Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ZTE Base Station Controller Series
SERTIT-038
J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
NSCIB-CC-13-37761-CR2
name ZTE Base Station Controller Series J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NO NL
not_valid_after 01.09.2019 05.08.2018
not_valid_before 14.09.2012 26.08.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-038%20CR%20v.1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CR]%20NSCIB-CC-13-37761-CR2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST]%20ZTE%20Base%20Station%20Controllers%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_Lite_JxE081_v00.02.pdf
manufacturer ZTE Corporation NXP Semiconductors Germany GmbH Business Line Identification
manufacturer_web https://wwwen.zte.com.cn/global/index.html https://www.nxp.com
security_level EAL2+, ALC_FLR.2 EAL5+, ASE_TSS.2, AVA_VAN.5, ALC_DVS.2
dgst f64f9dac4a49fc2b ef5701cc183f2e46
heuristics/cert_id SERTIT-038 NSCIB-CC-13-37761-CR2
heuristics/cert_lab []
heuristics/cpe_matches {} cpe:2.3:h:nxp:j2e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m66:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e041_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e081_m64:-:*:*:*:*:*:*:*, cpe:2.3:h:nxp:j3e016_m66:-:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2021-3011
heuristics/extracted_sars ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.1, AGD_OPE.1, ADV_TDS.1, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ALC_FLR.2 ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_INT.2, ATE_IND.2, AGD_PRE.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ATE_COV.2, ASE_OBJ.2, ASE_SPD.1, ALC_CMS.5, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ALC_DEL.1, ASE_TSS.2, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1
heuristics/extracted_versions - 3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0825-2017
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0633-V2-2014, NSCIB-CC-13-37762-CR
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0825-2017
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0555-2009, BSI-DSZ-CC-0857-2013, NSCIB-CC-13-37762-CR
heuristics/scheme_data
  • category: Access Control Devices and Systems
  • certification_date: 14.09.2012
  • developer: ZTE Corporation
  • enhanced:
    • category: Access Control Devices and Systems
    • cert_id: SERTIT-038
    • certification_date: 14.09.2012
    • description: SERTIT-038 C
    • developer: ZTE Corporation
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/134797-1607951074/SERTIT/Sertifikater/2012/38/%5BST%5D%20ZTE%20Base%20Station%20Controllers%20Security%20Target%20v1.0.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/134794-1607951069/SERTIT/Sertifikater/2012/38/SERTIT-038%20CR%20v.1.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 2, ALC_FLR.2
    • mutual_recognition: CCRA
    • product: ZTE ZXG10 iBSC Base Station Controller, V6.20.614, ZXC10 BSCB CDMA2000 Base Station Controller, V8.0.3.400, and ZXWR RNC WCDMA Radio Network Controller, V3.09.30
    • sponsor: ZTE Corporation
  • product: ZTE Base Station Controller Series
  • url: https://sertit.no/certified-products/product-archive/zte-base-station-controller-series
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0825-2017
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0821-2014, BSI-DSZ-CC-0825-2017
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0857-2013
heuristics/protection_profiles {} 85bef5b6f16c4d33
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf
pdf_data/report_filename SERTIT-038 CR v.1.0.pdf [CR] NSCIB-CC-13-37761-CR2.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-13-37761-CR2
    • cert_item: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, and J3E041_M64 Secure Smart Card Controller Revision 3
    • cert_lab: Brightsight
    • developer: NXP Semiconductors Germany GmbH
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-038: 22
  • DE:
    • BSI-DSZ-CC-0633-V2-: 1
    • BSI-DSZ-CC-0633-V2-2014: 1
    • BSI-DSZ-CC-0857: 2
    • BSI-DSZ-CC-0857-: 1
    • BSI-DSZ-CC-783: 1
    • BSI-DSZ-CC-784: 1
    • BSI-DSZ-CC-860: 1
  • NL:
    • CC-0857: 1
    • NSCIB-CC-13-37760: 1
    • NSCIB-CC-13-37761: 4
    • NSCIB-CC-13-37761-CR2: 14
    • NSCIB-CC-13-37762: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL1: 1
    • EAL2: 23
    • EAL2 augmented: 22
    • EAL2+: 1
    • EAL7: 1
  • EAL:
    • EAL4: 2
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 26
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAR.1: 1
    • FAU_STG.1: 1
    • FAU_STG.4: 1
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
    • FDP_ITT.1: 2
  • FIA:
    • FIA_AFL.1: 1
    • FIA_SOS.1: 1
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FTA:
    • FTA_MCS.1: 1
    • FTA_SSL.3: 1
pdf_data/report_keywords/cc_claims
  • O:
    • O.AUDITING: 1
    • O.AUTHENTICATE: 1
    • O.AUTHORISE: 1
    • O.PROTECT_COMMUNICATION: 1
  • OE:
    • OE.CLIENT_SECURITY: 1
    • OE.PROTECT_COMMUNICATION: 1
    • OE.SERVER_SECURITY: 1
    • OE.TIME: 1
    • OE.TRUSTED_SYSTEMS: 1
  • T:
    • T.AUTHORISED: 1
    • T.PHYSICAL_ATTACK: 1
    • T.UNAUTHORISED: 1
    • T.UNKNOWN_USER: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 19
    • NXP Semiconductors: 4
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • BrightSight:
    • Brightsight: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 1
    • DES:
      • DES: 2
  • constructions:
    • MAC:
      • CBC-MAC: 1
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 5
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 2
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/cipher_mode
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 2
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
  • other:
    • JIL: 5
    • JIL-AM: 1
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 9
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 15408: 2
  • BSI:
    • AIS36: 2
  • ICAO:
    • ICAO: 1
  • SCP:
    • SCP01: 2
    • SCP02: 2
    • SCP03: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 3
  • JavaCard:
    • Java Card 3.0.1: 3
pdf_data/report_metadata
  • /Author: Kvassnes, Kjartan Jæger
  • /CreationDate: D:20120913104603+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20120913104659+02'00'
  • /Producer: Microsoft® Word 2010
  • /Title: tittel
  • pdf_file_size_bytes: 831867
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename [ST] ZTE Base Station Controllers Security Target v1.0.pdf ST_Lite_JxE081_v00.02.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0633-: 1
    • BSI-DSZ-CC-0857: 1
    • BSI-DSZ-CC-0857-2013: 1
    • BSI-DSZ-CC-0858: 1
  • NL:
    • NSCIB-CC-13-37761: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0017: 2
    • BSI-PP-0035: 2
    • BSI-PP-0035-2007: 1
    • BSI-PP-0035-2007“: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 2
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL5: 19
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 1
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 4
    • AGD_PRE: 1
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 3
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 3
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.3: 3
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 4
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACC.2: 6
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 2
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_SMF.1: 1
    • FPT_STM: 1
  • FTA:
    • FTA_MCS.1: 4
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_ARP.1: 29
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_SAA.1: 2
    • FAU_SAS: 13
    • FAU_SAS.1: 5
    • FAU_SAS.1.1: 1
  • FCO:
    • FCO_NRO: 7
    • FCO_NRO.2: 3
  • FCS:
    • FCS_CKM.1: 47
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 8
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 42
    • FCS_CKM.4.1: 1
    • FCS_COP: 33
    • FCS_COP.1: 26
    • FCS_RNG: 13
    • FCS_RNG.1: 20
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC: 72
    • FDP_ACC.1: 19
    • FDP_ACC.2: 9
    • FDP_ACF: 65
    • FDP_ACF.1: 39
    • FDP_IFC: 26
    • FDP_IFC.1: 17
    • FDP_IFC.2: 2
    • FDP_IFF: 19
    • FDP_IFF.1: 13
    • FDP_ITC: 10
    • FDP_ITC.1: 17
    • FDP_ITC.2: 22
    • FDP_RIP: 91
    • FDP_RIP.1: 10
    • FDP_ROL: 11
    • FDP_ROL.1: 5
    • FDP_SDI.2: 8
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UIT: 7
    • FDP_UIT.1: 2
  • FIA:
    • FIA_AFL: 12
    • FIA_AFL.1: 2
    • FIA_ATD: 9
    • FIA_ATD.1: 2
    • FIA_UAU.1: 3
    • FIA_UID: 18
    • FIA_UID.1: 11
    • FIA_UID.2: 1
    • FIA_USB: 8
    • FIA_USB.1: 3
  • FMT:
    • FMT_MSA: 146
    • FMT_MSA.1: 16
    • FMT_MSA.2: 3
    • FMT_MSA.3: 27
    • FMT_MTD: 18
    • FMT_MTD.1: 2
    • FMT_MTD.3: 1
    • FMT_REV: 1
    • FMT_SMF: 42
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 1
    • FMT_SMR: 35
    • FMT_SMR.1: 34
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 9
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS: 40
    • FPT_FLS.1: 25
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 1
    • FPT_PHP: 6
    • FPT_PHP.3: 3
    • FPT_RCV: 10
    • FPT_RCV.3: 4
    • FPT_TDC.1: 7
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT: 11
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC: 18
    • FTP_ITC.1: 6
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.TRUSTED_SYSTEMS: 2
  • O:
    • O.AUDITING: 4
    • O.AUTHENTICATE: 4
    • O.AUTHORISE: 3
    • O.PROTECT_COMMUNICATION: 3
  • OE:
    • OE.CLIENT_SECURITY: 3
    • OE.PROTECT_COMMUNICATION: 2
    • OE.SERVER_SECURITY: 2
    • OE.TIME: 3
    • OE.TRUSTED_SYSTEMS: 2
  • OSP:
    • OSP.USERS: 2
  • T:
    • T.AUTHORISED: 2
    • T.NETWORK: 1
    • T.PHYSICAL_ATTACK: 2
    • T.UNAUTHORISED: 2
    • T.UNKNOWN_USER: 2
  • A:
    • A.APPLET: 4
    • A.NATIVE: 1
    • A.PPROCESS-SEC-IC: 1
    • A.PROCESS-SEC-IC: 1
    • A.PROCESS_SEC_IC: 2
    • A.USE_DIAG: 6
    • A.USE_KEY: 1
    • A.USE_KEYS: 5
    • A.VERIFICATION: 3
  • D:
    • D.ADMIN_CONF_DATA: 3
    • D.API_DATA: 3
    • D.APP_CODE: 10
    • D.APP_C_DATA: 3
    • D.APP_I_DATA: 8
    • D.APP_KEY: 1
    • D.CRYPTO: 7
    • D.JCS_CODE: 3
    • D.JCS_DATA: 5
    • D.PERSO_CONF_DATA: 4
    • D.PIN: 12
    • D.SEC_DATA: 7
  • O:
    • O.APPLET: 18
    • O.CIPHER: 1
    • O.CODE_: 1
    • O.CODE_PKG: 13
    • O.EXT-MEM: 1
    • O.EXT_MEM_IN: 2
    • O.EXT_MEM_INSTANCE: 8
    • O.JAVAOBJECT: 36
    • O.NON_SB_CONTENT: 1
    • O.NON_SB_SFR: 4
    • O.REMOTE_MTHD: 4
    • O.REMOTE_OBJ: 4
    • O.RMI_SERVICE: 5
    • O.ROR: 2
    • O.SB_CONTENT: 3
    • O.SB_SFR: 5
    • O.SCP: 1
  • OE:
    • OE.APPLET: 7
    • OE.CARD-MANAGEMENT: 1
    • OE.NATIVE: 1
    • OE.PROCESS_SEC_IC: 6
    • OE.SCP: 2
    • OE.USE_DIAG: 9
    • OE.USE_KEYS: 7
    • OE.VERIFICATION: 20
    • OE.XYZ: 1
  • OP:
    • OP.ARRAY_ACCESS: 4
    • OP.CREATE: 7
    • OP.CREATE_EXT_MEM_INSTANCE: 3
    • OP.DELETE_APPLET: 4
    • OP.DELETE_PCKG: 3
    • OP.DELETE_PCKG_APPLET: 3
    • OP.GET_ROR: 2
    • OP.INSTANCE_FIELD: 4
    • OP.INVK_INTERFACE: 6
    • OP.INVK_VIRTUAL: 5
    • OP.INVOKE: 3
    • OP.JAVA: 5
    • OP.PUT: 6
    • OP.READ_EXT_MEM: 3
    • OP.RET_RORD: 2
    • OP.SB_ACCESS: 3
    • OP.SB_ACCESS_SFR: 3
    • OP.THROW: 4
    • OP.TYPE_ACCESS: 4
    • OP.WRITE_EXT_MEM: 3
  • OSP:
    • OSP.PROCESS-TOE: 5
    • OSP.VERIFICATION: 3
  • OT:
    • OT.ALARM: 15
    • OT.CARD-: 2
    • OT.CARD-MANAGEMENT: 17
    • OT.CIPHER: 11
    • OT.DELETION: 7
    • OT.EXT-MEM: 14
    • OT.FIREWALL: 18
    • OT.GLOBAL_ARRAYS_CONFID: 9
    • OT.GLOBAL_ARRAYS_INTEG: 10
    • OT.IDENTIFICATION: 9
    • OT.INSTALL: 10
    • OT.KEY-: 1
    • OT.KEY-MNGT: 9
    • OT.LOAD: 9
    • OT.MF_FW: 8
    • OT.NATIVE: 9
    • OT.OBJ-DELETION: 8
    • OT.OPERATE: 21
    • OT.PIN-MNGT: 11
    • OT.REALLOCATION: 9
    • OT.REMOTE: 8
    • OT.RESOURCES: 10
    • OT.RND: 13
    • OT.SCP: 40
    • OT.SEC_BOX_FW: 10
    • OT.SID: 13
    • OT.TRANSACTION: 9
    • OT.VERIFICATION: 1
    • OT.XYZ: 1
  • R:
    • R.JAVA: 12
  • T:
    • T.CONFID-APPLI-DATA: 5
    • T.CONFID-JCS-CODE: 5
    • T.CONFID-JCS-DATA: 5
    • T.DELETION: 4
    • T.EXE-CODE: 8
    • T.EXE-CODE-REMOTE: 4
    • T.INSTALL: 4
    • T.INTEG-APPLI-: 2
    • T.INTEG-APPLI-CODE: 8
    • T.INTEG-APPLI-DATA: 8
    • T.INTEG-JCS-CODE: 5
    • T.INTEG-JCS-DATA: 5
    • T.NATIVE: 5
    • T.OBJ-DELETION: 4
    • T.OS_OPERATE: 7
    • T.PHYSICAL: 4
    • T.RESOURCES: 4
    • T.RND: 7
    • T.SEC_BOX_BORDER: 7
    • T.SID: 8
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 23
    • NXP Semiconductors: 18
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 24
  • DES:
    • 3DES:
      • 3DES: 1
      • TDEA: 1
      • TDES: 2
      • Triple-DES: 7
      • TripleDES: 1
    • DES:
      • DES: 17
  • constructions:
    • MAC:
      • CBC-MAC: 7
      • CMAC: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 19
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • Diffie-Hellman: 6
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 13
    • SHA2:
      • SHA-2: 3
      • SHA-224: 8
      • SHA-256: 14
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 21
    • RNG: 17
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 1
  • CBC:
    • CBC: 24
  • ECB:
    • ECB: 5
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 7
    • Fault Injection: 1
    • Physical tampering: 3
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 10
    • SPA: 2
    • physical probing: 3
    • side channel: 17
    • side-channel: 1
    • side-channels: 2
    • timing attack: 1
    • timing attacks: 6
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/os_name
  • JCOP:
    • JCOP 2: 142
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 8
    • AIS31: 2
  • CC:
    • CCMB-2012-09-004: 2
  • FIPS:
    • FIPS 180-3: 6
    • FIPS 186-3: 5
    • FIPS 197: 2
    • FIPS PUB 180-3: 1
    • FIPS PUB 186-2: 1
    • FIPS PUB 186-3: 1
    • FIPS PUB 81: 1
  • ICAO:
    • ICAO: 4
  • ISO:
    • ISO/IEC 11770: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 9796-: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 2
    • PKCS#3: 2
    • PKCS1: 1
  • RFC:
    • RFC 5639: 2
  • SCP:
    • SCP01: 1
    • SCP02: 1
    • SCP03: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.2.1: 1
    • GlobalPlatform 2.2.1: 2
  • JavaCard:
    • Java Card 3.0.1: 4
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 5
pdf_data/st_keywords/javacard_packages
  • com:
    • com.cn: 3
  • java:
    • java.lang: 1
    • java.rmi: 2
  • javacard:
    • javacard.framework: 4
    • javacard.framework.applet: 1
    • javacard.security: 4
  • javacardx:
    • javacardx.crypto: 2
    • javacardx.rmi: 1
    • javacardx.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for ZTE maintenance staff that regularly service the TOE using the systems console, but this is out of scope and not described further in this ST. Operations l Locking (of a user): a locked user can no longer: 1
    • out of scope: 1
  • OutOfScope:
    • Groups marked with ‘IT’ are considered in the TOE IT environment, and groups marked with ‘—‘ are out of scope of this evaluation. Table 8. TOE Groups Overview Group Description Scope Core (CoreG) The CoreG: 1
    • a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives OT.SCP.RECOVERY and OT.SCP.SUPPORT are: 1
    • out of scope: 2
pdf_data/st_metadata
  • /Compression level: 6
  • /Compression type: auto
  • /Config File: C:\Program Files\PTC\Arbortext Editor\lib\standard.pdfcf
  • /CreationDate: D:20120529183839+08'00'
  • /Creator: Arbortext 5.4
  • /EPS processor: PStill version 1.74.14
  • /Graphics resolution: 600
  • /Graphics resolution threshold: 900
  • /JPEG quality: 80
  • /Producer: PDFlib+PDI 7.0.4 (Win32)
  • pdf_file_size_bytes: 535596
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Author: NXP Semiconductors
  • /CreationDate: D:20140814171823+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: JCOP, Security Target Lite, EAL5+
  • /ModDate: D:20140814173505+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: NXP J3E081_M64, J3E081_M66, J2E081_M64, J3E041_M66, J3E016_M66, J3E016_M64, J3E041_M64 Secure Smart Card Controller Revision 3
  • /Title: Security Target Lite
  • pdf_file_size_bytes: 1527330
  • pdf_hyperlinks: mailto:[email protected], http://www.nxp.com/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 137
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different