NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1

CSV information

Status active
Valid from 17.06.2024
Valid until 17.06.2029
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level AVA_VAN.5, EAL5+, ASE_TSS.2, ALC_DVS.2, ALC_FLR.1
Protection profiles

Heuristics summary

Certificate ID: NSCIB-CC-2300174-01-CR

Certificate

Extracted keywords

Operating System name
JCOP 6
Vendor
NXP Semiconductors, NXP

Security level
EAL5, EAL2, EAL7, EAL5 augmented
Security Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.1, ALC_FLR.3, ALC_FLR, AVA_VAN.5, ASE_TSS.2
Protection profiles
BSI-CC-PP-0099-v2-2020, BSI-CC-PP-0100-2018
Certificates
NSCIB-CC-2300174-01, NSCIB-2300174-01, CC-22-0428888
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Microsoft Office User
Creation date D:20240618113253+01'00'
Modification date D:20240618113253+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report

Extracted keywords

Symmetric Algorithms
AES, 3DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
ECDSA, ECC
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3
Schemes
MAC
Libraries
Crypto Library 2.2.0, Crypto Library 2.3.1
Block cipher modes
ECB, CBC, GCM

JavaCard versions
Java Card 3.0.5, Java Card 3.1
Operating System name
JCOP 6, JCOP6
Vendor
NXP, NXP Semiconductors

Security level
EAL4, EAL5, EAL5+, EAL 5, EAL5 augmented, EAL 5 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, AVA_VAN, ASE_TSS.2
Protection profiles
BSI-CC-PP-0099-v2-
Certificates
NSCIB-CC-2300174-01-CR, NSCIB-2300174-01, NSCIB-CC-2300181-01-CR
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Side-channel analysis
side-channel, JIL-AM, JIL, JIL-AAPS

Standards
AIS 20

File metadata

Title Certification Report
Author Microsoft Office User
Creation date D:20240715091616+01'00'
Modification date D:20240715091616+01'00'
Pages 15
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2300174-01-CR
Certified item NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1
Certification lab SGS Brightsight B.V.
Developer NXP Semiconductors GmbH

References

Outgoing

Security target

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-128, AES-, DES, 3DES, TripleDES, Triple-DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA 1024, RSA-CRT, ECDHE, ECDH, ECDSA, EdDSA, ECC, Diffie-Hellman, DH
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, SHA-3
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RND, RNG
Elliptic Curves
Curve P-256, Curve P-384, P-256, P-384, P-512, NIST P-256, brainpoolP256r1, brainpoolP384r1, brainpoolP512r1
Block cipher modes
ECB, CBC, CTR, CFB, OFB, GCM, CCM

JavaCard versions
Java Card 3.1
JavaCard API constants
ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_ISO9797_M2, ALG_DES_CBC_NOPAD, ALG_DES_ECB_ISO9797_M1, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_CBC_PKCS5, ALG_DES_ECB_PKCS5, ALG_DES_CBC_PKCS7, ALG_DES_ECB_PKCS7, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC4_NOPAD, ALG_DES_MAC8_ISO9797_1_M1_ALG3, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M1, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_NOPAD, ALG_DES_MAC4_PKCS5, ALG_DES_MAC8_PKCS5, ALG_DES_CMAC8, ALG_RSA_NOPAD, ALG_RSA_PKCS1, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_224_PKCS1, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_ISO9796_MR, ALG_RSA_SHA_PKCS1, ALG_RSA_SECURE_SHA_PKCS1, ALG_RSA_SHA_PKCS1_PSS, ALG_ECDSA_SHA, ALG_ECDSA_SHA_224, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_GCM, ALG_AES_BLOCK_128_CBC_NOPAD, ALG_AES_BLOCK_128_CBC_NOPAD_, ALG_AES_BLOCK_128_ECB_NOPAD, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_CBC_ISO9797_M2_STANDARD, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_ISO9797_M2, ALG_AES_CBC_PKCS5, ALG_AES_ECB_PKCS5, ALG_AES_CBC_PKCS7, ALG_AES_ECB_PKCS7, ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD, ALG_AES_CBC_ISO9797_STANDARD, ALG_AES_MAC_128_NOPAD, ALG_AES_CMAC8, ALG_AES_CMAC16, ALG_AES_CMAC16_STANDARD, ALG_AES_CMAC128, ALG_AES_XTS, ALG_HMAC_SHA1, ALG_HMAC_SHA_256, ALG_HMAC_SHA_384, ALG_HMAC_SHA_512, ALG_HMAC_MD5, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_KDF, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_DHC_KDF, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, ALG_EC_SVDP_DHC_PACE, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA_224, ALG_SHA3_224, ALG_SHA3_256, ALG_SHA3_384, ALG_SHA3_512, ALG_MD5, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA, SIG_CIPHER_AES_CMAC8, SIG_CIPHER_AES_CMAC16, SIG_CIPHER_AES_CMAC128, SIG_CIPHER_DES_CMAC8, PAD_PKCS1_OAEP, LENGTH_DES3_2KEY, LENGTH_DES3_3KEY, LENGTH_AES_128, LENGTH_AES_192, LENGTH_AES_256, LENGTH_DES3_, LENGTH_EC_FP_224, LENGTH_EC_FP_384, LENGTH_EC_FP_128, LENGTH_EC_FP_192, LENGTH_EC_FP_256, LENGTH_EC_FP_512, LENGTH_SHA, LENGTH_SHA_224, LENGTH_SHA_256, LENGTH_SHA_384, LENGTH_SHA_512, LENGTH_SHA3_224, LENGTH_SHA3_256, LENGTH_SHA3_384, LENGTH_SHA3_512, LENGTH_RSA_1024
Operating System name
JCOP 6, JCOP6, JCOP 2, JCOP 4
Vendor
NXP, NXP Semiconductors

Security level
EAL5, EAL5 augmented
Claims
D.UPDATE_IMAGE, D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.PIN, D.APSD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.CARD_MNGT_DATA, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG_ITEM, D.MODULE_CODE, D.MODULE_DATA, D.TOE_IDENTIFIER, D.APP_C_, D.CARD_, D.JCS_, D.ATTACK_COUNTER, D.TOE_IDENTIFICATION, T.INTEG-APPLI-DATA, T.UNAUTHORIZED_CARD_MNGT, T.LIFE_CYCLE, T.CONFIG, T.UNAUTH-LOAD-UPDATE-IMAGE, T.INTERRUPT-OSU, T.INSTALL, T.DELETION, T.COM_EXPLOIT, T.RND, T.CONFID-UPDATE-IMAGE, T.INTEG-UPDATE-IMAGE, T.ATTACK-COUNTER, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.CONFID-JCS-CODE, T.INTEG-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-JCS-DATA, T.INTEG-APPLI-, T.INTEG-APPLI-CODE, T.EXE-CODE, T.EXE-, T.NATIVE, T.SID, T.RESOURCES, T.OBJ-DELETION, T.PHYSICAL, T.UNAUTHORIZED_, T.CONFID-UPDATE-I, T.UNAUTH-LOAD-UP, T.INTEG-UPDATE-IM, A.USE_DIAG, A.USE_KEYS, A.PROCESS-SEC-IC, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.VERIFICATION-AU, OT.IDENTIFICATION, OT.RND, OT.CONFID-UPDATE-IMAGE, OT.AUTH-LOAD-UPDATE-IMAGE, OT.SECURE_LOAD_ACODE, OT.SECURE_AC_ACTIVATION, OT.TOE_IDENTIFICATION, OT.CARD-CONFIGURATION, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OT.DOMAIN-RIGHTS, OT.APPLI-AUTH, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.AUTH-LOAD-, OT.SCP, OT.CARD-MANAGEMENT, OT.CARD-, OT.INSTALL, OT.LOAD, OT.DELETION, OT.REMOTE, OT.EXT-MEM, OT.FIREWALL, OT.SID, OT.GLOBAL_ARRAYS_CONFID, OT.NATIVE, OT.REALLOCATION, OT.ALARM, OT.RNG, OT.TRANSACTION, OT.ARRAY_VIEWS_CONFID, OT.SENSITIVE_RESULTS_INTEG, OT.CRT-MNGT, OT.CIPHER, OT.KEY-MNGT, OT.OPERATE, OT.RESOURCE, OT.CONFID-UPDATE-, OT.AUTH-LOAD-UPD, OT.SECURE_LOAD_, OT.SECURE_AC_, OT.TOE_, OT.CARD-CONFIGUR, OT.ATTACK-COUNT, OT.RESTRICTED-MO, OT.COMM_, OT.GLOBAL_, OT.PIN-MNGT, OT.CARD-MANAGEM, OT.ATTACK-COUNTE, OP.READ_CONFIG_, OP.MODIFY_, OP.USE_CONFIG_, OP.TRIGGER_, OP.TRIGGER_UPDATE, OE.USE_DIAG, OE.USE_KEYS, OE.CAP_FILE, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.PROCESS_SEC_IC, OE.CONFID-UPDATE-IMAGE, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.KEY-, OE.IC, OE.RE, OE.VERIFICATION-AUTHOR, OE.CONFID-UPDATE-, OE.PROCESS_SEC_, OE.VERIFICATION-A, OE.SECURITY-DOMA, SA.CONFID-UPDATE, SA.INTEG-UPDATE-I, SA.CONFIG-APPLET, SA.OSU, SA.RM, SA.INTEG-APPLI-DATA, SA.CONFID-UPDATE-IMAGE, SA.INTEG-UPDATE-IMAGE, SA.SCP, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURITY-DOM
Security Assurance Requirements (SAR)
ADV_ARC, ALC_DVS.2, ALC_FLR.1, AVA_VAN.5, ASE_INT, ASE_TSS.2, ASE_SPD, ASE_REQ, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_ARP.1.1, FAU_SAS.1.1, FAU_SAA.1, FAU_ARP.1, FCO_NRO, FCO_NRO.2, FCO_NRO.1, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_RNG.1, FCS_COP, FCS_CKM, FCS_CKM.4, FCS_CKM.1, FCS_COP.1, FCS_COP.1.1, FCS_RNG, FCS_CKM.5, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM.5.1, FCS_CKM.2, FDP_ITC, FDP_ITC.2, FDP_IFC, FDP_IFC.2, FDP_IFF, FDP_IFF.1, FDP_UIT, FDP_UIT.1, FDP_ROL.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_SDI, FDP_SDC.1, FDP_ACF.1.2, FDP_SDC, FDP_SDI.2.1, FDP_SDI.2.2, FDP_IFC.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ROL.1.1, FDP_ROL.1.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.2.1, FDP_IFC.2.2, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ACC.2.1, FDP_ACC.2.2, FDP_DAU.2.1, FDP_SDC.1.1, FDP_RIP.1, FDP_SDI.2, FDP_UCT.1, FDP_SDI.1, FDP_DAU.2, FDP_ETC.2, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_AFL.1, FIA_ATD.1, FIA_UAU.5, FIA_UAU.6, FIA_USB.1, FIA_API, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UAU.6.1, FIA_UID.2, FIA_API.1, FMT_MSA, FMT_MSA.1, FMT_MSA.3, FMT_SMF, FMT_SMF.1, FMT_SMR, FMT_SMR.1, FMT_MOF.1, FMT_MSA.2, FMT_MTD.3, FMT_SAE, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1.1, FMT_SAE.1.1, FMT_MSA.2.1, FMT_MOF.1.1, FMT_MTD.1, FMT_SAE.1, FPR_UNO.1.1, FPR_UNO.1, FPT_FLS.1, FPT_PHP.3, FPT_STM, FPT_TST.1, FPT_EMS, FPT_TCT, FPT_TIT, FPT_ISA, FPT_ESA, FPT_TDC.1.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_TDC.1, FPT_FLS.1.1, FPT_PHP.3.1, FPT_ISA.1.5, FPT_ESA.1.4, FPT_TST.1.1, FPT_RCV.3, FPT_TCT.1, FPT_TIT.1, FPT_ISA.1, FPT_ESA.1, FRU_FLT.2, FTP_ITC, FTP_ITC.1, FTP_TST.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0084, BSI-CC-PP-0084-2014, BSI-CC-PP-0099-v2-2020, BSI-CC-PP-0099-2017, BSI-CC-PP-0100-2018, BSI-CC-PP-0104
Certificates
NSCIB-2300174-01, NSCIB-2300181-01

Side-channel analysis
physical probing, side channel, side-channel, SPA, DPA, timing attack, physical tampering, malfunction, DFA, fault injection, Fault Injection, JIL

Standards
FIPS 197, FIPS 180-4, FIPS 202-2015, FIPS PUB 186-4, FIPS 186-4, PKCS1, AIS 20, RFC5639, X.509, SCP80, SCP81, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Security Target Lite
Subject NXP JCOP 6.2 on SN220 Secure Element
Keywords Common Criteria, Security Target, NXP JCOP 6.2 on SN220 Secure Element
Author NXP B.V.
Creation date D:20240614110903+02'00'
Pages 129
Creator DITA Open Toolkit 3.3.1
Producer Apache FOP Version 2.3

References

Outgoing

Heuristics

Certificate ID: NSCIB-CC-2300174-01-CR

Extracted SARs

ALC_DVS.2, ALC_FLR.1, ASE_TSS.2, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 NSCIB-CC-0428888-CR2 Compare
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.01.1.2 NSCIB-CC-2300100-01-CR Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP 7.1 R1.04.0.2, JCOP 7.2 R1.09.0.2 NSCIB-CC-2200029-03-CR Compare
NXP JCOP 7.x on SN300 Secure Element, versions JCOP 7.0 R1.62.0.1, JCOP 7.1 R1.04.0.1 and JCOP 7.2 R1.09.0.1 NSCIB-CC-2300065-02-CR Compare
NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JCOP 9.0 R1.07.0.2 NSCIB-CC-2200043-05-CR Compare
NXP JCOP 7.x on SN300 Secure Element, version JCOP 7.0 R1.62.0.1 and JCOP 7.1 R1.04.0.1 NSCIB-CC-2300065-01-CR Compare
NXP JCOP 8.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1 NSCIB-CC-2200041-02-CR Compare
NXP JCOP6.x on SN200.C04 Secure Element, versions JCOP6.0 R1.13.0 "SN200", JCOP6.1 R1.04.0 "SN200", JCOP6.1 R1.04.0 "SN210", JCOP6.4 R1.06.0 "SN200", JCOP6.4 R1.06.0 "SN210", JCOP6.5 R1.04.0 "SN200", JCOP6.5 R1.04.0 "SN210", JCOP6.6 R1.06.0 "SN200", JCOP6.6 R1.06.0 "SN210" NSCIB-CC-2300044-02-CR Compare
NXP JCOP8.x on SE310 A0 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1 NSCIB-CC-2200042-02-CR Compare
NXP JCOP 8.x with eUICC extension on SN300 B2 Secure Element, version JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2 NSCIB-CC-2200043-04-CR Compare
NXP JCOP 8.x/9.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1, JCOP 9.0 R1.07.0.1 NSCIB-CC-2200041-03-CR Compare
NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11 NSCIB-CC-2300172-01-CR Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryption Card Type7 Version: - Software version: System/Copy 1.03, Network Support 9.62, Scanner 01.05, Printer 1.03, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.04, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.6, RPCS Font 1.00, Engine 1.07:06, OpePanel 1.04, LANG0 1.03, LANG1 1.03 - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-18(WW) 02.00.00, Data Erase Opt 1.01x JISEC-CC-CRP-C0320 Compare
NXP JCOP 8.x on SN300 B2 Secure Element, version JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lanier MP C4501/C5501, nashuatec MP C4501/C5501, Rex-Rotary MP C4501/C5501, Gestetner MP C4501/C5501, infotec MP C4501/C5501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0302 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/LD655CAG, Lanier MP C4501A/C5501A, nashuatec MP C4501A/C5501A, Rex-Rotary MP C4501A/C5501A, Gestetner MP C4501A/C5501A, infotec MP C4501A/C5501A all of above with Fax Option Type C5501 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.01, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0326 Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, RPCS 3.12.18, RPCS Font 1.03, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0346 Compare
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP 4002/5002, Rex-Rotary MP 4002/5002, Gestetner MP 4002/5002, infotec MP 4002/5002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00.2, Network Support 11.75, Fax 01.01.00, RemoteFax 01.01.00, NetworkDocBox 1.00.1, Web Support 1.03, Web Uapl 1.02, animation 1.00, Scanner 01.04, Printer 1.00.1, PCL 1.04, PCL Font 1.13, Data Erase Onb 1.03m, GWFCU3.5-2(WW) 01.00.01, Engine 1.00:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02 - Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0347 Compare
NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1 NSCIB-CC-2300099-01-CR Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:03, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0324 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imagio MP C4001 SPF Version: - Software version: System/Copy 2.02, Network Support 10.54, Scanner 01.11.1, Printer 1.00.4, Fax 02.01.00, RemoteFax 01.00.00, Web Support 1.06, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, RPCS 3.10.14, RPCS Font 1.00, Engine 1.03:04, OpePanel 1.06, LANG0 1.06, LANG1 1.06, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0301 Compare
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 Compare
Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/5210SF/5210SR, Rex-Rotary SP 5200S/5210SF/5210SR, Gestetner SP 5200S/5210SF/5210SR all of above with Facsimile Function Version: - Software: System/Copy 2.02, Network Support 10.63, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.02, animation 1.01, Scanner 01.03, Printer 1.02.1, PCL 1.02, PCL Font 1.05, Data Erase Std 1.01m, GWFCU3-24(WW) 02.00.00, Engine A2.0:20, Engine(Scanner) 1.01:00, OpePanel 1.02, LANG0 1.02, LANG1 1.02 Hardware: Ic Key 01020714, Ic Hdd 01 JISEC-CC-CRP-C0366 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551, Rex-Rotary MP C2051/C2551, Gestetner MP C2051/C2551, infotec MP C2051/C2551 all of above with Fax Option Type C2551 Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01e, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, PCL 1.01, OptionPCLFont 1.02, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0325 Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: System/Copy 1.01, Network Support 10.56, Scanner 01.05, Printer 1.01d, Fax 02.00.00, RemoteFax 02.00.00, Web Support 1.01, Web Uapl 1.02, NetworkDocBox 1.03, animation 0.01, RPCS 3.10.17, RPCS Font 1.00, Engine 1.07:03, OpePanel 1.02, LANG0 1.02, LANG1 1.02, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-22(WW) 02.00.00 JISEC-CC-CRP-C0323 Compare
NXP JCOP 8.x on SN300 B2 Secure Element, JCOP 8.0 R1.38.0.1 NSCIB-CC-2200041-01-CR Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC1120_4113-100 10 EMS-APT Software Version 4.0 (build 20) with fixes BC0400-01 1, BC0400-02 1, BS0400-01 1, BS0400-02 1; NPT-1010 Software Version 4.0 (build 35); NPT-1020/1021 Software Version 4.0 (build 35); and NPT-1200 Software Version 4.0 (build 35) None Compare
Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanier MP C300/C300SR/C400/C400SR, nashuatec MP C300/C300SR/C400/C400SR, Rex-Rotary MP C300/C300SR/C400/C400SR, Gestetner MP C300/C300SR/C400/C400SR, infotec MP C300/C300SR/C400/C400SR all of above with Facsimile Function Version: - Software: System/Copy 2.05, Network Support 10.57, Fax 02.00.00, RemoteFax 01.00.00, NetworkDocBox 1.04, Web Support 1.02, Web Uapl 1.01, animation 1.00, Scanner 01.04, Printer 1.01, PCL 1.07, OptionPCLFont 1.02, Data Erase Std 1.01x, GWFCU3-23(WW) 03.00.00, Engine 1.02:02, OpePanel 1.03, LANG0 1.03, LANG1 1.03 - Hardware: Ic Key 01020700, Ic Ctlr 03 JISEC-CC-CRP-C0367 Compare
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lanier MP C3001/C3501, nashuatec MP C3001/C3501, Rex-Rotary MP C3001/C3501, Gestetner MP C3001/C3501, infotec MP C3001/C3501 all of above with Fax Option Type C5501 Version: - Software version: System/Copy 1.03, Network Support 10.54, Scanner 01.05, Printer 1.02, Fax 02.00.00, RemoteFax 01.00.00, Web Support 1.05, Web Uapl 1.01, NetworkDocBox 1.01, animation 1.00, PCL 1.02, OptionPCLFont 1.02, Engine 1.03:04, OpePanel 1.04, LANG0 1.04, LANG1 1.04, Data Erase Std 1.01x - Hardware version: Ic Key 01020700, Ic Ctlr 03 - Option version: GWFCU3-21(WW) 03.00.00 JISEC-CC-CRP-C0300 Compare
Showing 5 out of 29.

Scheme data ?

Cert Id NSCIB-CC-2300174-01-CR
Certification Date 17.06.2024
Status Issued
Product NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1
Developer NXP Semiconductors GmbH
Evaluation Facility SGS Brightsight
Level EAL5+ ALC_DVS.2, ASE_TSS.2, AVA_VAN.5 and ALC_FLR.1
Cert Link https://trustcb.com/download/?wpdmdl=4250
Report Link https://trustcb.com/download/?wpdmdl=4304
Target Link https://trustcb.com/download/?wpdmdl=4252

References

Loading...

Updates

  • 30.06.2025 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300174-01-Cert.pdf",
  "dgst": "eba13175ef24d17b",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300174-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL5+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.02.1",
        "5.01.1",
        "6.2",
        "2.01.1",
        "1.01.1"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "1153ad24c84b397a",
        "fdb8a517d5d22602",
        "7f886b64878b68c1"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300181-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-22-0258298-CR",
          "NSCIB-CC-2300181-01-CR"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2300174-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=4250",
      "certification_date": "2024-06-17",
      "developer": "NXP Semiconductors GmbH",
      "evaluation_facility": "SGS Brightsight",
      "level": "EAL5+ ALC_DVS.2, ASE_TSS.2, AVA_VAN.5 and ALC_FLR.1",
      "product": "NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1",
      "report_link": "https://trustcb.com/download/?wpdmdl=4304",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=4252"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300181-01-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-2300181-01-CR"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1",
  "not_valid_after": "2029-06-17",
  "not_valid_before": "2024-06-17",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2300174-01-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "CC-22-0428888": 1,
          "NSCIB-2300174-01": 1,
          "NSCIB-CC-2300174-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-v2-2020": 1,
          "BSI-CC-PP-0100-2018": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_DVS.2": 1,
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 6": 1
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Microsoft Office User",
      "/CreationDate": "D:20240618113253+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20240618113253+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 142634,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.tuv-nederland.nl/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2300174-01-CR_r1.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300174-01-CR",
        "cert_item": "NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1",
        "cert_lab": " SGS Brightsight B.V.",
        "developer": "NXP Semiconductors GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          },
          "ECDSA": {
            "ECDSA": 1
          }
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300174-01": 1,
          "NSCIB-CC-2300174-01-CR": 15,
          "NSCIB-CC-2300181-01-CR": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-v2-": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_DVS.2": 2,
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 5": 1,
          "EAL 5 augmented": 1,
          "EAL4": 1,
          "EAL5": 1,
          "EAL5 augmented": 1,
          "EAL5+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 1
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "Generic": {
          "Crypto Library 2.2.0": 1,
          "Crypto Library 2.3.1": 1
        }
      },
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 2
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        },
        "SGS": {
          "SGS": 3,
          "SGS Brightsight": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 2,
            "SHA-384": 2,
            "SHA-512": 1
          },
          "SHA3": {
            "SHA-3": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.0.5": 1,
          "Java Card 3.1": 2
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 6": 50,
          "JCOP6": 7
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "SCA": {
          "side-channel": 1
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1,
          "JIL-AM": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        },
        "DES": {
          "3DES": {
            "3DES": 2
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 2,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 19,
          "NXP Semiconductors": 3
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Microsoft Office User",
      "/CreationDate": "D:20240715091616+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20240715091616+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 661768,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://nscib.nl/",
          "http://www.commoncriteriaportal.org/",
          "mailto:[email protected]",
          "https://www.sogis.eu/",
          "https://www.tuv-nederland.nl/common-criteria/certificates.html",
          "https://trustcb.com/common-criteria/nscib/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "NSCIB-CC-2300174-01-ST_Lite_v2.0.7.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 9
          },
          "ECDH": {
            "ECDH": 2,
            "ECDHE": 3
          },
          "ECDSA": {
            "ECDSA": 10
          },
          "EdDSA": {
            "EdDSA": 1
          }
        },
        "FF": {
          "DH": {
            "DH": 1,
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA 1024": 1,
          "RSA-CRT": 3
        }
      },
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300174-01": 1,
          "NSCIB-2300181-01": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPS-PROVIDER": 5,
          "A.PROCESS-SEC-IC": 4,
          "A.USE_DIAG": 5,
          "A.USE_KEYS": 5,
          "A.VERIFICATION-AU": 1,
          "A.VERIFICATION-AUTHORITY": 4
        },
        "D": {
          "D.API_DATA": 1,
          "D.APP_CODE": 2,
          "D.APP_C_": 1,
          "D.APP_C_DATA": 2,
          "D.APP_I_DATA": 4,
          "D.APP_KEYS": 6,
          "D.APSD_KEYS": 5,
          "D.ATTACK_COUNTER": 7,
          "D.CARD_": 1,
          "D.CARD_MNGT_DATA": 2,
          "D.CONFIG_ITEM": 7,
          "D.CRYPTO": 3,
          "D.ISD_KEYS": 4,
          "D.JCS_": 1,
          "D.JCS_CODE": 5,
          "D.JCS_DATA": 4,
          "D.MODULE_CODE": 1,
          "D.MODULE_DATA": 1,
          "D.PIN": 8,
          "D.SEC_DATA": 2,
          "D.TOE_IDENTIFICATION": 2,
          "D.TOE_IDENTIFIER": 3,
          "D.UPDATE_IMAGE": 25,
          "D.VASD_KEYS": 3
        },
        "OE": {
          "OE.APPS-PROVIDER": 4,
          "OE.CAP_FILE": 2,
          "OE.CARD-MANAGEMENT": 2,
          "OE.CODE-EVIDENCE": 2,
          "OE.CONFID-UPDATE-": 1,
          "OE.CONFID-UPDATE-IMAGE": 3,
          "OE.IC": 3,
          "OE.KEY-": 1,
          "OE.KEY-CHANGE": 4,
          "OE.PROCESS_SEC_": 1,
          "OE.PROCESS_SEC_IC": 3,
          "OE.RE": 7,
          "OE.SCP": 18,
          "OE.SECURITY-DOMA": 1,
          "OE.SECURITY-DOMAINS": 3,
          "OE.USE_DIAG": 5,
          "OE.USE_KEYS": 5,
          "OE.VERIFICATION": 3,
          "OE.VERIFICATION-A": 1,
          "OE.VERIFICATION-AUTHOR": 1,
          "OE.VERIFICATION-AUTHORITY": 2
        },
        "OP": {
          "OP.MODIFY_": 1,
          "OP.READ_CONFIG_": 1,
          "OP.TRIGGER_": 1,
          "OP.TRIGGER_UPDATE": 2,
          "OP.USE_CONFIG_": 1
        },
        "OSP": {
          "OSP.KEY-CHANGE": 4,
          "OSP.PROCESS-TOE": 4,
          "OSP.SECURITY-DOM": 1,
          "OSP.SECURITY-DOMAINS": 3
        },
        "OT": {
          "OT.ALARM": 4,
          "OT.APPLI-AUTH": 5,
          "OT.ARRAY_VIEWS_CONFID": 1,
          "OT.ATTACK-COUNT": 1,
          "OT.ATTACK-COUNTE": 1,
          "OT.ATTACK-COUNTER": 3,
          "OT.AUTH-LOAD-": 1,
          "OT.AUTH-LOAD-UPD": 2,
          "OT.AUTH-LOAD-UPDATE-IMAGE": 2,
          "OT.CARD-": 1,
          "OT.CARD-CONFIGUR": 2,
          "OT.CARD-CONFIGURATION": 3,
          "OT.CARD-MANAGEM": 3,
          "OT.CARD-MANAGEMENT": 3,
          "OT.CIPHER": 3,
          "OT.COMM_": 5,
          "OT.COMM_AUTH": 6,
          "OT.COMM_CONFIDENTIALITY": 3,
          "OT.COMM_INTEGRITY": 3,
          "OT.CONFID-UPDATE-": 2,
          "OT.CONFID-UPDATE-IMAGE": 3,
          "OT.CRT-MNGT": 1,
          "OT.DELETION": 2,
          "OT.DOMAIN-RIGHTS": 7,
          "OT.EXT-MEM": 1,
          "OT.FIREWALL": 3,
          "OT.GLOBAL_": 1,
          "OT.GLOBAL_ARRAYS_CONFID": 1,
          "OT.IDENTIFICATION": 6,
          "OT.INSTALL": 2,
          "OT.KEY-MNGT": 3,
          "OT.LOAD": 2,
          "OT.NATIVE": 1,
          "OT.OPERATE": 5,
          "OT.PIN-MNGT": 1,
          "OT.REALLOCATION": 2,
          "OT.REMOTE": 1,
          "OT.RESOURCE": 1,
          "OT.RESTRICTED-MO": 3,
          "OT.RESTRICTED-MODE": 3,
          "OT.RND": 4,
          "OT.RNG": 1,
          "OT.SCP": 24,
          "OT.SECURE_AC_": 2,
          "OT.SECURE_AC_ACTIVATION": 3,
          "OT.SECURE_LOAD_": 4,
          "OT.SECURE_LOAD_ACODE": 3,
          "OT.SENSITIVE_RESULTS_INTEG": 1,
          "OT.SID": 2,
          "OT.TOE_": 2,
          "OT.TOE_IDENTIFICATION": 3,
          "OT.TRANSACTION": 2
        },
        "SA": {
          "SA.CONFID-UPDATE": 1,
          "SA.CONFID-UPDATE-IMAGE": 1,
          "SA.CONFIG-APPLET": 1,
          "SA.INTEG-APPLI-DATA": 1,
          "SA.INTEG-UPDATE-I": 1,
          "SA.INTEG-UPDATE-IMAGE": 1,
          "SA.OSU": 1,
          "SA.RM": 1,
          "SA.SCP": 3
        },
        "T": {
          "T.ATTACK-COUNTER": 3,
          "T.COM_EXPLOIT": 4,
          "T.CONFID-APPLI-DATA": 6,
          "T.CONFID-JCS-CODE": 2,
          "T.CONFID-JCS-DATA": 2,
          "T.CONFID-UPDATE-I": 1,
          "T.CONFID-UPDATE-IMAGE": 2,
          "T.CONFIG": 4,
          "T.DELETION": 4,
          "T.EXE-": 1,
          "T.EXE-CODE": 3,
          "T.EXE-CODE-REMOTE": 1,
          "T.INSTALL": 4,
          "T.INTEG-APPLI-": 2,
          "T.INTEG-APPLI-CODE": 3,
          "T.INTEG-APPLI-DATA": 10,
          "T.INTEG-JCS-CODE": 2,
          "T.INTEG-JCS-DATA": 2,
          "T.INTEG-UPDATE-IM": 1,
          "T.INTEG-UPDATE-IMAGE": 2,
          "T.INTERRUPT-OSU": 4,
          "T.LIFE_CYCLE": 4,
          "T.NATIVE": 2,
          "T.OBJ-DELETION": 1,
          "T.PHYSICAL": 3,
          "T.RESOURCES": 1,
          "T.RND": 3,
          "T.SID": 4,
          "T.UNAUTH-LOAD-UP": 1,
          "T.UNAUTH-LOAD-UPDATE-IMAGE": 3,
          "T.UNAUTHORIZED_": 1,
          "T.UNAUTHORIZED_CARD_MNGT": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1,
          "BSI-CC-PP-0099-2017": 1,
          "BSI-CC-PP-0099-v2-2020": 1,
          "BSI-CC-PP-0100-2018": 1,
          "BSI-CC-PP-0104": 1,
          "BSI-PP-0084": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1
        },
        "ALC": {
          "ALC_DVS.2": 4,
          "ALC_FLR.1": 5
        },
        "ASE": {
          "ASE_INT": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2,
          "ASE_TSS": 2,
          "ASE_TSS.2": 4
        },
        "AVA": {
          "AVA_VAN.5": 5
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL5": 8,
          "EAL5 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 13,
          "FAU_ARP.1.1": 1,
          "FAU_SAA.1": 2,
          "FAU_SAS.1": 5,
          "FAU_SAS.1.1": 2
        },
        "FCO": {
          "FCO_NRO": 2,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 6,
          "FCO_NRO.2.1": 2,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 2
        },
        "FCS": {
          "FCS_CKM": 12,
          "FCS_CKM.1": 15,
          "FCS_CKM.1.1": 7,
          "FCS_CKM.2": 2,
          "FCS_CKM.2.1": 2,
          "FCS_CKM.4": 9,
          "FCS_CKM.4.1": 3,
          "FCS_CKM.5": 8,
          "FCS_CKM.5.1": 5,
          "FCS_COP": 12,
          "FCS_COP.1": 31,
          "FCS_COP.1.1": 36,
          "FCS_RNG": 3,
          "FCS_RNG.1": 7,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 31,
          "FDP_ACC.1.1": 5,
          "FDP_ACC.2": 10,
          "FDP_ACC.2.1": 1,
          "FDP_ACC.2.2": 1,
          "FDP_ACF.1": 24,
          "FDP_ACF.1.1": 5,
          "FDP_ACF.1.2": 8,
          "FDP_ACF.1.3": 6,
          "FDP_ACF.1.4": 6,
          "FDP_DAU.2": 2,
          "FDP_DAU.2.1": 2,
          "FDP_ETC.2": 1,
          "FDP_IFC": 2,
          "FDP_IFC.1": 22,
          "FDP_IFC.2": 21,
          "FDP_IFC.2.1": 3,
          "FDP_IFC.2.2": 3,
          "FDP_IFF": 2,
          "FDP_IFF.1": 29,
          "FDP_IFF.1.1": 3,
          "FDP_IFF.1.2": 5,
          "FDP_IFF.1.3": 5,
          "FDP_IFF.1.4": 7,
          "FDP_IFF.1.5": 4,
          "FDP_ITC": 2,
          "FDP_ITC.2": 9,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 2,
          "FDP_RIP.1": 14,
          "FDP_ROL.1": 8,
          "FDP_ROL.1.1": 1,
          "FDP_ROL.1.2": 1,
          "FDP_SDC": 1,
          "FDP_SDC.1": 2,
          "FDP_SDC.1.1": 1,
          "FDP_SDI": 5,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 5,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1,
          "FDP_UCT.1": 1,
          "FDP_UIT": 2,
          "FDP_UIT.1": 5,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 11,
          "FIA_AFL.1.1": 2,
          "FIA_AFL.1.2": 2,
          "FIA_API": 4,
          "FIA_API.1": 3,
          "FIA_ATD.1": 5,
          "FIA_UAU.1": 25,
          "FIA_UAU.1.1": 5,
          "FIA_UAU.1.2": 3,
          "FIA_UAU.4": 13,
          "FIA_UAU.4.1": 2,
          "FIA_UAU.5": 2,
          "FIA_UAU.5.1": 2,
          "FIA_UAU.5.2": 1,
          "FIA_UAU.6": 2,
          "FIA_UAU.6.1": 1,
          "FIA_UID": 2,
          "FIA_UID.1": 51,
          "FIA_UID.1.1": 7,
          "FIA_UID.1.2": 4,
          "FIA_UID.2": 2,
          "FIA_USB.1": 4
        },
        "FMT": {
          "FMT_MOF.1": 2,
          "FMT_MOF.1.1": 1,
          "FMT_MSA": 4,
          "FMT_MSA.1": 53,
          "FMT_MSA.1.1": 6,
          "FMT_MSA.2": 3,
          "FMT_MSA.2.1": 1,
          "FMT_MSA.3": 46,
          "FMT_MSA.3.1": 5,
          "FMT_MSA.3.2": 6,
          "FMT_MTD.1": 3,
          "FMT_MTD.1.1": 3,
          "FMT_MTD.3": 3,
          "FMT_SAE": 1,
          "FMT_SAE.1": 1,
          "FMT_SAE.1.1": 1,
          "FMT_SMF": 3,
          "FMT_SMF.1": 52,
          "FMT_SMF.1.1": 6,
          "FMT_SMR": 2,
          "FMT_SMR.1": 59,
          "FMT_SMR.1.1": 4,
          "FMT_SMR.1.2": 3
        },
        "FPR": {
          "FPR_UNO.1": 6,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_EMS": 1,
          "FPT_ESA": 1,
          "FPT_ESA.1": 1,
          "FPT_ESA.1.4": 1,
          "FPT_FLS.1": 30,
          "FPT_FLS.1.1": 3,
          "FPT_ISA": 1,
          "FPT_ISA.1": 2,
          "FPT_ISA.1.5": 1,
          "FPT_PHP.3": 6,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.3": 1,
          "FPT_RCV.3.1": 1,
          "FPT_RCV.3.2": 1,
          "FPT_RCV.3.3": 1,
          "FPT_STM": 2,
          "FPT_TCT": 1,
          "FPT_TCT.1": 1,
          "FPT_TDC.1": 5,
          "FPT_TDC.1.2": 2,
          "FPT_TIT": 1,
          "FPT_TIT.1": 1,
          "FPT_TST.1": 1,
          "FPT_TST.1.1": 1
        },
        "FRU": {
          "FRU_FLT.2": 2
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC.1": 15,
          "FTP_ITC.1.1": 2,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 2,
          "FTP_TRP.1": 2,
          "FTP_TST.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 11
        },
        "CCM": {
          "CCM": 43
        },
        "CFB": {
          "CFB": 2
        },
        "CTR": {
          "CTR": 1
        },
        "ECB": {
          "ECB": 2
        },
        "GCM": {
          "GCM": 9
        },
        "OFB": {
          "OFB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 3
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 2
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "Brainpool": {
          "brainpoolP256r1": 9,
          "brainpoolP384r1": 9,
          "brainpoolP512r1": 9
        },
        "NIST": {
          "Curve P-256": 8,
          "Curve P-384": 8,
          "NIST P-256": 1,
          "P-256": 9,
          "P-384": 8,
          "P-512": 8
        }
      },
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 2
          },
          "SHA2": {
            "SHA-224": 2,
            "SHA-256": 3,
            "SHA-384": 2,
            "SHA-512": 2
          },
          "SHA3": {
            "SHA-3": 2
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_CBC_NOPAD": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD": 1,
            "ALG_AES_BLOCK_128_ECB_NOPAD": 1,
            "ALG_AES_CBC_ISO9797_M1": 1,
            "ALG_AES_CBC_ISO9797_M2": 1,
            "ALG_AES_CBC_ISO9797_M2_STANDARD": 1,
            "ALG_AES_CBC_ISO9797_STANDARD": 1,
            "ALG_AES_CBC_PKCS5": 1,
            "ALG_AES_CBC_PKCS7": 2,
            "ALG_AES_CMAC128": 1,
            "ALG_AES_CMAC16": 1,
            "ALG_AES_CMAC16_STANDARD": 1,
            "ALG_AES_CMAC8": 1,
            "ALG_AES_ECB_ISO9797_M1": 1,
            "ALG_AES_ECB_ISO9797_M2": 1,
            "ALG_AES_ECB_PKCS5": 1,
            "ALG_AES_ECB_PKCS7": 2,
            "ALG_AES_GCM": 1,
            "ALG_AES_MAC_128_NOPAD": 1,
            "ALG_AES_XTS": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 1,
            "ALG_DES_CBC_ISO9797_M2": 1,
            "ALG_DES_CBC_NOPAD": 1,
            "ALG_DES_CBC_PKCS5": 1,
            "ALG_DES_CBC_PKCS7": 1,
            "ALG_DES_CMAC8": 1,
            "ALG_DES_ECB_ISO9797_M1": 1,
            "ALG_DES_ECB_ISO9797_M2": 2,
            "ALG_DES_ECB_NOPAD": 1,
            "ALG_DES_ECB_PKCS5": 1,
            "ALG_DES_ECB_PKCS7": 1,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_M1": 1,
            "ALG_DES_MAC4_ISO9797_M2": 1,
            "ALG_DES_MAC4_NOPAD": 1,
            "ALG_DES_MAC4_PKCS5": 1,
            "ALG_DES_MAC8_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_M1": 1,
            "ALG_DES_MAC8_ISO9797_M2": 1,
            "ALG_DES_MAC8_NOPAD": 1,
            "ALG_DES_MAC8_PKCS5": 1
          },
          "EC": {
            "ALG_EC_SVDP_DH": 1,
            "ALG_EC_SVDP_DHC": 1,
            "ALG_EC_SVDP_DHC_KDF": 1,
            "ALG_EC_SVDP_DHC_PACE": 1,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_KDF": 1,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 1
          },
          "ECDSA": {
            "ALG_ECDSA_SHA": 1,
            "ALG_ECDSA_SHA_224": 1,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 1,
            "ALG_ECDSA_SHA_512": 1
          },
          "HMAC": {
            "ALG_HMAC_MD5": 1,
            "ALG_HMAC_SHA1": 1,
            "ALG_HMAC_SHA_256": 1,
            "ALG_HMAC_SHA_384": 1,
            "ALG_HMAC_SHA_512": 1
          },
          "MD": {
            "ALG_MD5": 1
          },
          "RSA": {
            "ALG_RSA_NOPAD": 1,
            "ALG_RSA_PKCS1": 1,
            "ALG_RSA_PKCS1_OAEP": 1,
            "ALG_RSA_SECURE_SHA_PKCS1": 1,
            "ALG_RSA_SHA_224_PKCS1": 1,
            "ALG_RSA_SHA_224_PKCS1_PSS": 1,
            "ALG_RSA_SHA_256_PKCS1": 1,
            "ALG_RSA_SHA_256_PKCS1_PSS": 1,
            "ALG_RSA_SHA_384_PKCS1": 2,
            "ALG_RSA_SHA_512_PKCS1": 1,
            "ALG_RSA_SHA_512_PKCS1_PSS": 1,
            "ALG_RSA_SHA_ISO9796": 1,
            "ALG_RSA_SHA_ISO9796_MR": 1,
            "ALG_RSA_SHA_PKCS1": 1,
            "ALG_RSA_SHA_PKCS1_PSS": 1
          },
          "SHA": {
            "ALG_SHA_224": 1,
            "ALG_SHA_256": 3,
            "ALG_SHA_384": 2,
            "ALG_SHA_512": 2
          },
          "SHA3": {
            "ALG_SHA3_224": 1,
            "ALG_SHA3_256": 1,
            "ALG_SHA3_384": 1,
            "ALG_SHA3_512": 1
          }
        },
        "misc": {
          "LENGTH_AES_128": 4,
          "LENGTH_AES_192": 4,
          "LENGTH_AES_256": 5,
          "LENGTH_DES3_": 2,
          "LENGTH_DES3_2KEY": 4,
          "LENGTH_DES3_3KEY": 2,
          "LENGTH_EC_FP_128": 1,
          "LENGTH_EC_FP_192": 1,
          "LENGTH_EC_FP_224": 2,
          "LENGTH_EC_FP_256": 2,
          "LENGTH_EC_FP_384": 2,
          "LENGTH_EC_FP_512": 1,
          "LENGTH_RSA_1024": 1,
          "LENGTH_SHA": 1,
          "LENGTH_SHA3_224": 1,
          "LENGTH_SHA3_256": 1,
          "LENGTH_SHA3_384": 1,
          "LENGTH_SHA3_512": 1,
          "LENGTH_SHA_224": 1,
          "LENGTH_SHA_256": 2,
          "LENGTH_SHA_384": 1,
          "LENGTH_SHA_512": 2,
          "PAD_PKCS1_OAEP": 1,
          "SIG_CIPHER_AES_CMAC128": 1,
          "SIG_CIPHER_AES_CMAC16": 1,
          "SIG_CIPHER_AES_CMAC8": 1,
          "SIG_CIPHER_DES_CMAC8": 1,
          "SIG_CIPHER_ECDSA": 1,
          "SIG_CIPHER_RSA": 1
        }
      },
      "javacard_packages": {
        "com": {
          "com.felicanetworks.javacard.crypto.twopassauth": 1,
          "com.nxp.id.jcop.globalplatform": 1,
          "com.nxp.id.jcopx.accelerator": 1,
          "com.nxp.id.jcopx.authority": 1,
          "com.nxp.id.jcopx.blob": 1,
          "com.nxp.id.jcopx.egovaccelerators": 1,
          "com.nxp.id.jcopx.iar": 1,
          "com.nxp.id.jcopx.m4mext": 1,
          "com.nxp.id.jcopx.math": 1,
          "com.nxp.id.jcopx.mifare.mifaredesfire": 1,
          "com.nxp.id.jcopx.mifare.mifareplus": 1,
          "com.nxp.id.jcopx.oscca": 1,
          "com.nxp.id.jcopx.security": 1,
          "com.nxp.id.jcopx.strongbox": 1,
          "com.nxp.id.jcopx.uicc.auth": 1,
          "com.nxp.id.jcopx.uicc.globalplatform": 1,
          "com.nxp.id.jcopx.uicc.interfacebroker": 1,
          "com.nxp.id.jcopx.uicc.interfacebroker.sim": 1,
          "com.nxp.id.jcopx.uicc.interfacebroker.uicc": 1,
          "com.nxp.id.jcopx.uicc.system": 1,
          "com.nxp.id.jcopx.uicc.toolkit": 1,
          "com.nxp.id.jcopx.util": 1,
          "com.sec.mobile.fra": 1,
          "com.sony.javacard.crypto": 1,
          "com.sony.javacard.crypto.a4": 1,
          "com.sony.javacard.crypto.a5": 1,
          "com.sony.javacard.crypto.a6": 1,
          "com.sony.javacard.crypto.advance": 1,
          "com.sony.javacard.crypto.advance.e3": 1,
          "com.sony.javacard.crypto.advance.e4": 1
        },
        "de": {
          "de.bsi.csp": 1
        },
        "java": {
          "java.io": 1,
          "java.lang": 1
        },
        "javacard": {
          "javacard.crypto": 4,
          "javacard.crypto.advance": 3,
          "javacard.crypto.twopassauth": 1,
          "javacard.framework": 1,
          "javacard.security": 1
        },
        "javacardx": {
          "javacardx.apdu": 1,
          "javacardx.crypto": 1,
          "javacardx.framework.time": 1,
          "javacardx.framework.util.intx": 1,
          "javacardx.security": 1,
          "javacardx.security.cert": 3,
          "javacardx.security.derivation": 1,
          "javacardx.security.util": 1
        },
        "org": {
          "org.globalplatform": 1,
          "org.globalplatform.contactless": 1,
          "org.globalplatform.upgrade": 1,
          "org.mifare4mobile": 1,
          "org.mifare4mobile.hostinterface": 1,
          "org.mifare4mobile.parser": 1,
          "org.mifare4mobile.userverifier": 1
        },
        "uicc": {
          "uicc.access": 1,
          "uicc.access.bertlvfile": 1,
          "uicc.access.fileadministration": 1,
          "uicc.auth": 1,
          "uicc.globalplatform": 1,
          "uicc.hci.framework": 1,
          "uicc.hci.services.cardemulation": 1,
          "uicc.hci.services.cltobserver": 1,
          "uicc.hci.services.connectivity": 1,
          "uicc.hci.services.readermode": 1,
          "uicc.interfacebroker": 1,
          "uicc.interfacebroker.sim": 1,
          "uicc.interfacebroker.uicc": 1,
          "uicc.isim.access": 1,
          "uicc.services.highupdatearray": 1,
          "uicc.system": 2,
          "uicc.toolkit": 2,
          "uicc.usim.access": 1,
          "uicc.usim.geolocation": 1,
          "uicc.usim.suci": 1,
          "uicc.usim.toolkit": 1
        }
      },
      "javacard_version": {
        "JavaCard": {
          "Java Card 3.1": 1
        }
      },
      "os_name": {
        "JCOP": {
          "JCOP 2": 1,
          "JCOP 4": 1,
          "JCOP 6": 201,
          "JCOP6": 23
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 8,
          "RNG": 10
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 2,
          "Fault Injection": 1,
          "fault injection": 1,
          "malfunction": 1,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "SPA": 1,
          "physical probing": 2,
          "side channel": 2,
          "side-channel": 1,
          "timing attack": 1
        },
        "other": {
          "JIL": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 180-4": 1,
          "FIPS 186-4": 1,
          "FIPS 197": 1,
          "FIPS 202-2015": 1,
          "FIPS PUB 186-4": 30
        },
        "PKCS": {
          "PKCS1": 2
        },
        "RFC": {
          "RFC5639": 30
        },
        "SCP": {
          "SCP80": 1,
          "SCP81": 1
        },
        "X509": {
          "X.509": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 17,
            "AES-": 1,
            "AES-128": 1,
            "AES-256": 16
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3,
            "Triple-DES": 1,
            "TripleDES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 2,
            "CMAC": 10,
            "HMAC": 9
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 355,
          "NXP Semiconductors": 25
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20240614110903+02\u002700\u0027",
      "/Creator": "DITA Open Toolkit 3.3.1",
      "/Keywords": "Common Criteria, Security Target, NXP JCOP 6.2 on SN220 Secure Element",
      "/Producer": "Apache FOP Version 2.3",
      "/Subject": "NXP JCOP 6.2 on SN220 Secure Element",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1306620,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 129
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0100V2b_pdf.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300174-01-CR_r1.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_DVS.2",
      "EAL5+",
      "ALC_FLR.1",
      "AVA_VAN.5",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300174-01-ST_Lite_v2.0.7.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e1426ab7b5d6981680ae2bfb570c4cb7549b0d72c861e696a5210333de4967ea",
      "txt_hash": "eda371b45c83cc031cdcbb6d6b8f092b9e2164a7e804673744878f720d580bbd"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "d87440e99d9aa53dce91de7f99be09d7043760abe9e6286d20cf1c08781b2df7",
      "txt_hash": "4c9012ae9d9189d9c3245ef0d65d53e814c2d6f1eb9ca4d88ab2715adbfacbb3"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2b4228315a644312244bb6059d27a06f35aec97b7dd1f1475e92956ac0458fba",
      "txt_hash": "891f587d93ff46c1730c1b54af42c38e16747940c1ce770df848abc81cb27090"
    }
  },
  "status": "active"
}