Sony Xperia™ X and Sony Xperia™ X Performance

CSV information ?

Status archived
Valid from 07.12.2016
Valid until 07.12.2021
Scheme 🇸🇪 SE
Manufacturer Sony Mobile Communications Inc.
Category Mobility
Security level EAL1
Protection profiles

Heuristics summary ?

Certificate ID: CSEC2010003

Certificate ?

Extracted keywords

Security level
EAL 2
Security Assurance Requirements (SAR)
ALC_FLR
Evaluation facilities
atsec

File metadata

Creation date D:20170403155121+02'00'
Modification date D:20230313140935+01'00'
Pages 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES
Schemes
MAC
Protocols
TLS, VPN

Trusted Execution Environments
TEE
Vendor
Qualcomm

Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT.1, ATE_IND.1, AVA_VAN.1, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_ECD.1, ASE_TSS.1
Certificates
CSEC201003
Evaluation facilities
atsec

Vulnerabilities
CVE-2016-3863, CVE-2016-3861, CVE-2016-3821, CVE-2016-3820, CVE-2016-3862, CVE-2016-3840, CVE-2016-3822, CVE-2016-3743, CVE-2016-3742, CVE-2016-3741, CVE-2016-2508, CVE-2016-2507, CVE-2016-2506, CVE-2016-2464, CVE-2016-2463, CVE-2016-0841, CVE-2016-0839, CVE-2016-2428, CVE-2016-2429
Certification process
out of scope, expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body

Standards
FIPS 140-2, ISO/IEC 17025, CCMB-2012-09-001, CCMB-2012-09-002, CCMB-2012-09-003

File metadata

Title Certification Report Sony Xperia X and Sony Xperia X Performance
Subject 16FMV2071-76:1
Author Imre Juhász
Creation date D:20170403103416+02'00'
Modification date D:20170403124210+02'00'
Pages 18
Creator Acrobat PDFMaker 11 för Word
Producer Adobe PDF Library 11.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES, AES-256, AES-, HMAC, HMAC-SHA-256
Asymmetric Algorithms
ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-256, SHA-384, SHA-512, SHA-224, SHA256, SHA384, SHA512, SHA-2, scrypt, PBKDF, PBKDF2
Schemes
MAC, AEAD
Protocols
TLS, TLS v1.0, TLS 1.0, TLS 1.1, TLS 1.2, IKE, IPsec, VPN
Randomness
DRBG, RNG, RBG
Libraries
OpenSSL, BoringSSL
Elliptic Curves
P-256, P-384, P-521, P-224, NIST P-224, secp256r1, secp384r1
Block cipher modes
ECB, CBC, CTR, GCM, CCM, XTS
TLS cipher suites
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_RSA_WITH_AES_256_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA, TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384

Trusted Execution Environments
ARM TrustZone, TrustZone, SE, TEE
Vendor
Qualcomm, Broadcom, Microsoft

Security level
EAL1
Claims
O.COMMS, O.STORAGE, O.CONFIG, O.AUTH, O.INTEGRITY, T.EAVESDROP, T.NETWORK, T.PHYSICAL, T.FLAWAPP, T.PERSISTENT, A.CONFIG, A.NOTIFY, A.PRECAUTION, OE.CONFIG, OE.NOTIFY, OE.PRECAUTION
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_TSU_EXT.1, ALC_CMC.1, ALC_CMS.1, ALC_TSU_EXT, ATE_IND.1, AVA_VAN.1, ASE_SPD.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1
Security Functional Requirements (SFR)
FCS_CKM, FCS_CKM_EXT.1, FCS_CKM_EXT.2, FCS_CKM_EXT.3, FCS_CKM_EXT.4, FCS_CKM_EXT.5, FCS_CKM_EXT.6, FCS_CKM_EXT.7, FCS_RBG_EXT.1, FCS_SRV_EXT.1, FCS_STG_EXT.1, FCS_TLSC_EXT.1, FCS_TLSC_EXT.2, FCS_CKM.1, FCS_CKM.1.1, FCS_CKM.2.1, FCS_CKM_EXT.1.1, FCS_CKM_EXT.1.2, FCS_CKM_EXT.1.3, FCS_CKM_EXT.1.4, FCS_CKM_EXT.2.1, FCS_CKM_EXT.3.1, FCS_CKM_EXT.3.2, FCS_CKM_EXT.4.1, FCS_CKM_EXT.4.2, FCS_CKM_EXT.5.1, FCS_CKM_EXT.5.2, FCS_CKM_EXT.6.1, FCS_CKM_EXT.7.1, FCS_COP, FCS_COP.1, FCS_COP.1.1, FCS_RBG, FCS_RBG_EXT.1.1, FCS_RBG_EXT.1.2, FCS_RBG_EXT.1.3, FCS_SRV, FCS_SRV_EXT.1.1, FCS_CKM.2, FCS_STG, FCS_STG_EXT.1.1, FCS_STG_EXT.1.2, FCS_STG_EXT.1.3, FCS_STG_EXT.1.4, FCS_STG_EXT.1.5, FCS_TLSC, FCS_TLSC_EXT.1.1, FCS_TLSC_EXT.1.2, FCS_TLSC_EXT.1.3, FCS_TLSC_EXT.1.4, FCS_TLSC_EXT.1.5, FCS_TLSC_EXT.2.1, FCS_TLSC_EXT.2.2, FCS_TLSC_EXT.2.3, FCS_TLSC_EXT.2.4, FCS_TLSC_EXT.2.5, FDP_ACF, FDP_DAR, FDP_IFC, FDP_STG, FDP_UPC, FDP_ACF_EXT.1, FDP_DAR_EXT.1, FDP_IFC_EXT.1, FDP_STG_EXT.1, FDP_UPC_EXT.1, FDP_ACF_EXT.1.1, FDP_ACF_EXT.1.2, FDP_DAR_EXT.1.1, FDP_DAR_EXT.1.2, FDP_IFC_EXT.1.1, FDP_STG_EXT.1.1, FDP_UPC_EXT.1.1, FDP_UPC_EXT.1.2, FIA_AFL, FIA_BLT, FIA_PAE, FIA_PMG, FIA_TRT, FIA_UAU, FIA_AFL_EXT.1, FIA_BLT_EXT.1, FIA_PAE_EXT.1, FIA_PMG_EXT.1, FIA_TRT_EXT.1, FIA_UAU_EXT.1, FIA_UAU_EXT.2, FIA_UAU_EXT.3, FIA_AFL_EXT.1.1, FIA_AFL_EXT.1.2, FIA_AFL_EXT.1.3, FIA_BLT_EXT.1.1, FIA_PMG_EXT.1.1, FIA_TRT_EXT.1.1, FIA_UAU.7, FIA_UAU.7.1, FIA_UAU_EXT.1.1, FIA_UAU_EXT.2.1, FIA_UAU_EXT.2.2, FIA_UAU_EXT.3.1, FMT_MOF, FMT_SMF, FMT_MOF_EXT.1, FMT_SMF_EXT.1, FMT_SMF_EXT.2, FMT_MOF_EXT.1.1, FMT_MOF_EXT.1.2, FMT_SMF_EXT.1.1, FMT_SMF_EXT.2.1, FPT_AEX, FPT_KST, FPT_STM, FPT_TST, FPT_TUD, FPT_AEX_EXT.1, FPT_AEX_EXT.2, FPT_AEX_EXT.3, FPT_AEX_EXT.4, FPT_KST_EXT.1, FPT_KST_EXT.2, FPT_KST_EXT.3, FPT_NOT_EXT.1, FPT_TST_EXT.1, FPT_TST_EXT.2, FPT_TUD_EXT.1, FPT_TUD_EXT.2, FPT_AEX_EXT.1.1, FPT_AEX_EXT.1.2, FPT_AEX_EXT.2.1, FPT_AEX_EXT.3.1, FPT_AEX_EXT.4.1, FPT_AEX_EXT.4.2, FPT_KST_EXT.1.1, FPT_KST_EXT.2.1, FPT_KST_EXT.3.1, FPT_NOT, FPT_NOT_EXT.1.1, FPT_STM.1, FPT_STM.1.1, FPT_TST_EXT.1.1, FPT_TST_EXT.2.1, FPT_TUD_EXT.1.1, FPT_TUD_EXT.1.2, FPT_TUD_EXT.1.3, FPT_TUD_EXT.2.1, FPT_TUD_EXT.2.2, FPT_TUD_EXT.2.3, FPT_TUD_EXT.2.4, FPT_TUD_EXT.2.6, FTA_SSL, FTA_WSE, FTA_SSL_EXT.1, FTA_WSE_EXT.1, FTA_SSL_EXT.1.1, FTA_SSL_EXT.1.2, FTA_SSL_EXT.1.3, FTA_TAB.1, FTA_TAB.1.1, FTA_WSE_EXT.1.1, FTP_ITC, FTP_ITC_EXT.1, FTP_ITC_EXT.1.1, FTP_ITC_EXT.1.2, FTP_ITC_EXT.1.3

