NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11

CSV information

Status active
Valid from 04.04.2024
Valid until 04.04.2029
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL6+, ASE_TSS.2, ALC_FLR.1
Protection profiles

Heuristics summary

Certificate ID: NSCIB-CC-2300172-01-CR

Certificate

Extracted keywords

Operating System name
JCOP 4
Vendor
NXP Semiconductors

Security level
EAL6, EAL2, EAL7, EAL6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3, ALC_FLR, ASE_TSS.2
Protection profiles
BSI-CC-PP-0099-2017
Certificates
NSCIB-CC-2300172-01, NSCIB-2300172-01
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

File metadata

Title NSCIB Certificate
Author Haak
Creation date D:20240408165553+01'00'
Modification date D:20240408165553+01'00'
Pages 1
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Randomness
RNG
Block cipher modes
ECB, CBC, CCM

Operating System name
JCOP 4
Vendor
NXP Semiconductors, NXP

Security level
EAL4, EAL6, EAL6+, EAL 6, EAL6 augmented, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2
Security Functional Requirements (SFR)
FCS_RNG.1
Protection profiles
BSI-CC-PP-0099-2017
Certificates
BSI-DSZ-CC-1136-V4-2024, NSCIB-CC-2300172-01-CR, NSCIB-2300172-01
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Side-channel analysis
side channel, side-channel, DFA, JIL-AM, JIL, JIL-AAPS
Certification process
out of scope, provided by the composite (certified hardware and crypto library). The items in light-grey are out of scope. 2.5 Documentation The following documentation is provided with the product by the developer to the

Standards
AIS 20, AIS20, RFC-5869

File metadata

Creation date D:20240408133522+02'00'
Modification date D:20240408133522+02'00'
Pages 15
Creator Microsoft® Word LTSC
Producer Microsoft® Word LTSC

Frontpage

Certificate ID NSCIB-CC-2300172-01-CR
Certified item JCOP 4 P71, versions JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
Certification lab SGS Brightsight B.V.
Developer NXP Semiconductors Germany GmbH

References

Outgoing
  • BSI-DSZ-CC-1136-V4-2024 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
Incoming
  • ANSSI-CC-2021/20-R01 - active - ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01)
  • ANSSI-CC-2021/19-R01 - active - ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01)
  • ANSSI-CC-2020/73-R01 - active - ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01)
  • ANSSI-CC-2020/10-R01 - active - ChipDoc v3 on JCOP 4 P71 in ICAO BAC configuration(Version 3.0.0.52)
  • ANSSI-CC-2021/18-R01 - active - ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01)
  • ANSSI-CC-2025/02 - active - ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02)
  • ANSSI-CC-2020/72-R01 - active - ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01)
  • ANSSI-CC-2025/01 - active - ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01)
  • NSCIB-CC-2400004-01-CR - active - SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TripleDES, Triple-DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RND, RNG
Engines
SmartMX3
Block cipher modes
ECB, CBC, CCM

JavaCard API constants
ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_NOPAD, ALG_DES_ECB_ISO9797_, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC8_, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_NOPAD, ALG_RSA_NOPAD, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_256_ISO9796, ALG_RSA_SHA_PKCS1, ALG_ECDSA_SHA_, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_, ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD, ALG_AES_BLOCK_128_, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_, ALG_AES_CTR, ALG_AES_MAC_128_NOPAD, ALG_AES_MAC_128_ISO9797_1_M2_ALG3, ALG_AES_CMAC8, ALG_AES_CMAC16_STANDARD, ALG_AES_CMAC_128, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA_224, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA_PLAIN, CIPHER_ECDSA, PAD_PKCS1_OAEP, TYPE_ACCESS, LENGTH_DES3_2KEY, LENGTH_DES3_3KEY, LENGTH_AES_192, LENGTH_AES_256, LENGTH_RSA_4096, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_, LENGTH_EC_FP_384, LENGTH_EC_FP_521, LENGTH_EC_FP_320, LENGTH_AES_128, LENGTH_RSA_2048, LENGTH_SHA, LENGTH_SHA_224, LENGTH_SHA_256, LENGTH_SHA_384, LENGTH_RSA_1024
Operating System name
JCOP 4
Vendor
NXP Semiconductors, NXP

