| name |
DataOverwriteSecurity Unit Type I Software Version: 1.01m |
NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
DE |
| status |
archived |
archived |
| not_valid_after |
07.10.2013 |
17.12.2023 |
| not_valid_before |
28.02.2008 |
17.12.2018 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0939V3c_pdf.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0146_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0939V3a_pdf.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0146_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0939V3b_pdf.pdf |
| manufacturer |
Ricoh Company, Ltd. |
NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity |
| manufacturer_web |
https://www.ricoh.com/ |
https://www.nxp.com |
| security_level |
EAL3 |
EAL6+, ASE_TSS.2, ALC_FLR.1 |
| dgst |
e94414ed23397f0a |
ecfc2e7cbac868da |
| heuristics/cert_id |
JISEC-CC-CRP-C0146 |
BSI-DSZ-CC-0939-V3-2018 |
| heuristics/cert_lab |
[] |
BSI |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ALC_DVS.1, ATE_IND.2, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_FSP.1 |
ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1 |
| heuristics/extracted_versions |
1.01 |
016 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0939-V2-2016 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0939-2015, BSI-DSZ-CC-0939-V2-2016 |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0146
- certification_date: 01.02.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0146_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This product, an optional kit of safer use for Multi Function Product, overwrites generated data into the specified area of HDD commanded by Multi Function Product(MFP). This product is available for the following MFPs; Ricoh imagio MP 2550 series Ricoh imagio MP 3350 series Ricoh imagio MP 4000 series Ricoh imagio MP 5000 series Ricoh Aficio MP 2550 series Ricoh Aficio MP 3350 series Savin 9025/9033 series Lanier LD425/433 series Lanier MP 2550/3350 series Gestetner MP 2550/3350 series Nashuatec MP 2550/3350 series Rex-Rotary MP 2550/3350 series Infotec MP 2550/3350 series Ricoh Aficio MP 4000 series Ricoh Aficio MP 5000 series Savin 9040/9050 series Lanier LD040/050 series Lanier MP 4000/5000 series Gestetner MP 4000/5000 series Nashuatec MP 4000/5000 series Rex-Rotary MP 4000/5000 series Infotec MP 4000/5000 series TOE security functions Same as above.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: imagio Security Card Type 9 Software (Japanese name) DataOverwriteSecurity Unit Type I Software (English name)
- product_type: IT Product (software to overwrite data)
- report_link: https://www.ipa.go.jp/en/security/c0146_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0146_est.pdf
- toe_version: 1.01m
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0146_it7170_01.html'})]
- supplier: RICOH COMPANY, LTD.
- toe_japan_name: imagio Security Card Type 9 Software 1.01m
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0146_it7170.html
- toe_overseas_name: DataOverwriteSecurity Unit Type I Software 1.01m
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
f6d23054061d72ba |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
| pdf_data/cert_filename |
|
0939V3c_pdf.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0939-V3-2018: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 1
- EAL 6: 1
- EAL 6 augmented: 1
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20181218093705+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, EAL6, Smartcard Controller, P60D024/016/012yVB(Y/Z/A)yVF"
- /ModDate: D:20181218093912+01'00'
- /Producer: LibreOffice 5.2
- /Subject: NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
- /Title: Certificate BSI-DSZ-CC-0939-V3-2018
- pdf_file_size_bytes: 346486
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
c0146_erpt.pdf |
0939V3a_pdf.pdf |
| pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0939-V3-2018
- cert_item: NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
- cert_lab: BSI
- developer: NXP Semiconductors Germany GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0146-01: 1
- Certification No. C0146: 1
|
- DE:
- BSI-DSZ-CC-0939-V2-2016: 3
- BSI-DSZ-CC-0939-V3-2018: 16
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 3
- EAL 5+: 1
- EAL 6: 5
- EAL 6 augmented: 3
- EAL5: 1
|
| pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 1
- ALC_FLR: 3
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ATE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 37
- NXP Semiconductors: 26
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 4
- TÜViT: 1
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- other:
|
| pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 1: 1
- AIS 14: 1
- AIS 19: 1
- AIS 23: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 2
- AIS 37: 1
- AIS 38: 1
- AIS 46: 1
- AIS 47: 1
- AIS31: 1
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC 7816: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Card Controller P60D024/016/012yVB(Y/Z/A)/yVF, Version 4.4, 29 October 2018, NXP Semiconductors (confidential document) [7] Evaluation Technical Report, for the P60D024/016/012yVB(Y/Z/A)/VF, Version 4, 26 November 2018: 1
- NXP Semiconductors, Version 2.4, 24 October 2018 (confidential document) [16] Product data sheet addendum: Wafer and delivery specification SmartMX2 family P60D012/016/024: 1