Certification process
out of scope, These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security, expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the

Standards
FIPS PUB 186-4, FIPS PUB 197, FIPS 140-2, FIPS 197, FIPS 180-4, FIPS 198-1, FIPS 186-2, FIPS 186-4, FIPS 104-2, NIST SP 800-38F, NIST SP 800-108, NIST SP 800-38A, NIST SP 800-38C, NIST SP 800-38D, NIST SP 800-38E, NIST SP 800-132, NIST SP 800-57, SP 800-38, SP 800-90A, SP 800-56A, RFC 2818, RFC 4346, RFC 5246, RFC 4492, RFC 5289, RFC 6125, RFC 5280, RFC 5759, X.509, CCMB-2012-09-004

File metadata

Title Sony-CC-SecurityTarget_v1.2
Author Rasma
Creation date D:20170127123826Z
Modification date D:20170403152705+02'00'
Pages 61
Creator Word
Producer Mac OS X 10.12.2 Quartz PDFContext

Heuristics ?

Certificate ID: CSEC2010003

Extracted SARs

ALC_CMC.1, ATE_IND.1, ASE_TSS.1, AGD_OPE.1, ALC_TSU_EXT.1, ASE_REQ.1, AGD_PRE.1, ASE_CCL.1, ADV_FSP.1, ALC_CMS.1, ASE_INT.1, ASE_OBJ.1, ASE_ECD.1, ASE_SPD.1, AVA_VAN.1

References ?

No references are available for this certificate.

Updates ?

  • 17.10.2024 The certificate data changed.
    Certificate changed

    The Protection Profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Protection Profile for Mobile Device Fundamentals', 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp_md_v2.0.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PP_MD_V2.0']}}]}.
  • 22.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'bba9452e6772e797b6c986df804218da3e13189b7d1b8017a3cc9c7a5d2a39b1', 'txt_hash': 'a61fdf4661c73fd956b62f22c13e9c96b511a2458d3b2de0ed8bd282d5c7a82a'} data.
    • The st property was updated, with the {'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'a02cecb474580a181e1550ca46d93f4caaa92268f0241ff7124ee869f9d950d3', 'txt_hash': '5c97e3b28eaf82cd031a4bd2a8ff91c587e346b56d45af5c9aba1033585bea63'} data.
    • The cert property was updated, with the {'download_ok': True, 'convert_garbage': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '4b14297e2a8ba3bf1672258a50dcf46acd5039d3387cecd71baac2a0a0394f96', 'txt_hash': '6bc90b0cf8239851229dd1b1a4af52a3ee107ad5161de117405dc7f94131f31d'} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 145099, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 18, '/Ansvarigt Område/enhet': 'CSEC', '/Author': 'Imre Juhász', '/C-datum': '2008', '/CSECID': '', '/Category': '', '/Comments': '', '/Company': '', '/ContentTypeId': '0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603', '/CreationDate': "D:20170403103416+02'00'", '/Creator': 'Acrobat PDFMaker 11 för Word', '/Current Version': '', '/DDocBinder': 'Scheme (CB)', '/DDocCabinet': 'QMS', '/DDocID': '2005-03-05-64D6-T9YR', '/DDocLastModDate': '2006-03-16 10:56:39', '/DDocLibrary': 'https://haddock.fmv.se/domdoc/CSECLib.nsf', '/DDocRevision': '3,7', '/DDocTitle': '035 CB General Document - Template', '/Datum, skapat': '-', '/Deluppdragsbenämning': ' ', '/Dokument Status': 'Aktiv', '/Dokumentansvarig': 'Imre Juhász', '/Dokumentansvarigs enhet': 'KC Ledsyst', '/Dokumentbeteckning': '', '/Dokumentdatum': '2017-04-03', '/Dokumenttitel': 'Certification Report Sony Xperia X and Sony Xperia X Performance', '/Dokumenttyp': 'CB', '/FMV_beteckning': '16FMV2071-76:1', '/Fastställarens roll': 'Certifier', '/Fastställt av': 'Imre Juhász', '/Fastställt av1': 'Imre Juhász', '/Giltigt från': '-', '/Infoklass': 'HEMLIG/', '/Informationsklass': '', '/Keywords': '', '/Klassificeringsnr': '25 550', '/MallVersion': '7.0', '/ModDate': "D:20170403124210+02'00'", '/Paragraf': '', '/Platina': '1', '/Producer': 'Adobe PDF Library 11.0', '/Referens ID': 'CSEC-37-1156', '/Sekr. gäller tom.': '-', '/SourceModified': 'D:20170403083341', '/Stämpel': '1', '/Subject': '16FMV2071-76:1', '/Title': 'Certification Report Sony Xperia X and Sony Xperia X Performance', '/Uncontrolled': '0.000000', '/Uppdragsbenämning': ' ', '/Utgåva': '2.0', '/_dlc_DocId': 'CSEC-37-1156', '/_dlc_DocIdItemGuid': '671c079c-346d-423e-ac5c-f1312a8a09be', '/_dlc_DocIdUrl': 'http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The st_metadata property was set to {'pdf_file_size_bytes': 1236228, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 61, '/AAPL:Keywords': '[]', '/Author': 'Rasma', '/CreationDate': 'D:20170127123826Z', '/Creator': 'Word', '/Keywords': '', '/ModDate': "D:20170403152705+02'00'", '/Producer': 'Mac OS X 10.12.2 Quartz PDFContext', '/Subject': '', '/Title': 'Sony-CC-SecurityTarget_v1.2', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The cert_metadata property was set to {'pdf_file_size_bytes': 261750, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/CreationDate': "D:20170403155121+02'00'", '/ModDate': "D:20230313140935+01'00'", 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}.
    • The report_frontpage property was set to {}.
    • The report_keywords property was set to {'cc_cert_id': {'SE': {'CSEC201003': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_TSU_EXT.1': 3}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_ECD.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'Qualcomm': {'Qualcomm': 3}}, 'eval_facility': {'atsec': {'atsec': 6}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {'MAC': {'MAC': 3}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 1}}, 'VPN': {'VPN': 1}}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2016-3863': 1, 'CVE-2016-3861': 1, 'CVE-2016-3821': 1, 'CVE-2016-3820': 1, 'CVE-2016-3862': 1, 'CVE-2016-3840': 1, 'CVE-2016-3822': 1, 'CVE-2016-3743': 1, 'CVE-2016-3742': 1, 'CVE-2016-3741': 1, 'CVE-2016-2508': 1, 'CVE-2016-2507': 1, 'CVE-2016-2506': 1, 'CVE-2016-2464': 1, 'CVE-2016-2463': 1, 'CVE-2016-0841': 1, 'CVE-2016-0839': 1, 'CVE-2016-2428': 1, 'CVE-2016-2429': 1}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'other': {'TEE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS 140-2': 1}, 'ISO': {'ISO/IEC 17025': 2}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-002': 1, 'CCMB-2012-09-003': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL1': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.1': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_TSU_EXT.1': 3, 'ALC_CMC.1': 1, 'ALC_CMS.1': 1, 'ALC_TSU_EXT': 1}, 'ATE': {'ATE_IND.1': 1}, 'AVA': {'AVA_VAN.1': 1}, 'ASE': {'ASE_SPD.1': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_REQ.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FCS': {'FCS_CKM': 2, 'FCS_CKM_EXT.1': 3, 'FCS_CKM_EXT.2': 3, 'FCS_CKM_EXT.3': 4, 'FCS_CKM_EXT.4': 3, 'FCS_CKM_EXT.5': 3, 'FCS_CKM_EXT.6': 3, 'FCS_CKM_EXT.7': 3, 'FCS_RBG_EXT.1': 12, 'FCS_SRV_EXT.1': 4, 'FCS_STG_EXT.1': 3, 'FCS_TLSC_EXT.1': 3, 'FCS_TLSC_EXT.2': 5, 'FCS_CKM.1': 14, 'FCS_CKM.1.1': 2, 'FCS_CKM.2.1': 6, 'FCS_CKM_EXT.1.1': 2, 'FCS_CKM_EXT.1.2': 1, 'FCS_CKM_EXT.1.3': 1, 'FCS_CKM_EXT.1.4': 2, 'FCS_CKM_EXT.2.1': 1, 'FCS_CKM_EXT.3.1': 1, 'FCS_CKM_EXT.3.2': 1, 'FCS_CKM_EXT.4.1': 2, 'FCS_CKM_EXT.4.2': 1, 'FCS_CKM_EXT.5.1': 1, 'FCS_CKM_EXT.5.2': 1, 'FCS_CKM_EXT.6.1': 1, 'FCS_CKM_EXT.7.1': 1, 'FCS_COP': 1, 'FCS_COP.1': 34, 'FCS_COP.1.1': 5, 'FCS_RBG': 1, 'FCS_RBG_EXT.1.1': 1, 'FCS_RBG_EXT.1.2': 1, 'FCS_RBG_EXT.1.3': 1, 'FCS_SRV': 1, 'FCS_SRV_EXT.1.1': 1, 'FCS_CKM.2': 1, 'FCS_STG': 1, 'FCS_STG_EXT.1.1': 1, 'FCS_STG_EXT.1.2': 1, 'FCS_STG_EXT.1.3': 1, 'FCS_STG_EXT.1.4': 1, 'FCS_STG_EXT.1.5': 1, 'FCS_TLSC': 1, 'FCS_TLSC_EXT.1.1': 2, 'FCS_TLSC_EXT.1.2': 1, 'FCS_TLSC_EXT.1.3': 1, 'FCS_TLSC_EXT.1.4': 1, 'FCS_TLSC_EXT.1.5': 1, 'FCS_TLSC_EXT.2.1': 1, 'FCS_TLSC_EXT.2.2': 1, 'FCS_TLSC_EXT.2.3': 1, 'FCS_TLSC_EXT.2.4': 1, 'FCS_TLSC_EXT.2.5': 1}, 'FDP': {'FDP_ACF': 2, 'FDP_DAR': 2, 'FDP_IFC': 2, 'FDP_STG': 2, 'FDP_UPC': 2, 'FDP_ACF_EXT.1': 3, 'FDP_DAR_EXT.1': 3, 'FDP_IFC_EXT.1': 4, 'FDP_STG_EXT.1': 3, 'FDP_UPC_EXT.1': 3, 'FDP_ACF_EXT.1.1': 1, 'FDP_ACF_EXT.1.2': 1, 'FDP_DAR_EXT.1.1': 1, 'FDP_DAR_EXT.1.2': 1, 'FDP_IFC_EXT.1.1': 1, 'FDP_STG_EXT.1.1': 1, 'FDP_UPC_EXT.1.1': 1, 'FDP_UPC_EXT.1.2': 1}, 'FIA': {'FIA_AFL': 2, 'FIA_BLT': 2, 'FIA_PAE': 2, 'FIA_PMG': 2, 'FIA_TRT': 2, 'FIA_UAU': 2, 'FIA_AFL_EXT.1': 4, 'FIA_BLT_EXT.1': 3, 'FIA_PAE_EXT.1': 4, 'FIA_PMG_EXT.1': 3, 'FIA_TRT_EXT.1': 3, 'FIA_UAU_EXT.1': 3, 'FIA_UAU_EXT.2': 4, 'FIA_UAU_EXT.3': 3, 'FIA_AFL_EXT.1.1': 1, 'FIA_AFL_EXT.1.2': 1, 'FIA_AFL_EXT.1.3': 1, 'FIA_BLT_EXT.1.1': 1, 'FIA_PMG_EXT.1.1': 1, 'FIA_TRT_EXT.1.1': 1, 'FIA_UAU.7': 2, 'FIA_UAU.7.1': 1, 'FIA_UAU_EXT.1.1': 1, 'FIA_UAU_EXT.2.1': 1, 'FIA_UAU_EXT.2.2': 1, 'FIA_UAU_EXT.3.1': 1}, 'FMT': {'FMT_MOF': 2, 'FMT_SMF': 2, 'FMT_MOF_EXT.1': 3, 'FMT_SMF_EXT.1': 14, 'FMT_SMF_EXT.2': 3, 'FMT_MOF_EXT.1.1': 3, 'FMT_MOF_EXT.1.2': 3, 'FMT_SMF_EXT.1.1': 2, 'FMT_SMF_EXT.2.1': 1}, 'FPT': {'FPT_AEX': 2, 'FPT_KST': 2, 'FPT_STM': 2, 'FPT_TST': 2, 'FPT_TUD': 2, 'FPT_AEX_EXT.1': 3, 'FPT_AEX_EXT.2': 3, 'FPT_AEX_EXT.3': 3, 'FPT_AEX_EXT.4': 3, 'FPT_KST_EXT.1': 3, 'FPT_KST_EXT.2': 3, 'FPT_KST_EXT.3': 3, 'FPT_NOT_EXT.1': 3, 'FPT_TST_EXT.1': 3, 'FPT_TST_EXT.2': 3, 'FPT_TUD_EXT.1': 3, 'FPT_TUD_EXT.2': 3, 'FPT_AEX_EXT.1.1': 1, 'FPT_AEX_EXT.1.2': 1, 'FPT_AEX_EXT.2.1': 1, 'FPT_AEX_EXT.3.1': 1, 'FPT_AEX_EXT.4.1': 1, 'FPT_AEX_EXT.4.2': 1, 'FPT_KST_EXT.1.1': 1, 'FPT_KST_EXT.2.1': 1, 'FPT_KST_EXT.3.1': 1, 'FPT_NOT': 1, 'FPT_NOT_EXT.1.1': 1, 'FPT_STM.1': 2, 'FPT_STM.1.1': 1, 'FPT_TST_EXT.1.1': 1, 'FPT_TST_EXT.2.1': 1, 'FPT_TUD_EXT.1.1': 1, 'FPT_TUD_EXT.1.2': 1, 'FPT_TUD_EXT.1.3': 1, 'FPT_TUD_EXT.2.1': 1, 'FPT_TUD_EXT.2.2': 1, 'FPT_TUD_EXT.2.3': 1, 'FPT_TUD_EXT.2.4': 1, 'FPT_TUD_EXT.2.6': 1}, 'FTA': {'FTA_SSL': 2, 'FTA_WSE': 2, 'FTA_SSL_EXT.1': 3, 'FTA_WSE_EXT.1': 3, 'FTA_SSL_EXT.1.1': 1, 'FTA_SSL_EXT.1.2': 1, 'FTA_SSL_EXT.1.3': 1, 'FTA_TAB.1': 2, 'FTA_TAB.1.1': 1, 'FTA_WSE_EXT.1.1': 1}, 'FTP': {'FTP_ITC': 2, 'FTP_ITC_EXT.1': 3, 'FTP_ITC_EXT.1.1': 1, 'FTP_ITC_EXT.1.2': 1, 'FTP_ITC_EXT.1.3': 1}}, 'cc_claims': {'O': {'O.COMMS': 1, 'O.STORAGE': 1, 'O.CONFIG': 1, 'O.AUTH': 1, 'O.INTEGRITY': 1}, 'T': {'T.EAVESDROP': 1, 'T.NETWORK': 1, 'T.PHYSICAL': 3, 'T.FLAWAPP': 2, 'T.PERSISTENT': 2}, 'A': {'A.CONFIG': 1, 'A.NOTIFY': 1, 'A.PRECAUTION': 1}, 'OE': {'OE.CONFIG': 1, 'OE.NOTIFY': 1, 'OE.PRECAUTION': 1}}, 'vendor': {'Qualcomm': {'Qualcomm': 9}, 'Broadcom': {'Broadcom': 4}, 'Microsoft': {'Microsoft': 5}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 27, 'AES-256': 1, 'AES-': 1}}, 'constructions': {'MAC': {'HMAC': 5, 'HMAC-SHA-256': 2}}}, 'asymmetric_crypto': {'ECC': {'ECDH': {'ECDH': 4}, 'ECDSA': {'ECDSA': 7}, 'ECC': {'ECC': 6}}, 'FF': {'DH': {'Diffie-Hellman': 1}}}, 'pq_crypto': {}, 'hash_function': {'SHA': {'SHA1': {'SHA-1': 7}, 'SHA2': {'SHA-256': 8, 'SHA-384': 2, 'SHA-512': 2, 'SHA-224': 1, 'SHA256': 2, 'SHA384': 1, 'SHA512': 1, 'SHA-2': 1}}, 'scrypt': {'scrypt': 4}, 'PBKDF': {'PBKDF': 9, 'PBKDF2': 2}}, 'crypto_scheme': {'MAC': {'MAC': 7}, 'AEAD': {'AEAD': 1}}, 'crypto_protocol': {'TLS': {'TLS': {'TLS': 25, 'TLS v1.0': 1, 'TLS 1.0': 2, 'TLS 1.1': 2, 'TLS 1.2': 4}}, 'IKE': {'IKE': 2}, 'IPsec': {'IPsec': 7}, 'VPN': {'VPN': 33}}, 'randomness': {'PRNG': {'DRBG': 3}, 'RNG': {'RNG': 6, 'RBG': 8}}, 'cipher_mode': {'ECB': {'ECB': 6}, 'CBC': {'CBC': 11}, 'CTR': {'CTR': 4}, 'GCM': {'GCM': 4}, 'CCM': {'CCM': 3}, 'XTS': {'XTS': 9}}, 'ecc_curve': {'NIST': {'P-256': 10, 'P-384': 10, 'P-521': 10, 'P-224': 1, 'NIST P-224': 1, 'secp256r1': 3, 'secp384r1': 3}}, 'crypto_engine': {}, 'tls_cipher_suite': {'TLS': {'TLS_RSA_WITH_AES_128_CBC_SHA': 4, 'TLS_RSA_WITH_AES_256_CBC_SHA': 4, 'TLS_DHE_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_DHE_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA': 2, 'TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA': 2, 'TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256': 2, 'TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384': 2}}, 'crypto_library': {'OpenSSL': {'OpenSSL': 4}, 'BoringSSL': {'BoringSSL': 3}}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {'ARM': {'ARM TrustZone': 1, 'TrustZone': 1}, 'IBM': {'SE': 2}, 'other': {'TEE': 19}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 186-4': 8, 'FIPS PUB 197': 4, 'FIPS 140-2': 6, 'FIPS 197': 5, 'FIPS 180-4': 3, 'FIPS 198-1': 3, 'FIPS 186-2': 1, 'FIPS 186-4': 5, 'FIPS 104-2': 1}, 'NIST': {'NIST SP 800-38F': 4, 'NIST SP 800-108': 1, 'NIST SP 800-38A': 2, 'NIST SP 800-38C': 2, 'NIST SP 800-38D': 2, 'NIST SP 800-38E': 2, 'NIST SP 800-132': 2, 'NIST SP 800-57': 2, 'SP 800-38': 4, 'SP 800-90A': 1, 'SP 800-56A': 2}, 'RFC': {'RFC 2818': 2, 'RFC 4346': 2, 'RFC 5246': 14, 'RFC 4492': 8, 'RFC 5289': 4, 'RFC 6125': 2, 'RFC 5280': 4, 'RFC 5759': 2}, 'X509': {'X.509': 5}, 'CC': {'CCMB-2012-09-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {'java': {'java.security.cert': 3}, 'com': {'com.android.voicemail.permission': 1}}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security': 1, 'expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the': 1}}}.
    • The cert_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 2': 1}}, 'cc_sar': {'ALC': {'ALC_FLR': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'atsec': {'atsec': 1}}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to Certification Report Sony X.pdf.
    • The st_filename property was set to Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf.
    • The cert_filename property was set to ccra cert sony x.pdf.

    The computed heuristics were updated.

    • The cert_id property was set to CSEC2010003.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TSU_EXT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 1}]}.
  • 17.08.2024 The certificate data changed.
    Certificate changed

    The report_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf.

    The st_link was updated.

    • The new value is https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf.

    The state of the certificate object was updated.

    • The report property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.
    • The cert property was updated, with the {'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The cert_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The cert_keywords property was set to None.
    • The report_filename property was set to None.
    • The cert_filename property was set to None.

    The computed heuristics were updated.

    • The cert_id property was set to None.
    • The extracted_sars property was set to None.
  • 12.08.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st property was updated, with the {'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None} data.

    The PDF extraction data was updated.

    • The st_metadata property was set to None.
    • The st_keywords property was set to None.
    • The st_filename property was set to None.

    The computed heuristics were updated.

    • The extracted_sars property was updated, with the {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}]} values discarded.
  • 23.07.2024 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name Sony Xperia™ X and Sony Xperia™ X Performance was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Mobility",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ccra%20cert%20sony%20x.pdf",
  "dgst": "69e48d085b8d8069",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CSEC2010003",
    "cert_lab": null,
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TSU_EXT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Sony Mobile Communications Inc.",
  "manufacturer_web": "https://www.sonymobile.com/se/",
  "name": "Sony Xperia\u2122 X and Sony Xperia\u2122 X Performance",
  "not_valid_after": "2021-12-07",
  "not_valid_before": "2016-12-07",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "ccra cert sony x.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20170403155121+02\u002700\u0027",
      "/ModDate": "D:20230313140935+01\u002700\u0027",
      "pdf_file_size_bytes": 261750,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "Certification Report Sony X.pdf",
    "report_frontpage": {},
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "SE": {
          "CSEC201003": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1,
          "ALC_TSU_EXT.1": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP: Malicious or Flawed Application Swedish Certification Body": 1,
          "out of scope": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {
        "TLS": {
          "TLS": {
            "TLS": 1
          }
        },
        "VPN": {
          "VPN": 1
        }
      },
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "atsec": {
          "atsec": 6
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-002": 1,
          "CCMB-2012-09-003": 1
        },
        "FIPS": {
          "FIPS 140-2": 1
        },
        "ISO": {
          "ISO/IEC 17025": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "other": {
          "TEE": 2
        }
      },
      "tls_cipher_suite": {},
      "vendor": {
        "Qualcomm": {
          "Qualcomm": 3
        }
      },
      "vulnerability": {
        "CVE": {
          "CVE-2016-0839": 1,
          "CVE-2016-0841": 1,
          "CVE-2016-2428": 1,
          "CVE-2016-2429": 1,
          "CVE-2016-2463": 1,
          "CVE-2016-2464": 1,
          "CVE-2016-2506": 1,
          "CVE-2016-2507": 1,
          "CVE-2016-2508": 1,
          "CVE-2016-3741": 1,
          "CVE-2016-3742": 1,
          "CVE-2016-3743": 1,
          "CVE-2016-3820": 1,
          "CVE-2016-3821": 1,
          "CVE-2016-3822": 1,
          "CVE-2016-3840": 1,
          "CVE-2016-3861": 1,
          "CVE-2016-3862": 1,
          "CVE-2016-3863": 1
        }
      }
    },
    "report_metadata": {
      "/Ansvarigt Omr\u00e5de/enhet": "CSEC",
      "/Author": "Imre Juh\u00e1sz",
      "/C-datum": "2008",
      "/CSECID": "",
      "/Category": "",
      "/Comments": "",
      "/Company": "",
      "/ContentTypeId": "0x010100F76CA16D2B00D340871F443D8708C84D010072C770E6C96E7A4EA94967F9D5C0E603",
      "/CreationDate": "D:20170403103416+02\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 f\u00f6r Word",
      "/Current Version": "",
      "/DDocBinder": "Scheme (CB)",
      "/DDocCabinet": "QMS",
      "/DDocID": "2005-03-05-64D6-T9YR",
      "/DDocLastModDate": "2006-03-16 10:56:39",
      "/DDocLibrary": "https://haddock.fmv.se/domdoc/CSECLib.nsf",
      "/DDocRevision": "3,7",
      "/DDocTitle": "035 CB General Document - Template",
      "/Datum, skapat": "-",
      "/Deluppdragsben\u00e4mning": " ",
      "/Dokument Status": "Aktiv",
      "/Dokumentansvarig": "Imre Juh\u00e1sz",
      "/Dokumentansvarigs enhet": "KC Ledsyst",
      "/Dokumentbeteckning": "",
      "/Dokumentdatum": "2017-04-03",
      "/Dokumenttitel": "Certification Report Sony Xperia X and Sony Xperia X Performance",
      "/Dokumenttyp": "CB",
      "/FMV_beteckning": "16FMV2071-76:1",
      "/Fastst\u00e4llarens roll": "Certifier",
      "/Fastst\u00e4llt av": "Imre Juh\u00e1sz",
      "/Fastst\u00e4llt av1": "Imre Juh\u00e1sz",
      "/Giltigt fr\u00e5n": "-",
      "/Infoklass": "HEMLIG/",
      "/Informationsklass": "",
      "/Keywords": "",
      "/Klassificeringsnr": "25 550",
      "/MallVersion": "7.0",
      "/ModDate": "D:20170403124210+02\u002700\u0027",
      "/Paragraf": "",
      "/Platina": "1",
      "/Producer": "Adobe PDF Library 11.0",
      "/Referens ID": "CSEC-37-1156",
      "/Sekr. g\u00e4ller tom.": "-",
      "/SourceModified": "D:20170403083341",
      "/St\u00e4mpel": "1",
      "/Subject": "16FMV2071-76:1",
      "/Title": "Certification Report Sony Xperia X and Sony Xperia X Performance",
      "/Uncontrolled": "0.000000",
      "/Uppdragsben\u00e4mning": " ",
      "/Utg\u00e5va": "2.0",
      "/_dlc_DocId": "CSEC-37-1156",
      "/_dlc_DocIdItemGuid": "671c079c-346d-423e-ac5c-f1312a8a09be",
      "/_dlc_DocIdUrl": "http://sp.fmv.se/sites/CSEC/_layouts/15/DocIdRedir.aspx?ID=CSEC-37-1156, CSEC-37-1156",
      "pdf_file_size_bytes": 145099,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 18
    },
    "st_filename": "Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 6
          },
          "ECDH": {
            "ECDH": 4
          },
          "ECDSA": {
            "ECDSA": 7
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.CONFIG": 1,
          "A.NOTIFY": 1,
          "A.PRECAUTION": 1
        },
        "O": {
          "O.AUTH": 1,
          "O.COMMS": 1,
          "O.CONFIG": 1,
          "O.INTEGRITY": 1,
          "O.STORAGE": 1
        },
        "OE": {
          "OE.CONFIG": 1,
          "OE.NOTIFY": 1,
          "OE.PRECAUTION": 1
        },
        "T": {
          "T.EAVESDROP": 1,
          "T.FLAWAPP": 2,
          "T.NETWORK": 1,
          "T.PERSISTENT": 2,
          "T.PHYSICAL": 3
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1,
          "ALC_TSU_EXT": 1,
          "ALC_TSU_EXT.1": 3
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.1": 1,
          "ASE_REQ.1": 1,
          "ASE_SPD.1": 3,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL1": 1
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_CKM": 2,
          "FCS_CKM.1": 14,
          "FCS_CKM.1.1": 2,
          "FCS_CKM.2": 1,
          "FCS_CKM.2.1": 6,
          "FCS_CKM_EXT.1": 3,
          "FCS_CKM_EXT.1.1": 2,
          "FCS_CKM_EXT.1.2": 1,
          "FCS_CKM_EXT.1.3": 1,
          "FCS_CKM_EXT.1.4": 2,
          "FCS_CKM_EXT.2": 3,
          "FCS_CKM_EXT.2.1": 1,
          "FCS_CKM_EXT.3": 4,
          "FCS_CKM_EXT.3.1": 1,
          "FCS_CKM_EXT.3.2": 1,
          "FCS_CKM_EXT.4": 3,
          "FCS_CKM_EXT.4.1": 2,
          "FCS_CKM_EXT.4.2": 1,
          "FCS_CKM_EXT.5": 3,
          "FCS_CKM_EXT.5.1": 1,
          "FCS_CKM_EXT.5.2": 1,
          "FCS_CKM_EXT.6": 3,
          "FCS_CKM_EXT.6.1": 1,
          "FCS_CKM_EXT.7": 3,
          "FCS_CKM_EXT.7.1": 1,
          "FCS_COP": 1,
          "FCS_COP.1": 34,
          "FCS_COP.1.1": 5,
          "FCS_RBG": 1,
          "FCS_RBG_EXT.1": 12,
          "FCS_RBG_EXT.1.1": 1,
          "FCS_RBG_EXT.1.2": 1,
          "FCS_RBG_EXT.1.3": 1,
          "FCS_SRV": 1,
          "FCS_SRV_EXT.1": 4,
          "FCS_SRV_EXT.1.1": 1,
          "FCS_STG": 1,
          "FCS_STG_EXT.1": 3,
          "FCS_STG_EXT.1.1": 1,
          "FCS_STG_EXT.1.2": 1,
          "FCS_STG_EXT.1.3": 1,
          "FCS_STG_EXT.1.4": 1,
          "FCS_STG_EXT.1.5": 1,
          "FCS_TLSC": 1,
          "FCS_TLSC_EXT.1": 3,
          "FCS_TLSC_EXT.1.1": 2,
          "FCS_TLSC_EXT.1.2": 1,
          "FCS_TLSC_EXT.1.3": 1,
          "FCS_TLSC_EXT.1.4": 1,
          "FCS_TLSC_EXT.1.5": 1,
          "FCS_TLSC_EXT.2": 5,
          "FCS_TLSC_EXT.2.1": 1,
          "FCS_TLSC_EXT.2.2": 1,
          "FCS_TLSC_EXT.2.3": 1,
          "FCS_TLSC_EXT.2.4": 1,
          "FCS_TLSC_EXT.2.5": 1
        },
        "FDP": {
          "FDP_ACF": 2,
          "FDP_ACF_EXT.1": 3,
          "FDP_ACF_EXT.1.1": 1,
          "FDP_ACF_EXT.1.2": 1,
          "FDP_DAR": 2,
          "FDP_DAR_EXT.1": 3,
          "FDP_DAR_EXT.1.1": 1,
          "FDP_DAR_EXT.1.2": 1,
          "FDP_IFC": 2,
          "FDP_IFC_EXT.1": 4,
          "FDP_IFC_EXT.1.1": 1,
          "FDP_STG": 2,
          "FDP_STG_EXT.1": 3,
          "FDP_STG_EXT.1.1": 1,
          "FDP_UPC": 2,
          "FDP_UPC_EXT.1": 3,
          "FDP_UPC_EXT.1.1": 1,
          "FDP_UPC_EXT.1.2": 1
        },
        "FIA": {
          "FIA_AFL": 2,
          "FIA_AFL_EXT.1": 4,
          "FIA_AFL_EXT.1.1": 1,
          "FIA_AFL_EXT.1.2": 1,
          "FIA_AFL_EXT.1.3": 1,
          "FIA_BLT": 2,
          "FIA_BLT_EXT.1": 3,
          "FIA_BLT_EXT.1.1": 1,
          "FIA_PAE": 2,
          "FIA_PAE_EXT.1": 4,
          "FIA_PMG": 2,
          "FIA_PMG_EXT.1": 3,
          "FIA_PMG_EXT.1.1": 1,
          "FIA_TRT": 2,
          "FIA_TRT_EXT.1": 3,
          "FIA_TRT_EXT.1.1": 1,
          "FIA_UAU": 2,
          "FIA_UAU.7": 2,
          "FIA_UAU.7.1": 1,
          "FIA_UAU_EXT.1": 3,
          "FIA_UAU_EXT.1.1": 1,
          "FIA_UAU_EXT.2": 4,
          "FIA_UAU_EXT.2.1": 1,
          "FIA_UAU_EXT.2.2": 1,
          "FIA_UAU_EXT.3": 3,
          "FIA_UAU_EXT.3.1": 1
        },
        "FMT": {
          "FMT_MOF": 2,
          "FMT_MOF_EXT.1": 3,
          "FMT_MOF_EXT.1.1": 3,
          "FMT_MOF_EXT.1.2": 3,
          "FMT_SMF": 2,
          "FMT_SMF_EXT.1": 14,
          "FMT_SMF_EXT.1.1": 2,
          "FMT_SMF_EXT.2": 3,
          "FMT_SMF_EXT.2.1": 1
        },
        "FPT": {
          "FPT_AEX": 2,
          "FPT_AEX_EXT.1": 3,
          "FPT_AEX_EXT.1.1": 1,
          "FPT_AEX_EXT.1.2": 1,
          "FPT_AEX_EXT.2": 3,
          "FPT_AEX_EXT.2.1": 1,
          "FPT_AEX_EXT.3": 3,
          "FPT_AEX_EXT.3.1": 1,
          "FPT_AEX_EXT.4": 3,
          "FPT_AEX_EXT.4.1": 1,
          "FPT_AEX_EXT.4.2": 1,
          "FPT_KST": 2,
          "FPT_KST_EXT.1": 3,
          "FPT_KST_EXT.1.1": 1,
          "FPT_KST_EXT.2": 3,
          "FPT_KST_EXT.2.1": 1,
          "FPT_KST_EXT.3": 3,
          "FPT_KST_EXT.3.1": 1,
          "FPT_NOT": 1,
          "FPT_NOT_EXT.1": 3,
          "FPT_NOT_EXT.1.1": 1,
          "FPT_STM": 2,
          "FPT_STM.1": 2,
          "FPT_STM.1.1": 1,
          "FPT_TST": 2,
          "FPT_TST_EXT.1": 3,
          "FPT_TST_EXT.1.1": 1,
          "FPT_TST_EXT.2": 3,
          "FPT_TST_EXT.2.1": 1,
          "FPT_TUD": 2,
          "FPT_TUD_EXT.1": 3,
          "FPT_TUD_EXT.1.1": 1,
          "FPT_TUD_EXT.1.2": 1,
          "FPT_TUD_EXT.1.3": 1,
          "FPT_TUD_EXT.2": 3,
          "FPT_TUD_EXT.2.1": 1,
          "FPT_TUD_EXT.2.2": 1,
          "FPT_TUD_EXT.2.3": 1,
          "FPT_TUD_EXT.2.4": 1,
          "FPT_TUD_EXT.2.6": 1
        },
        "FTA": {
          "FTA_SSL": 2,
          "FTA_SSL_EXT.1": 3,
          "FTA_SSL_EXT.1.1": 1,
          "FTA_SSL_EXT.1.2": 1,
          "FTA_SSL_EXT.1.3": 1,
          "FTA_TAB.1": 2,
          "FTA_TAB.1.1": 1,
          "FTA_WSE": 2,
          "FTA_WSE_EXT.1": 3,
          "FTA_WSE_EXT.1.1": 1
        },
        "FTP": {
          "FTP_ITC": 2,
          "FTP_ITC_EXT.1": 3,
          "FTP_ITC_EXT.1.1": 1,
          "FTP_ITC_EXT.1.2": 1,
          "FTP_ITC_EXT.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "These services, including some specific Xperia in Business services, such as Xperia Care, are out of scope of the TOE. 1 Much of the information provided in this section originates from the Android Security": 1,
          "expected to return to its user. Note: Defending against device re-use after physical compromise is out of scope for this protection profile. T.FLAWAPP Malicious or Flawed Application Applications loaded onto the": 1,
          "out of scope": 2
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 11
        },
        "CCM": {
          "CCM": 3
        },
        "CTR": {
          "CTR": 4
        },
        "ECB": {
          "ECB": 6
        },
        "GCM": {
          "GCM": 4
        },
        "XTS": {
          "XTS": 9
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {
        "BoringSSL": {
          "BoringSSL": 3
        },
        "OpenSSL": {
          "OpenSSL": 4
        }
      },
      "crypto_protocol": {
        "IKE": {
          "IKE": 2
        },
        "IPsec": {
          "IPsec": 7
        },
        "TLS": {
          "TLS": {
            "TLS": 25,
            "TLS 1.0": 2,
            "TLS 1.1": 2,
            "TLS 1.2": 4,
            "TLS v1.0": 1
          }
        },
        "VPN": {
          "VPN": 33
        }
      },
      "crypto_scheme": {
        "AEAD": {
          "AEAD": 1
        },
        "MAC": {
          "MAC": 7
        }
      },
      "device_model": {},
      "ecc_curve": {
        "NIST": {
          "NIST P-224": 1,
          "P-224": 1,
          "P-256": 10,
          "P-384": 10,
          "P-521": 10,
          "secp256r1": 3,
          "secp384r1": 3
        }
      },
      "eval_facility": {},
      "hash_function": {
        "PBKDF": {
          "PBKDF": 9,
          "PBKDF2": 2
        },
        "SHA": {
          "SHA1": {
            "SHA-1": 7
          },
          "SHA2": {
            "SHA-2": 1,
            "SHA-224": 1,
            "SHA-256": 8,
            "SHA-384": 2,
            "SHA-512": 2,
            "SHA256": 2,
            "SHA384": 1,
            "SHA512": 1
          }
        },
        "scrypt": {
          "scrypt": 4
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {
        "com": {
          "com.android.voicemail.permission": 1
        },
        "java": {
          "java.security.cert": 3
        }
      },
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "PRNG": {
          "DRBG": 3
        },
        "RNG": {
          "RBG": 8,
          "RNG": 6
        }
      },
      "side_channel_analysis": {},
      "standard_id": {
        "CC": {
          "CCMB-2012-09-004": 1
        },
        "FIPS": {
          "FIPS 104-2": 1,
          "FIPS 140-2": 6,
          "FIPS 180-4": 3,
          "FIPS 186-2": 1,
          "FIPS 186-4": 5,
          "FIPS 197": 5,
          "FIPS 198-1": 3,
          "FIPS PUB 186-4": 8,
          "FIPS PUB 197": 4
        },
        "NIST": {
          "NIST SP 800-108": 1,
          "NIST SP 800-132": 2,
          "NIST SP 800-38A": 2,
          "NIST SP 800-38C": 2,
          "NIST SP 800-38D": 2,
          "NIST SP 800-38E": 2,
          "NIST SP 800-38F": 4,
          "NIST SP 800-57": 2,
          "SP 800-38": 4,
          "SP 800-56A": 2,
          "SP 800-90A": 1
        },
        "RFC": {
          "RFC 2818": 2,
          "RFC 4346": 2,
          "RFC 4492": 8,
          "RFC 5246": 14,
          "RFC 5280": 4,
          "RFC 5289": 4,
          "RFC 5759": 2,
          "RFC 6125": 2
        },
        "X509": {
          "X.509": 5
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 27,
            "AES-": 1,
            "AES-256": 1
          }
        },
        "constructions": {
          "MAC": {
            "HMAC": 5,
            "HMAC-SHA-256": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {
        "ARM": {
          "ARM TrustZone": 1,
          "TrustZone": 1
        },
        "IBM": {
          "SE": 2
        },
        "other": {
          "TEE": 19
        }
      },
      "tls_cipher_suite": {
        "TLS": {
          "TLS_DHE_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_DHE_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384": 2,
          "TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA": 2,
          "TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA": 2,
          "TLS_RSA_WITH_AES_128_CBC_SHA": 4,
          "TLS_RSA_WITH_AES_256_CBC_SHA": 4
        }
      },
      "vendor": {
        "Broadcom": {
          "Broadcom": 4
        },
        "Microsoft": {
          "Microsoft": 5
        },
        "Qualcomm": {
          "Qualcomm": 9
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/AAPL:Keywords": "[]",
      "/Author": "Rasma",
      "/CreationDate": "D:20170127123826Z",
      "/Creator": "Word",
      "/Keywords": "",
      "/ModDate": "D:20170403152705+02\u002700\u0027",
      "/Producer": "Mac OS X 10.12.2 Quartz PDFContext",
      "/Subject": "",
      "/Title": "Sony-CC-SecurityTarget_v1.2",
      "pdf_file_size_bytes": 1236228,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 61
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": null,
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PP_MD_V2.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp_md_v2.0.pdf",
        "pp_name": "Protection Profile for Mobile Device Fundamentals"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Sony%20X.pdf",
  "scheme": "SE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Sony-CC-SecurityTarget_v1.2(348227)_TMP.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "4b14297e2a8ba3bf1672258a50dcf46acd5039d3387cecd71baac2a0a0394f96",
      "txt_hash": "6bc90b0cf8239851229dd1b1a4af52a3ee107ad5161de117405dc7f94131f31d"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "bba9452e6772e797b6c986df804218da3e13189b7d1b8017a3cc9c7a5d2a39b1",
      "txt_hash": "a61fdf4661c73fd956b62f22c13e9c96b511a2458d3b2de0ed8bd282d5c7a82a"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a02cecb474580a181e1550ca46d93f4caaa92268f0241ff7124ee869f9d950d3",
      "txt_hash": "5c97e3b28eaf82cd031a4bd2a8ff91c587e346b56d45af5c9aba1033585bea63"
    }
  },
  "status": "archived"
}