Security level
EAL6, EAL6 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.APSD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.CARD_MNGT_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG_ITEM, D.MODULE_CODE, D.MODULE_DATA, D.ATTACK_COUNTER, D.APP_I_, D.API_, D.APP_, D.JCS_, D.MODULE_, D.APP_C_, D.ATTACK_, O.EXT-MEM, O.INSTALL, O.LOAD, O.DELETION, O.REMOTE, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.EXT_MEM_INSTANCE, O.SB_SFR, O.NON_SB_SFR, O.PUF, O.CODE_MODULE, O.EXT_MEM_IN, O.EXT_MEM_, O.CODE_, O.EXT_, O.NON_, O.NON_SB_, T.OS_OPERATE, T.RND, T.COM_EXPLOIT, T.LIFE_CYCLE, T.UNAUTHORIZED_CARD_MNGT, T.INTEG-APPLI-DATA, T.CONFIG, T.SEC_BOX_BORDER, T.MODULE_EXEC, T.MODULE_REPLACEMENT, T.INSTALL, T.DELETION, T.INTEG-APPLI-, T.ATTACK-COUNTER, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.INTEG-APPLI-CODE, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.OBJ-DELETION, T.PHYSICAL, T.INTEG-APPLIDATA, A.USE_, A.USE_KEYS, A.PROCESS-SEC-IC, A.USE_DIAG, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OT.IDENTIFICATION, OT.DOMAIN-RIGHTS, OT.APPLI-AUTH, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.CARD-CONFIGURATION, OT.SEC_BOX_FW, OT.SID_MODULE, OT.COMM_, OT.SCP, OT.CARD-MANAGEMENT, OT.CARD-, OT.EXT-MEM, OT.SID, OT.FIREWALL, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.SENSITIVE_RESULTS_INTEG, OT.ALARM, OT.CIPHER, OT.RNG, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.RND, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.ARRAY_, OP.PUT, OP.CREATE_EXT_MEM_IN-, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OP.SB_ACCESS, OP.SB_ACCESS_SFR, OP.INVOKE_MODULE, OP.DELETE_MODULE, OP.PUTFIELD, OP.PUTSTATIC, OP.DELETE_, OP.CREATE_EXT_MEM_INSTANCE, OE.USE_DIAG, OE.USE_KEYS, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.PROCESS_SEC_IC, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.CODE-, OE.VERIFICATION-, SA.CONFID-APPLI-DATA, SA.CONFID-JCS-CODE, SA.CONFID-JCS-DATA, SA.INTEG-APPLI-CODE, SA.INTEG-APPLI-DATA, SA.INTEG-APPLI-DATA-PHYS, SA.INTEG-JCS-CODE, SA.INTEG-JCS-DATA, SA.EXE-APPLI-CODE, SA.EXE-JCS-CODE, SA.NATIVE, SA.FIREWALL, SA.VERIFICATION, SA.CARD-MANAGEMENT, SA.INSTALL, SA.SID, SA.OBJ-DELETION, SA.DELETION, SA.ALARM, SA.OPERATE, SA.RESOURCES, SA.CIPHER, SA.KEY-MNGT, SA.PIN-MNGT, SA.SCP, SA.TRANSACTION, SA.EXT-MNGT, SA.CONFIGURATION-MODULE, SA.MODULAR-DESIGN, SA.MODULE-INVOCATION, SA.RM, SA.EXE-, SA.MODULE-, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURE-BOX, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, AGD_OPE.1, ALC_FLR.1, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_TSS.2, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FCO_NRO, FCO_NRO.2, FCO_NRO.1, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2.1, FCS_CKM.3.1, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1, FDP_UIT, FDP_UIT.1, FDP_ROL.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ROL.1.2, FDP_ROL.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ACC.1.1, FDP_IFC.2.1, FDP_IFC.2.2, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_ATD.1, FIA_USB.1, FIA_AFL.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_SMF, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-CC-PP-0099-2017, BSI-PP-0084-2014, BSI-PP-0055, BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1136-V4-2024, NSCIB-2300172-01, CC-1136

Side-channel analysis
physical probing, side channel, side-channel, DPA, SPA, timing attacks, timing attack, Physical Tampering, physical tampering, malfunction, DFA, Fault Injection

Standards
FIPS 140-2, FIPS 197, PKCS1, AIS 20, RFC 5869, ISO/IEC 14888-3, ISO/IEC 14443, ICAO, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Security Target for JCOP 4 P71/SE050
Subject JCOP 4 P71 Security Target Lite
Keywords ASE, JCOP, Common Criteria, EAL6 augmented
Author NXP B.V.
Creation date D:20240117160928Z
Pages 152
Creator DITA Open Toolkit 3.3.1
Producer Apache FOP Version 2.3

References

Outgoing
  • BSI-DSZ-CC-1136-V4-2024 - active - NXP Secure Smart Card Controller N7121 with IC Dedicated Software and Crypto Library (R1/R2/R3/R4)
Incoming
  • ANSSI-CC-2021/20-R01 - active - ChipDoc v3.1 on JCOP 4 P71 in SSCD configuration (Version 3.1.6.52) (ANSSI-CC-2021/20-R01)
  • ANSSI-CC-2021/19-R01 - active - ChipDoc v3.1 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.1.6.52) (ANSSI-CC-2021/19-R01)
  • NSCIB-CC-2300157-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD)
  • NSCIB-CC-2300154-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing MachineReadable Electronic Documents based on BSI TR-03110 for Official Use with BAC option
  • ANSSI-CC-2020/73-R01 - active - ChipDoc v3 on JCOP 4 P71 in SSCD configuration (Version 3.0.0.52) (ANSSI-CC-2020/73-R01)
  • ANSSI-CC-2020/10-R01 - active - ChipDoc v3 on JCOP 4 P71 in ICAO BAC configuration(Version 3.0.0.52)
  • ANSSI-CC-2021/18-R01 - active - ChipDoc v3.1 on JCOP 4 P71 in ICAO BAC configuration (Version 3.1.6.52) (ANSSI-CC-2021/18-R01)
  • ANSSI-CC-2025/02 - active - ChipDoc v3.2 on JCOP 4 P71 in ICAO EAC(1&2) with PACE configuration (Version 3.2.0.52) (ANSSI-CC-2025/02)
  • NSCIB-CC-2300155-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE
  • ANSSI-CC-2020/72-R01 - active - ChipDoc v3 on JCOP 4 P71 in ICAO EAC with PACE configuration (Version 3.0.0.52) (ANSSI-CC-2020/72-R01)
  • NSCIB-CC-2300156-01-CR - active - NXP eDoc Suite v3.5 on JCOP4 P71 - cryptovision ePasslet Suite – Java Card applet configuration providing Secure Signature Creation Device with Key generation (SSCD)
  • ANSSI-CC-2025/01 - active - ChipDoc v3.2 on JCOP 4 P71 in ICAO BAC configuration (Version 3.2.0.52)(ANSSI-CC-2025/01)
  • NSCIB-CC-2400004-01-CR - active - SafeSign IC PKI applet on JCOP 4 P71 eIDAS QSCD 3.0.1.12, 3.0.1.13 and 3.0.1.14

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

NSCIB-CC-2300172-01-CR

Extracted SARs

ADV_FSP.4, ADV_SPM.1, AGD_OPE.1, ALC_FLR.1, ASE_TSS.2, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1 NSCIB-CC-2300174-01-CR Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Net... JISEC-CC-CRP-C0354 Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotar... JISEC-CC-CRP-C0355 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0356 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, N... JISEC-CC-CRP-C0324 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP... NSCIB-CC-3110-2025-08-2500052-01-CR Compare
Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, n... JISEC-CC-CRP-C0357 Compare
Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, n... JISEC-CC-CRP-C0353 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imag... JISEC-CC-CRP-C0301 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP ... NSCIB-CC-2200029-03-CR Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00... JISEC-CC-CRP-C0346 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/L... JISEC-CC-CRP-C0326 Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lan... JISEC-CC-CRP-C0302 Compare
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP ... JISEC-CC-CRP-C0347 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP... JISEC-CC-CRP-C0286 Compare
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUI... NSCIB-CC-2300100-01-CR Compare
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 NSCIB-CC-0428888-CR2 Compare
NXP JCOP 7.x on SN300 Secure Element, versions JCOP 7.0 R1.62.0.1, JCOP 7.1 R1.04.0.1 and JCOP 7.2 R1.09.0.1 NSCIB-CC-2300065-02-CR Compare
Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 3... JISEC-CC-CRP-C0382 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP... JISEC-CC-CRP-C0285 Compare
Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanie... JISEC-CC-CRP-C0367 Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: Syst... JISEC-CC-CRP-C0323 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551... JISEC-CC-CRP-C0325 Compare
Ricoh imagio MP 9002/9002T/7502/6002/6002GP all of above with Printer/Scanner/Facsimile Functions Version: - Software... JISEC-CC-CRP-C0372 Compare
Showing 5 out of 25.

Scheme data

Cert Id NSCIB-CC-2300172-01-CR
Certification Date 04.04.2024
Status Issued
Product JCOP 4 P71, v4.7 R1.00.4, v4.7 R1.01.4, v4.7 R1.02.4, v4.7 R2.00.11, v4.7 R2.03.11
Developer NXP Semiconductors GmbH
Evaluation Facility SGS Brightsight
Level EAL6+ASE_TSS.2 and ALC_FLR.1
Cert Link https://trustcb.com/download/?wpdmdl=4015
Report Link https://trustcb.com/download/?wpdmdl=4016
Target Link https://trustcb.com/download/?wpdmdl=4017

References

Loading...

Updates Feed

  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-01-Cert.pdf",
  "dgst": "ed2eb00bba5313c3",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300172-01-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL6+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "4.7",
        "1.01.4",
        "1.02.4",
        "2.03.11",
        "2.00.11",
        "1.00.4"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "7f886b64878b68c1"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/18-R01",
          "NSCIB-CC-2400004-01-CR",
          "ANSSI-CC-2025/01",
          "ANSSI-CC-2020/73-R01",
          "ANSSI-CC-2021/19-R01",
          "ANSSI-CC-2020/10-R01",
          "ANSSI-CC-2020/72-R01",
          "ANSSI-CC-2021/20-R01",
          "ANSSI-CC-2025/02"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/18-R01",
          "NSCIB-CC-2400004-01-CR",
          "ANSSI-CC-2025/01",
          "ANSSI-CC-2020/73-R01",
          "ANSSI-CC-2021/19-R01",
          "ANSSI-CC-2020/10-R01",
          "ANSSI-CC-2020/72-R01",
          "ANSSI-CC-2021/20-R01",
          "ANSSI-CC-2025/02"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-2021",
          "BSI-DSZ-CC-1136-V4-2024",
          "BSI-DSZ-CC-1136-V2-2022",
          "BSI-DSZ-CC-1136-V3-2022"
        ]
      }
    },
    "scheme_data": {
      "cert_id": "NSCIB-CC-2300172-01-CR",
      "cert_link": "https://trustcb.com/download/?wpdmdl=4015",
      "certification_date": "2024-04-04",
      "developer": "NXP Semiconductors GmbH",
      "evaluation_facility": "SGS Brightsight",
      "level": "EAL6+ASE_TSS.2 and ALC_FLR.1",
      "product": "JCOP 4 P71, v4.7 R1.00.4, v4.7 R1.01.4, v4.7 R1.02.4, v4.7 R2.00.11, v4.7 R2.03.11",
      "report_link": "https://trustcb.com/download/?wpdmdl=4016",
      "status": "Issued",
      "target_link": "https://trustcb.com/download/?wpdmdl=4017"
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/18-R01",
          "NSCIB-CC-2400004-01-CR",
          "ANSSI-CC-2025/01",
          "NSCIB-CC-2300154-01-CR",
          "NSCIB-CC-2300157-01-CR",
          "ANSSI-CC-2020/73-R01",
          "ANSSI-CC-2021/19-R01",
          "ANSSI-CC-2020/10-R01",
          "ANSSI-CC-2020/72-R01",
          "ANSSI-CC-2021/20-R01",
          "ANSSI-CC-2025/02",
          "NSCIB-CC-2300156-01-CR",
          "NSCIB-CC-2300155-01-CR"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2021/18-R01",
          "NSCIB-CC-2400004-01-CR",
          "ANSSI-CC-2025/01",
          "NSCIB-CC-2300154-01-CR",
          "NSCIB-CC-2300157-01-CR",
          "ANSSI-CC-2020/73-R01",
          "ANSSI-CC-2021/19-R01",
          "ANSSI-CC-2020/10-R01",
          "ANSSI-CC-2020/72-R01",
          "ANSSI-CC-2021/20-R01",
          "ANSSI-CC-2025/02",
          "NSCIB-CC-2300156-01-CR",
          "NSCIB-CC-2300155-01-CR"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1136-V4-2024"
        ]
      }
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11",
  "not_valid_after": "2029-04-04",
  "not_valid_before": "2024-04-04",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "NSCIB-CC-2300172-01-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300172-01": 1,
          "NSCIB-CC-2300172-01": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-2017": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 6
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20240408165553+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20240408165553+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "NSCIB Certificate",
      "pdf_file_size_bytes": 93660,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.tuv-nederland.nl/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "NSCIB-CC-2300172-01 CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300172-01-CR",
        "cert_item": "JCOP 4 P71, versions JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11",
        "cert_lab": " SGS Brightsight B.V.",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA-CRT": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V4-2024": 2
        },
        "NL": {
          "NSCIB-2300172-01": 1,
          "NSCIB-CC-2300172-01-CR": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-2017": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 3
        }
      },
      "cc_sfr": {
        "FCS": {
          "FCS_RNG.1": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "provided by the composite (certified hardware and crypto library). The items in light-grey are out of scope. 2.5 Documentation The following documentation is provided with the product by the developer to the": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 1
        },
        "ECB": {
          "ECB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        },
        "SGS": {
          "SGS": 3,
          "SGS Brightsight": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 80
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "side channel": 1,
          "side-channel": 2
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1,
          "JIL-AM": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS20": 2
        },
        "RFC": {
          "RFC-5869": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 4,
            "CMAC": 2,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 9,
          "NXP Semiconductors": 10
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20240408133522+02\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word LTSC",
      "/ModDate": "D:20240408133522+02\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word LTSC",
      "pdf_file_size_bytes": 312423,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:[email protected]",
          "https://nscib.nl/",
          "https://www.tuv-nederland.nl/common-criteria/certificates.html",
          "https://www.sogis.eu/",
          "https://trustcb.com/common-criteria/nscib/",
          "http://www.commoncriteriaportal.org/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "NSCIB-CC-2300172-01-ST Lite_v4.14.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 5
          }
        },
        "RSA": {
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V4-2024": 1
        },
        "NL": {
          "CC-1136": 1,
          "NSCIB-2300172-01": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 7,
          "A.APPS-PROVIDER": 9,
          "A.DELETION": 1,
          "A.PROCESS-SEC-IC": 8,
          "A.USE_": 1,
          "A.USE_DIAG": 8,
          "A.USE_KEYS": 9,
          "A.VERIFICATION": 6,
          "A.VERIFICATION-AUTHORITY": 9
        },
        "D": {
          "D.API_": 1,
          "D.API_DATA": 2,
          "D.APP_": 2,
          "D.APP_CODE": 5,
          "D.APP_C_": 1,
          "D.APP_C_DATA": 4,
          "D.APP_I_": 2,
          "D.APP_I_DATA": 5,
          "D.APP_KEYS": 10,
          "D.APSD_KEYS": 3,
          "D.ATTACK_": 1,
          "D.ATTACK_COUNTER": 6,
          "D.CARD_MNGT_DATA": 3,
          "D.CONFIG_ITEM": 8,
          "D.CRYPTO": 6,
          "D.ISD_KEYS": 4,
          "D.JCS_": 1,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.MODULE_": 1,
          "D.MODULE_CODE": 5,
          "D.MODULE_DATA": 2,
          "D.PIN": 11,
          "D.SEC_DATA": 6,
          "D.VASD_KEYS": 3
        },
        "O": {
          "O.APPLET": 19,
          "O.CODE_": 1,
          "O.CODE_MODULE": 16,
          "O.CODE_PKG": 17,
          "O.DELETION": 4,
          "O.EXT-MEM": 1,
          "O.EXT_": 4,
          "O.EXT_MEM_": 2,
          "O.EXT_MEM_IN": 2,
          "O.EXT_MEM_INSTANCE": 4,
          "O.INSTALL": 3,
          "O.JAVAOBJECT": 65,
          "O.LOAD": 5,
          "O.NON_": 2,
          "O.NON_SB_": 1,
          "O.NON_SB_SFR": 3,
          "O.PUF": 1,
          "O.REMOTE": 1,
          "O.SB_SFR": 4
        },
        "OE": {
          "OE.APPLET": 11,
          "OE.APPS-PROVIDER": 5,
          "OE.CARD-MANAGEMENT": 3,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 19,
          "OE.KEY-CHANGE": 6,
          "OE.PROCESS_SEC_IC": 5,
          "OE.SCP": 12,
          "OE.SECURITY-DOMAINS": 5,
          "OE.USE_DIAG": 6,
          "OE.USE_KEYS": 6,
          "OE.VERIFICATION": 30,
          "OE.VERIFICATION-": 1,
          "OE.VERIFICATION-AUTHORITY": 4
        },
        "OP": {
          "OP.ARRAY_": 1,
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 3,
          "OP.CREATE": 7,
          "OP.CREATE_EXT_MEM_IN-": 1,
          "OP.CREATE_EXT_MEM_INSTANCE": 2,
          "OP.DELETE_": 2,
          "OP.DELETE_APPLET": 3,
          "OP.DELETE_MODULE": 2,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.INVOKE_MODULE": 4,
          "OP.JAVA": 5,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.READ_EXT_MEM": 3,
          "OP.SB_ACCESS": 4,
          "OP.SB_ACCESS_SFR": 4,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5,
          "OP.WRITE_EXT_MEM": 3
        },
        "OSP": {
          "OSP.KEY-CHANGE": 8,
          "OSP.PROCESS-TOE": 8,
          "OSP.SECURE-BOX": 8,
          "OSP.SECURITY-DOMAINS": 8,
          "OSP.VERIFICATION": 7
        },
        "OT": {
          "OT.ALARM": 23,
          "OT.APPLI-AUTH": 14,
          "OT.ATTACK-COUNTER": 5,
          "OT.CARD-": 2,
          "OT.CARD-CONFIGURATION": 9,
          "OT.CARD-MANAGEMENT": 29,
          "OT.CIPHER": 10,
          "OT.COMM_": 1,
          "OT.COMM_AUTH": 11,
          "OT.COMM_CONFIDENTIALITY": 9,
          "OT.COMM_INTEGRITY": 10,
          "OT.DOMAIN-RIGHTS": 13,
          "OT.EXT-MEM": 19,
          "OT.FIREWALL": 14,
          "OT.GLOBAL_ARRAYS_CONFID": 10,
          "OT.GLOBAL_ARRAYS_INTEG": 8,
          "OT.IDENTIFICATION": 10,
          "OT.KEY-MNGT": 9,
          "OT.NATIVE": 13,
          "OT.OBJ-DELETION": 7,
          "OT.OPERATE": 38,
          "OT.PIN-MNGT": 10,
          "OT.REALLOCATION": 9,
          "OT.RESOURCES": 9,
          "OT.RESTRICTED-MODE": 8,
          "OT.RND": 8,
          "OT.RNG": 7,
          "OT.SCP": 61,
          "OT.SEC_BOX_FW": 10,
          "OT.SENSITIVE_RESULTS_INTEG": 7,
          "OT.SID": 18,
          "OT.SID_MODULE": 17,
          "OT.TRANSACTION": 9
        },
        "R": {
          "R.JAVA": 17
        },
        "SA": {
          "SA.ALARM": 2,
          "SA.CARD-MANAGEMENT": 1,
          "SA.CIPHER": 2,
          "SA.CONFID-APPLI-DATA": 2,
          "SA.CONFID-JCS-CODE": 2,
          "SA.CONFID-JCS-DATA": 2,
          "SA.CONFIGURATION-MODULE": 1,
          "SA.DELETION": 2,
          "SA.EXE-": 1,
          "SA.EXE-APPLI-CODE": 3,
          "SA.EXE-JCS-CODE": 2,
          "SA.EXT-MNGT": 1,
          "SA.FIREWALL": 2,
          "SA.INSTALL": 3,
          "SA.INTEG-APPLI-CODE": 3,
          "SA.INTEG-APPLI-DATA": 3,
          "SA.INTEG-APPLI-DATA-PHYS": 2,
          "SA.INTEG-JCS-CODE": 2,
          "SA.INTEG-JCS-DATA": 2,
          "SA.KEY-MNGT": 2,
          "SA.MODULAR-DESIGN": 4,
          "SA.MODULE-": 1,
          "SA.MODULE-INVOCATION": 1,
          "SA.NATIVE": 4,
          "SA.OBJ-DELETION": 3,
          "SA.OPERATE": 2,
          "SA.PIN-MNGT": 2,
          "SA.RESOURCES": 3,
          "SA.RM": 1,
          "SA.SCP": 5,
          "SA.SID": 3,
          "SA.TRANSACTION": 2,
          "SA.VERIFICATION": 2
        },
        "T": {
          "T.ATTACK-COUNTER": 6,
          "T.COM_EXPLOIT": 7,
          "T.CONFID-APPLI-DATA": 6,
          "T.CONFID-JCS-CODE": 6,
          "T.CONFID-JCS-DATA": 6,
          "T.CONFIG": 7,
          "T.DELETION": 2,
          "T.EXE-CODE": 10,
          "T.EXE-CODE-REMOTE": 1,
          "T.INSTALL": 2,
          "T.INTEG-APPLI-": 2,
          "T.INTEG-APPLI-CODE": 11,
          "T.INTEG-APPLI-DATA": 13,
          "T.INTEG-APPLIDATA": 1,
          "T.INTEG-JCS-CODE": 6,
          "T.INTEG-JCS-DATA": 6,
          "T.LIFE_CYCLE": 7,
          "T.MODULE_EXEC": 7,
          "T.MODULE_REPLACEMENT": 7,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 5,
          "T.OS_OPERATE": 7,
          "T.PHYSICAL": 5,
          "T.RESOURCES": 5,
          "T.RND": 7,
          "T.SEC_BOX_BORDER": 4,
          "T.SID": 12,
          "T.UNAUTHORIZED_CARD_MNGT": 7
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0099-2017": 1,
          "BSI-PP-0055": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_OPE.1": 2
        },
        "ALC": {
          "ALC_FLR.1": 4
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_ECD": 1,
          "ASE_INT": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2,
          "ASE_TSS": 2,
          "ASE_TSS.2": 3
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL6": 9,
          "EAL6 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 22,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS": 6,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 3
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 7,
          "FCO_NRO.2.1": 2,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 2
        },
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 4,
          "FCS_CKM.2": 11,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 9,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 4,
          "FCS_COP.1": 16,
          "FCS_COP.1.1": 25,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 64,
          "FDP_ACC.1.1": 2,
          "FDP_ACC.2": 26,
          "FDP_ACC.2.1": 5,
          "FDP_ACC.2.2": 4,
          "FDP_ACF": 1,
          "FDP_ACF.1": 49,
          "FDP_ACF.1.1": 12,
          "FDP_ACF.1.2": 7,
          "FDP_ACF.1.3": 6,
          "FDP_ACF.1.4": 8,
          "FDP_IFC": 2,
          "FDP_IFC.1": 38,
          "FDP_IFC.1.1": 2,
          "FDP_IFC.2": 19,
          "FDP_IFC.2.1": 2,
          "FDP_IFC.2.2": 2,
          "FDP_IFF": 2,
          "FDP_IFF.1": 36,
          "FDP_IFF.1.1": 6,
          "FDP_IFF.1.2": 5,
          "FDP_IFF.1.3": 5,
          "FDP_IFF.1.4": 5,
          "FDP_IFF.1.5": 5,
          "FDP_ITC": 1,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 18,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_RIP.1": 78,
          "FDP_RIP.1.1": 9,
          "FDP_ROL.1": 18,
          "FDP_ROL.1.1": 2,
          "FDP_ROL.1.2": 3,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 11,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2,
          "FDP_UIT": 1,
          "FDP_UIT.1": 5,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 16,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 17,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 6,
          "FIA_UAU.4.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 52,
          "FIA_UID.1.1": 4,
          "FIA_UID.1.2": 4,
          "FIA_UID.2": 5,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 10,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MSA": 5,
          "FMT_MSA.1": 89,
          "FMT_MSA.1.1": 10,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 2,
          "FMT_MSA.3": 86,
          "FMT_MSA.3.1": 12,
          "FMT_MSA.3.2": 11,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 6,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 88,
          "FMT_SMF.1.1": 9,
          "FMT_SMR": 2,
          "FMT_SMR.1": 80,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 5
        },
        "FPR": {
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 47,
          "FPT_FLS.1.1": 6,
          "FPT_PHP.3": 5,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 6,
          "FPT_RCV.3.1": 2,
          "FPT_RCV.3.2": 2,
          "FPT_RCV.3.3": 2,
          "FPT_RCV.3.4": 1,
          "FPT_TDC.1": 6,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 14,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CCM": {
          "CCM": 44
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX3": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 9
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_": 1,
            "ALG_AES_BLOCK_128_CBC_": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD": 1,
            "ALG_AES_CBC_ISO9797_M1": 1,
            "ALG_AES_CBC_ISO9797_M2": 1,
            "ALG_AES_CMAC16_STANDARD": 1,
            "ALG_AES_CMAC8": 1,
            "ALG_AES_CMAC_128": 1,
            "ALG_AES_CTR": 1,
            "ALG_AES_ECB_": 1,
            "ALG_AES_ECB_ISO9797_M1": 1,
            "ALG_AES_MAC_128_ISO9797_1_M2_ALG3": 1,
            "ALG_AES_MAC_128_NOPAD": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 1,
            "ALG_DES_CBC_NOPAD": 1,
            "ALG_DES_ECB_ISO9797_": 1,
            "ALG_DES_ECB_ISO9797_M2": 1,
            "ALG_DES_ECB_NOPAD": 1,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_M1": 1,
            "ALG_DES_MAC4_ISO9797_M2": 1,
            "ALG_DES_MAC8_": 2,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_M2": 1,
            "ALG_DES_MAC8_NOPAD": 1
          },
          "EC": {
            "ALG_EC_SVDP_": 1,
            "ALG_EC_SVDP_DH": 1,
            "ALG_EC_SVDP_DHC": 1,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 1
          },
          "ECDSA": {
            "ALG_ECDSA_SHA_": 1,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 1,
            "ALG_ECDSA_SHA_512": 1
          },
          "RSA": {
            "ALG_RSA_NOPAD": 1,
            "ALG_RSA_PKCS1_OAEP": 1,
            "ALG_RSA_SHA_224_PKCS1_PSS": 1,
            "ALG_RSA_SHA_256_ISO9796": 1,
            "ALG_RSA_SHA_256_PKCS1": 1,
            "ALG_RSA_SHA_256_PKCS1_PSS": 1,
            "ALG_RSA_SHA_384_PKCS1": 1,
            "ALG_RSA_SHA_384_PKCS1_PSS": 1,
            "ALG_RSA_SHA_512_PKCS1": 1,
            "ALG_RSA_SHA_512_PKCS1_PSS": 1,
            "ALG_RSA_SHA_ISO9796": 1,
            "ALG_RSA_SHA_PKCS1": 1
          },
          "SHA": {
            "ALG_SHA_224": 2,
            "ALG_SHA_256": 2,
            "ALG_SHA_384": 3,
            "ALG_SHA_512": 2
          }
        },
        "misc": {
          "CIPHER_ECDSA": 1,
          "LENGTH_AES_128": 2,
          "LENGTH_AES_192": 3,
          "LENGTH_AES_256": 1,
          "LENGTH_DES3_2KEY": 2,
          "LENGTH_DES3_3KEY": 2,
          "LENGTH_EC_": 3,
          "LENGTH_EC_FP_160": 5,
          "LENGTH_EC_FP_192": 3,
          "LENGTH_EC_FP_224": 4,
          "LENGTH_EC_FP_256": 6,
          "LENGTH_EC_FP_320": 4,
          "LENGTH_EC_FP_384": 3,
          "LENGTH_EC_FP_521": 3,
          "LENGTH_RSA_1024": 1,
          "LENGTH_RSA_2048": 1,
          "LENGTH_RSA_4096": 2,
          "LENGTH_SHA": 1,
          "LENGTH_SHA_224": 1,
          "LENGTH_SHA_256": 1,
          "LENGTH_SHA_384": 1,
          "PAD_PKCS1_OAEP": 1,
          "SIG_CIPHER_ECDSA_PLAIN": 1,
          "SIG_CIPHER_RSA": 1,
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.nxp.id.jcopx.security": 2
        },
        "java": {
          "java.lang": 1
        },
        "javacard": {
          "javacard.framework": 2,
          "javacard.framework.applet": 1,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 1
        }
      },
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 342
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 15,
          "RNG": 27
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "Fault Injection": 2,
          "Physical Tampering": 2,
          "malfunction": 3,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 5,
          "SPA": 2,
          "physical probing": 3,
          "side channel": 2,
          "side-channel": 1,
          "timing attack": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 197": 2
        },
        "ICAO": {
          "ICAO": 5
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 14888-3": 1
        },
        "PKCS": {
          "PKCS1": 1
        },
        "RFC": {
          "RFC 5869": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3,
            "Triple-DES": 1,
            "TripleDES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 6,
            "CMAC": 3,
            "HMAC": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 197,
          "NXP Semiconductors": 27
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20240117160928Z",
      "/Creator": "DITA Open Toolkit 3.3.1",
      "/Keywords": "ASE, JCOP, Common Criteria, EAL6 augmented",
      "/Producer": "Apache FOP Version 2.3",
      "/Subject": "JCOP 4 P71 Security Target Lite",
      "/Title": "Security Target for JCOP 4 P71/SE050",
      "pdf_file_size_bytes": 1648076,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://SF.OM",
          "http://csrc.nist.gov/publications/fips/%20fips197/fips-%20197.pdf",
          "mailto:[email protected]",
          "https://www.docstore.nxp.com",
          "http://dx.doi.org/10.6028/NIST.SP.800-56Ar2",
          "http://SF.MM",
          "http://dx.doi.org/10.6028/NIST.SP.800-73-4",
          "http://www.nxp.com/documents/user_manual/UM10204.pdf."
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 152
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-01%20CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_TSS.2",
      "EAL6+",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-01-ST%20Lite_v4.14.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "04619b2f040815a04485e19185b4da30c0fb406786272b57f6b378a749770835",
      "txt_hash": "071b16a1e0d6e77073cc51ef2a24037a50519ac0c58f30a7b24aecb0a5762701"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "a6915c4ddc93b74fa7e2718349bb747897d84dd8a1cd48d2d785d830ea008f60",
      "txt_hash": "84ab805585db18510a41a72bee54dad989e66677c8a377803a44cc7bb90666d3"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "1a0f071025e5e2ed847a7ee07c63829ede7706292e2401778c715c3882bdeb36",
      "txt_hash": "57862b7e4127cf5a87e5b4923ee21949fcdc625610295f9d4e163e0ec4b4f7ec"
    }
  },
  "status": "active"
}