- NXP Semiconductors, Version 3.2, 21 May 2014 (confidential document) [17] SmartMX2 family Post Delivery Configuration (PDC) Secure high-performance smart card: 1
- Product data sheet addendum, NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors, NXP: 1
- TÜV Informationstechnik GmbH (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [9: 1
- Version 2.50, 20 November 2015 (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung: 1
- Version 3.1, 01 October 2014 (confidential document) [19] Product Errata Sheet SmartMX2 family P60D012/016/024 VB/VF Secure high- performance smart: 1
- Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60D012/016/024 VB/VF: 1
- Version 5.2, 27 June 2014 (confidential document) [14] Instruction set for the SmartMX2 family Secure smart card controller Product data sheet, NXP: 1
- Y/Z/A)/yVF Evaluation Reference List, NXP Semiconductors, Version 3.26, 14 November 2018 (confidential document) [13] Product Data Sheet SmartMX2 family P60D012/016/024 VB/VF Secure high- performance smart card: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- controller, NXP Semiconductors, Version 1.2, 24 October 2018 (confidential document) 26 / 31 BSI-DSZ-CC-0939-V3-2018 Certification Report C. Excerpts from the Criteria For the: 1
- for the P60D024/016/012y VB(Y/Z/A)/VF, TÜV Informationstechnik GmbH, Version 4, 26 November 2018 (confidential document) [11] NXP Secure Smart Controller P60D024/016/012yVB(Y/Z/A)/ yVF Configuration List, NXP: 1
|
| pdf_data/report_metadata |
- /CreationDate: D:20080911170307+09'00'
- /ModDate: D:20080911170307+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 98568
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20181218085041+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, EAL6, Smartcard Controller, P60D024/016/012yVB(Y/Z/A)yVF"
- /ModDate: D:20181218103018+01'00'
- /Producer: LibreOffice 5.2
- /Subject: NXP Secure Smart Card Controller P60D024/016/012yVB(Y/Z/A)/yVF with IC Dedicated Software
- /Title: Certification Report BSI-DSZ-CC-0939-V3-2018
- pdf_file_size_bytes: 969617
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/, http://www.sogisportal.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
| pdf_data/st_filename |
c0146_est.pdf |
0939V3b_pdf.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6: 2
- EAL4: 3
- EAL4 augmented: 1
- EAL4+: 1
- EAL6: 38
- EAL6 augmented: 3
- EAL6+: 2
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.2: 2
- ATE_DPT.1: 1
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 1
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 3
- ADV_FSP.5: 11
- ADV_IMP: 1
- ADV_IMP.2: 4
- ADV_INT.3: 1
- ADV_SPM: 2
- ADV_SPM.1: 1
- ADV_TDS.5: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 4
- ALC_CMC.4: 3
- ALC_CMC.5: 4
- ALC_CMS: 4
- ALC_CMS.4: 3
- ALC_CMS.5: 5
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 5
- ALC_LCD.1: 1
- ALC_TAT.3: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.2: 6
- ATE:
- ATE_COV: 1
- ATE_COV.3: 4
- ATE_DPT.3: 1
- ATE_FUN.2: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 5
- FDP_SIP.1: 13
- FDP_SIP.1.1: 1
- FPT:
- FPT_RVM.1: 8
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_SAS.1: 7
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 5
- FCS_CKM.4: 3
- FCS_COP.1: 23
- FCS_COP.1.1: 2
- FCS_RNG.1: 9
- FCS_RNG.1.1: 3
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC.1: 35
- FDP_ACC.1.1: 2
- FDP_ACF.1: 32
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_FLS.1: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 5
- FDP_ITC.2: 5
- FDP_ITT.1: 6
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 4
- FMT_MSA.1: 25
- FMT_MSA.1.1: 2
- FMT_MSA.3: 20
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR.1: 7
- FPT:
- FPT_FLS.1: 7
- FPT_ITT.1: 6
- FPT_PHP.3: 7
- FRU:
|
| pdf_data/st_keywords/cc_claims |
|
- O:
- O.CUST_RECONFIG: 5
- O.EEPROM_INTEGRITY: 5
- O.FM_FW: 9
- O.HW_AES: 7
- O.MEM_ACCESS: 9
- O.RND: 3
- O.SFR_ACCESS: 9
- T:
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 115
- NXP Semiconductors: 37
- Philips:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- TDEA: 5
- Triple-DEA: 1
- Triple-DES: 9
- DES:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 10
- fault injection: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 13
- Physical Probing: 2
- physical probing: 1
- side channel: 1
- timing attacks: 2
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS PUB 197: 3
- FIPS PUB 46: 1
- ISO:
- ISO/IEC 14443: 12
- ISO/IEC 18092: 2
- ISO/IEC 7816: 18
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
- OutOfScope:
- attack capability is needed for attacks such as bypassing or tampering TSF, but those are out of scope of this evaluation. That is to say, an analysis of apparent vulnerability (AVA_VLA.1) is sufficient: 1
- out of scope: 1
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20080820190525+09'00'
- /ModDate: D:20080820190525+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- pdf_file_size_bytes: 406687
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 30
|
- /Author: NXP Semiconductors
- /CreationDate: D:20181029143412+00'00'
- /Creator: Microsoft® Word 2016
- /Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+
- /ModDate: D:20181029143412+00'00'
- /Producer: Microsoft® Word 2016
- /Subject: NXP Secure Smart Card Controller P60D024yVB(Y/Z/A)/yVF
- /Title: Security Target
- pdf_file_size_bytes: 1383576
- pdf_hyperlinks: mailto:[email protected], http://www.nxp.com/
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |