_LCD.1 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0977-V2-2019, BSI-DSZ-CC-1019-2017 |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1019-V2-2019, BSI-DSZ-CC-0977-V2-2019, BSI-DSZ-CC-0977-V3-2021, BSI-DSZ-CC-1019-2017 |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0092
- certification_date: 01.04.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- description: PRODUCT DESCRIPTION This TOE is the OS (Operating System) for enterprise computing which has been enhanced on the security functions of access control, identification and authentication of user and so on. The applications on the TOE which the users can use are operable in multi-user and multi-task environments. And the relationships of access between a user and resources can be defined in detail by this TOE. Based on these definitions the access control is performed and only the permitted user can use the resources securely within the permitted range. This TOE has the following security functions. - identification and authentication - access control - auditing - security management - TOE protection
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: OSIV/MSP SECURE AF2
- product_type: IT Product (Operating System)
- toe_version: V10L10 C06121
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0092_it6104.html
- toe_japan_name: OSIV/MSP SECURE AF2 V10L10 C06121
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
21.0.03/TSE-CCCS-59 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
21.0.03/TSE-CCCS-59 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0092_ecvr.pdf |
0977a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2 and ALC_FLR.1 SOGIS Recognition Agreement
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0977-2017
- cert_item: NXP Secure Smart Card Controller N7021 VA including IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0092: 1
|
- DE:
- BSI-DSZ-CC-0977-: 1
- BSI-DSZ-CC-0977-2017: 21
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 7
- EAL 3: 4
- EAL 4: 6
- EAL 5: 10
- EAL 5+: 1
- EAL 6: 8
- EAL 6 augmented: 3
- EAL 7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 2
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 2
- ADV_SPM: 1
- ADV_SPM.1: 2
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_TDS.5: 2
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 1
- ALC_CMC.5: 3
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 3
- ALC_FLR: 3
- ALC_FLR.1: 6
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 1
- ALC_TAT.3: 3
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 2
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 2
- ATE_IND: 2
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 3
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 2
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 25
- NXP Semiconductors: 36
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 1
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- AIS1: 1
- AIS14: 1
- AIS19: 1
- AIS31: 1
- AIS39: 1
- AIS46: 1
- FIPS:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- NIST:
- NIST SP 800-38A: 4
- NIST SP 800-67: 5
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 7] Evaluation Technical Report N7021 VA, Version 2, 2017-06-30, TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
- N7021 VA Security Target, BSI-DSZ-CC-0977- 2017, Version 1.8, 2017-05-31, NXP Semiconductors (confidential document) 8 specifically • AIS1, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung des: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- for Composite Evaluation for the N7021 VA, version 2, 2017- 06-30, TÜV Informationstechnik GmbH (confidential document) [11] SmartMX3 family P71D320 Overview, pinning and electrical characteristics, Version 2.0: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070501103509+09'00'
- /ModDate: D:20070501103509+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13066
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/st_filename |
|
0977b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4+: 1
- EAL6: 46
- EAL6 augmented: 4
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 2
- ADV_CMC.4: 1
- ADV_CMC.5: 1
- ADV_CMS.4: 1
- ADV_CMS.5: 1
- ADV_FSP: 1
- ADV_FSP.4: 6
- ADV_FSP.5: 12
- ADV_IMP: 1
- ADV_IMP.1: 3
- ADV_IMP.2: 3
- ADV_INT.3: 1
- ADV_SPM.1: 8
- ADV_TDS.5: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 5
- ALC_CMS: 2
- ALC_CMS.4: 4
- ALC_CMS.5: 5
- ALC_COV: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 2
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 5
- ATE:
- ATE_COV.2: 3
- ATE_COV.3: 5
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 27
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 33
- FCS_CKM.4.1: 3
- FCS_COP.1: 39
- FCS_COP.1.1: 6
- FCS_RNG.1: 17
- FCS_RNG.1.1: 5
- FCS_RNG.1.2: 4
- FDP:
- FDP_ACC.1: 54
- FDP_ACC.1.1: 4
- FDP_ACF.1: 41
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 4
- FDP_IFC.1: 20
- FDP_IFC.1.1: 1
- FDP_IFF.1: 1
- FDP_ITC.1: 19
- FDP_ITC.2: 19
- FDP_ITT.1: 9
- FDP_ITT.1.1: 1
- FDP_RIP.1: 7
- FDP_RIP.1.1: 1
- FDP_SDC.1: 4
- FDP_SDC.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 5
- FDP_UCT.1.1: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FMT:
- FMT_LIM.1: 16
- FMT_LIM.1.1: 2
- FMT_LIM.2: 17
- FMT_LIM.2.1: 2
- FMT_MSA.1: 33
- FMT_MSA.1.1: 3
- FMT_MSA.3: 32
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_SMF.1: 30
- FMT_SMF.1.1: 2
- FMT_SMR.1: 19
- FPT:
- FPT_FLS.1: 12
- FPT_FLS.1.1: 1
- FPT_ITT.1: 6
- FPT_ITT.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 8
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 9
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 9
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
|
- O:
- O.AES: 4
- O.CUST_RECONFIG: 5
- O.MEM_ACCESS: 5
- O.NVM_INTEGRITY: 4
- O.PUF: 5
- O.REUSE: 5
- O.RND: 4
- O.SFR_ACCESS: 4
- O.TDES: 5
- T:
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 58
- NXP Semiconductors: 34
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 16
- Triple-DES: 17
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 11
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 12
- Physical Probing: 4
- physical probing: 5
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 197: 4
- FIPS PUB 197: 2
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 7816: 12
- ISO/IEC 9797-1: 1
- NIST:
- NIST SP 800-38A: 6
- NIST SP 800-38B: 2
- NIST SP 800-67: 4
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |