Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
HP G2.0 BC 2600PP
None
NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
BSI-DSZ-CC-0730-2011
name HP G2.0 BC 2600PP NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
category Multi-Function Devices ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme SE DE
status active archived
not_valid_after 11.06.2029 01.09.2019
not_valid_before 11.06.2024 25.05.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRA%20certifikat%20HP%20G2.0%20BC%202600PP.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certifieringsrapport%20-%20certifiering%20av%20HP%20G2.0%20BC%202600PP.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0730a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HP_G2.0_BC_2600.1-PP_ST_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0730b_pdf.pdf
manufacturer HP Inc. NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://www8.hp.com/hpnext/tags/hp-inc#.Vjdf803sn4g https://www.nxp.com
security_level EAL3+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst ed2755a96d416d4e 749c19baf65c3e87
heuristics/cert_id BSI-DSZ-CC-0730-2011
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, APE_REQ.2, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, APE_INT.1, AVA_VLA.4, APE_SPD.1, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1, AVA_MSU.3
heuristics/extracted_versions 2.0 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0710-2010, BSI-DSZ-CC-0709-2010, BSI-DSZ-CC-0609-2010, BSI-DSZ-CC-0608-2010, BSI-DSZ-CC-0417-2008, BSI-DSZ-CC-0439-2008, BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0674-2011, BSI-DSZ-CC-0410-2007
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0404-2007
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0797-2012, BSI-DSZ-CC-0798-2012, BSI-DSZ-CC-0799-2012, BSI-DSZ-CC-0804-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007
heuristics/protection_profiles 32475ccb695b1644 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf {}
pdf_data/report_filename 0730a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0730-2011
    • cert_item: NXP J3A040 & J2A040 Secure Smart Card Controller Revision 3
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0404-2007: 2
    • BSI-DSZ-CC-0674-2011: 2
    • BSI-DSZ-CC-0710-2010: 5
    • BSI-DSZ-CC-0730-2011: 24
  • NL:
    • CC-0404-2007: 1
    • CC-0674-2011: 1
pdf_data/report_keywords/cc_protection_profile_id
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 5: 7
    • EAL 5 augmented: 3
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 8
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 2
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 2
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 3
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 2
    • ATE_DPT.4: 1
    • ATE_FUN: 3
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 3
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 4
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
pdf_data/report_keywords/cc_claims
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 21
    • NXP Semiconductors: 20
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 5
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/report_keywords/pq_crypto
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/report_keywords/ecc_curve
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 1
pdf_data/report_keywords/tls_cipher_suite
pdf_data/report_keywords/crypto_library
pdf_data/report_keywords/vulnerability
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 1
    • SPA: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/device_model
pdf_data/report_keywords/tee_name
pdf_data/report_keywords/os_name
pdf_data/report_keywords/cplc_data
pdf_data/report_keywords/ic_data_group
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 3
    • AIS 36: 3
    • AIS 38: 1
    • AIS36: 1
  • FIPS:
    • FIPS 180-1: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
  • PKCS:
    • PKCS#1: 3
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
  • JavaCard:
    • Java Card 2.2.2: 2
pdf_data/report_keywords/javacard_api_const
pdf_data/report_keywords/javacard_packages
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • / P5CD020V0B / P5CC021V0B / P5CD012V0B, BSI-DSZ-CC-0710-2010, Version 1.0, 24.11.2010, Brightsight (confidential document) [18] Certification Report BSI-DSZ-CC-0404-2007 for NXP Secure Smart Card Controller P5CD040V0B: 1
    • Controller Revision 3, BSI-DSZ-CC-0730-2011, Version 3, 18.05.2011, TÜV Informationstechnik GmbH (confidential document) 10 specifically • AIS 20, Version 1, 2. December 1999, Funktionalitätsklassen und: 1
    • J3A040 and J2A040 Secure Smart Card Controller Revision 3 – Security Target, NXP Semiconductors (confidential document) [7] Java Card System - Minimal Configuration Protection Profile, Version 1.1, May 2006, part of: 1
    • J3A095 J3A080 J3A081 J3A040 J3A041 v2.4.1 R3 Secure Smart Card Controller, NXP Semiconductors (confidential document) [12] Guidance documentation for the TOE, Revision 3.1, 12.05.2011, JCOP V2.4.1 Secure Smart Card: 1
    • Report for NXP J3A040 and J2A040 Secure Smart Card Controller Rev. 3, TÜV Informationstechnik GmbH (confidential document) [10] ETR for composition according to AIS 36 for the Product NXP J3A040 and J2A040 Secure Smart: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20110629115407+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, NXP Semiconductors Germany GmbH, NXP J3A040 and J2A040 Secure Smart Card Controller Revision 3, Smartcard mit Java Card Plattform, JCOP 2.4.1, CC"
  • /ModDate: D:20110629120130+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0730-2011
  • pdf_file_size_bytes: 995280
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename HP_G2.0_BC_2600.1-PP_ST_v1.0.pdf 0730b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • SE:
    • CSEC2022013: 1
  • DE:
    • BSI-DSZ-CC-0404-2007: 1
    • BSI-DSZ-CC-0404-2007-MA-06: 1
    • BSI-DSZ-CC-0710: 3
    • BSI-DSZ-CC-0730: 2
    • BSI-DSZ-CC-404: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 3
    • BSI-PP-0035: 3
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL5: 17
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 2
    • AGD_OPE.1: 3
    • AGD_PRE: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 10
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 2
    • AVA_VAN.4: 3
    • AVA_VAN.5: 8
    • AVA_VLA.4: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
  • FCS:
    • FCS_CKM: 28
    • FCS_CKM.1: 6
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 18
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 6
    • FCS_COP: 35
    • FCS_COP.1: 5
    • FCS_COP.1.1: 3
    • FCS_RBG: 2
    • FCS_RBG_EXT.1: 19
    • FCS_RBG_EXT.1.1: 2
    • FCS_RBG_EXT.1.2: 2
  • FDP:
    • FDP_ACC: 21
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF: 20
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 8
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 21
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 19
    • FIA_UID.2.1: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 16
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 21
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MTD.1: 16
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 22
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 1
    • FPT_FDI_EXP.1: 13
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 9
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 10
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_ARP: 18
    • FAU_ARP.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 5
    • FAU_SAA.1: 20
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS: 10
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 8
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 4
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP: 52
    • FCS_COP.1: 28
    • FCS_COP.1.1: 14
    • FCS_LIM.1: 1
    • FCS_LIM.2: 1
    • FCS_RND.1: 2
    • FCS_RND.2: 1
    • FCS_RNG: 3
    • FCS_RNG.1: 15
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 24
    • FDP_ACC.1: 10
    • FDP_ACC.2: 4
    • FDP_ACF: 20
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 5
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 17
    • FDP_IFC.1: 18
    • FDP_IFF: 5
    • FDP_IFF.1: 11
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT: 9
    • FDP_ITT.1: 8
    • FDP_RIP: 10
    • FDP_RIP.1: 15
    • FDP_ROL: 5
    • FDP_ROL.1: 5
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_AFL: 6
    • FIA_AFL.1: 7
    • FIA_ATD: 4
    • FIA_ATD.1: 2
    • FIA_UAU: 10
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.4: 1
    • FIA_UID: 13
    • FIA_UID.1: 2
    • FIA_UID.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM: 7
    • FMT_LIM.1: 22
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 19
    • FMT_LIM.2.1: 2
    • FMT_MSA: 41
    • FMT_MSA.1: 10
    • FMT_MSA.2: 3
    • FMT_MSA.3: 12
    • FMT_MTD: 6
    • FMT_MTD.1: 1
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 1
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 20
    • FMT_SMR.1: 6
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_AMT.1: 3
    • FPT_FLS: 25
    • FPT_FLS.1: 9
    • FPT_ITT: 9
    • FPT_ITT.1: 9
    • FPT_PHP: 7
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 5
    • FPT_RCV: 6
    • FPT_RCV.3: 8
    • FPT_RCV.4: 2
    • FPT_RVM.1: 6
    • FPT_SEP.1: 7
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 5
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 2
  • FRU:
    • FRU_FLT: 6
    • FRU_FLT.1: 1
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITC: 5
    • FTP_ITC.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 9
    • A.EMAILS: 3
    • A.SERVICES: 4
    • A.USER: 6
  • D:
    • D.CONF: 5
    • D.DOC: 13
    • D.FUNC: 7
    • D.PROT: 3
  • O:
    • O.AUDIT: 9
    • O.CONF: 29
    • O.DOC: 37
    • O.FUNC: 18
    • O.INTERFACE: 10
    • O.PROT: 15
    • O.SOFTWARE: 6
    • O.USER: 23
  • OE:
    • OE.ADMIN: 10
    • OE.ADMIN_TRAINED: 1
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 3
    • OE.AUDIT_STORAGE: 3
    • OE.EMAILS: 3
    • OE.INTERFACE: 3
    • OE.PHYSICAL: 3
    • OE.SERVICES: 4
    • OE.USER: 15
    • OE.USERNAME: 3
  • T:
    • T.CONF: 10
    • T.DOC: 10
    • T.FUNC: 5
    • T.PROT: 5
  • A:
    • A.NATIVE: 7
    • A.NO-: 2
    • A.NO-DELETION: 6
    • A.NO-INSTALL: 5
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 6
    • A.VERIFICATION: 7
  • D:
    • D.API_DATA: 3
    • D.APP_CODE: 9
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 7
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JAVA_OBJECT: 4
    • D.JCS_CODE: 3
    • D.JCS_DATA: 4
    • D.PIN: 15
    • D.SEC_DATA: 5
  • O:
    • O.AES: 2
    • O.ALARM: 5
    • O.CARD-: 1
    • O.CARD-MANAGEMENT: 10
    • O.CIPHER: 12
    • O.CONFIG: 1
    • O.COPY: 1
    • O.ECC: 2
    • O.FAULT_PROTECT: 5
    • O.FIREWALL: 9
    • O.HW_AES: 2
    • O.IDENTIFICATION: 6
    • O.KEY-MNGT: 10
    • O.MEM_ACCESS: 3
    • O.MF_FW: 6
    • O.OPERATE: 16
    • O.OS_DECEIVE: 7
    • O.PHYSICAL: 8
    • O.PIN-MNGT: 5
    • O.PROTECT_DATA: 10
    • O.REALLOCATION: 4
    • O.RESOURCES: 11
    • O.REUSE: 2
    • O.RND: 13
    • O.RSA: 1
    • O.SCP: 36
    • O.SHA: 2
    • O.SHRD_VAR_CON: 1
    • O.SHRD_VAR_CONFID: 9
    • O.SHRD_VAR_INTE: 1
    • O.SHRD_VAR_INTEG: 3
    • O.SID: 13
    • O.SIDE_CHANNEL: 6
    • O.TRANSACTION: 4
    • O.XYZ: 1
  • OE:
    • OE.CARD-MANAGEMENT: 2
    • OE.NATIVE: 5
    • OE.NO-DELETION: 4
    • OE.NO-INSTALL: 7
    • OE.SCP: 5
    • OE.USE_DIAG: 5
    • OE.USE_KEY: 2
    • OE.USE_KEYS: 4
    • OE.VERIFICATION: 9
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 3
    • OP.CREATE: 7
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 3
    • OP.JAVA: 5
    • OP.PUT: 5
    • OP.THROW: 3
    • OP.TYPE_ACCESS: 3
  • OSP:
    • OSP.PRO: 1
    • OSP.PROCESS-TOE: 3
  • R:
    • R.JAVA: 5
  • T:
    • T.ACCES: 1
    • T.ACCESS_DAT: 1
    • T.ACCESS_DATA: 2
    • T.CONFID: 2
    • T.CONFID-: 1
    • T.CONFID-APPLI-: 1
    • T.CONFID-APPLI-DATA: 3
    • T.CONFID-JCS-: 4
    • T.CONFID-JCS-CODE: 4
    • T.CONFID-JCS-DATA: 4
    • T.EXE-CODE: 11
    • T.FAULT: 7
    • T.INTEG-: 3
    • T.INTEG-APPLI-: 4
    • T.INTEG-APPLI-CODE: 1
    • T.INTEG-APPLI-DATA: 3
    • T.INTEG-JCS-: 4
    • T.INTEG-JCS-CODE: 4
    • T.INTEG-JCS-DATA: 3
    • T.LEAKA: 1
    • T.LEAKAGE: 6
    • T.OS: 2
    • T.OS_DE: 1
    • T.OS_DECEIVE: 6
    • T.OS_OP: 1
    • T.OS_OPERATE: 5
    • T.PHYSIC: 1
    • T.PHYSICAL: 4
    • T.RESOU: 1
    • T.RESOURCES: 5
    • T.RND: 6
    • T.SID: 12
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 1
  • NXP:
    • NXP: 120
    • NXP Semiconductors: 13
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 19
      • AES-128: 4
      • AES-192: 4
      • AES-256: 7
  • constructions:
    • MAC:
      • HMAC: 16
      • HMAC-SHA-256: 2
      • HMAC-SHA-384: 3
      • HMAC-SHA-512: 3
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 5
      • Triple-DES: 6
    • DES:
      • DES: 16
  • constructions:
    • MAC:
      • CBC-MAC: 3
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 5
  • RSA:
    • RSA 2048: 1
  • ECC:
    • ECC:
      • ECC: 22
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • PBKDF:
    • PBKDF2: 5
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 14
      • SHA-384: 6
      • SHA-512: 6
  • SHA:
    • SHA1:
      • SHA-1: 14
    • SHA2:
      • SHA-224: 8
      • SHA-256: 7
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 12
  • MAC:
    • MAC: 1
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 8
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 21
    • IKEv1: 20
    • IKEv2: 24
  • IPsec:
    • IPsec: 212
  • SSH:
    • SSH: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 2
  • RNG:
    • RND: 20
    • RNG: 13
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 7
  • ECB:
    • ECB: 2
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 6
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
    • physical tampering: 1
  • FI:
    • DFA: 3
    • Malfunction: 7
    • Physical tampering: 4
    • malfunction: 5
    • physical tampering: 3
  • SCA:
    • DPA: 5
    • Leak-Inherent: 7
    • SPA: 4
    • physical probing: 4
    • side channel: 2
    • side-channel: 1
    • timing attack: 2
    • timing attacks: 2
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 117
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-4: 5
    • FIPS186-4: 2
    • FIPS197: 4
    • FIPS198-1: 2
  • NIST:
    • NIST SP 800-57: 2
    • NIST SP 800-90A: 2
  • RFC:
    • RFC1321: 1
    • RFC2104: 5
    • RFC2404: 3
    • RFC2407: 2
    • RFC2408: 2
    • RFC2409: 2
    • RFC3526: 5
    • RFC3602: 2
    • RFC4109: 4
    • RFC4301: 2
    • RFC4303: 2
    • RFC4306: 4
    • RFC4718: 3
    • RFC4868: 4
    • RFC4894: 1
    • RFC5996: 3
  • BSI:
    • AIS 20: 6
  • FIPS:
    • FIPS 180-3: 3
    • FIPS 197: 1
    • FIPS 46-3: 2
    • FIPS PUB 180-3: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
  • PKCS:
    • PKCS#1: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 2
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 3
pdf_data/st_keywords/javacard_packages
  • java:
    • java.lang: 1
  • javacard:
    • javacard.framework: 2
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Groups marked with ‗IT‘ are considered in the TOE IT environment, and groups marked with ‗—‗ are out of scope of this evaluation. Table 4. TOE Groups Overview Group Description Scope NXP Semiconductors JCOP 2: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Anthony J Peterson;[email protected]
  • /CreationDate: D:20240125091656-07'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240614101310+02'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • /Title: HP G2.0 and BC 2600.1 ST
  • pdf_file_size_bytes: 1223954
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 114
  • /Author: NXP Semiconductors
  • /CreationDate: D:20110513095203
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Common Criteria Evaluation, NXP J3A040, J2A040, Revision 3, JavaCard
  • /ModDate: D:20110513095203
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Common Criteria Evaluation
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1914693
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 116
state/report/convert_ok False True
state/report/download_ok False True
state/report/extract_ok False True
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different