NXP JCOP 4 P71 Versions: JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11

CSV information

Status active
Valid from 12.02.2026
Valid until 12.02.2031
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ASE_TSS.2, EAL6+, ALC_FLR.1
Protection profiles

Heuristics summary

Certificate ID: NSCIB-CC-2300172-02-CR

Certificate

certificate file processing did not finish successfully.
Download pdf: OK
Convert pdf to text: OK
Extract keywords: ERROR

Extracted keywords

Operating System name
JCOP 4
Vendor
NXP Semiconductors

Security level
EAL6, EAL2, EAL7, EAL6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR.3, ALC_FLR, ASE_TSS.2
Protection profiles
BSI-CC-PP-0099-2017
Certificates
NSCIB-CC-2300172-02, NSCIB-2300172-02
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Standards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008

Certification report

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC
Randomness
RNG
Block cipher modes
ECB, CBC, CCM

Operating System name
JCOP 4
Vendor
NXP Semiconductors, NXP

Security level
EAL4, EAL6, EAL6+, EAL 6, EAL6 augmented, EAL 6 augmented
Security Assurance Requirements (SAR)
ADV_IMP, ALC_FLR.1, AVA_VAN.5, ASE_TSS.2
Protection profiles
BSI-CC-PP-0099-2017
Certificates
BSI-DSZ-CC-1136-V5-2026, NSCIB-CC-2300172-02-CR, NSCIB-2300172-02
Evaluation facilities
SGS, SGS Brightsight, Brightsight

Side-channel analysis
side channel, side-channel, DFA, JIL-AM, JIL, JIL-AAPS
Certification process
out of scope, provided by the composite (certified hardware and crypto library). The items in light-grey are out of scope. 2.5 Documentation The following documentation is provided with the product by the developer to the

Standards
AIS 20, RFC-5869

File metadata

Title Certification Report
Author Haak
Creation date D:20260214091327+00'00'
Modification date D:20260214091327+00'00'
Pages 15
Creator Microsoft® Word 2021
Producer Microsoft® Word 2021

Frontpage

Certificate ID NSCIB-CC-2300172-02-CR
Certified item JCOP 4 P71, versions JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11
Certification lab SGS Brightsight B.V.
Developer NXP Semiconductors Germany GmbH

Security target

Extracted keywords

Symmetric Algorithms
AES, DES, 3DES, TripleDES, Triple-DES, HMAC, CMAC, CBC-MAC
Asymmetric Algorithms
RSA-CRT, ECDH, ECDSA, ECC, Diffie-Hellman
Hash functions
SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
Schemes
MAC, Key Agreement
Protocols
PACE
Randomness
RND, RNG
Engines
SmartMX3
Block cipher modes
ECB, CBC, CCM

JavaCard API constants
ALG_DES_CBC_ISO9797_M1, ALG_DES_CBC_NOPAD, ALG_DES_ECB_ISO9797_, ALG_DES_ECB_ISO9797_M2, ALG_DES_ECB_NOPAD, ALG_DES_MAC4_ISO9797_1_M1_ALG3, ALG_DES_MAC4_ISO9797_1_M2_ALG3, ALG_DES_MAC4_ISO9797_M1, ALG_DES_MAC4_ISO9797_M2, ALG_DES_MAC8_, ALG_DES_MAC8_ISO9797_1_M2_ALG3, ALG_DES_MAC8_ISO9797_M2, ALG_DES_MAC8_NOPAD, ALG_RSA_NOPAD, ALG_RSA_PKCS1_OAEP, ALG_RSA_SHA_224_PKCS1_PSS, ALG_RSA_SHA_256_PKCS1, ALG_RSA_SHA_256_PKCS1_PSS, ALG_RSA_SHA_384_PKCS1, ALG_RSA_SHA_384_PKCS1_PSS, ALG_RSA_SHA_512_PKCS1, ALG_RSA_SHA_512_PKCS1_PSS, ALG_RSA_SHA_ISO9796, ALG_RSA_SHA_256_ISO9796, ALG_RSA_SHA_PKCS1, ALG_ECDSA_SHA_, ALG_ECDSA_SHA_256, ALG_ECDSA_SHA_384, ALG_ECDSA_SHA_512, ALG_AES_BLOCK_128_CBC_, ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD, ALG_AES_BLOCK_128_, ALG_AES_CBC_ISO9797_M1, ALG_AES_CBC_ISO9797_M2, ALG_AES_ECB_ISO9797_M1, ALG_AES_ECB_, ALG_AES_CTR, ALG_AES_MAC_128_NOPAD, ALG_AES_MAC_128_ISO9797_1_M2_ALG3, ALG_AES_CMAC8, ALG_AES_CMAC16_STANDARD, ALG_AES_CMAC_128, ALG_EC_SVDP_DH, ALG_EC_SVDP_DH_PLAIN, ALG_EC_SVDP_DHC, ALG_EC_SVDP_, ALG_EC_SVDP_DHC_PLAIN, ALG_EC_SVDP_DH_PLAIN_XY, ALG_SHA_256, ALG_SHA_384, ALG_SHA_512, ALG_SHA_224, SIG_CIPHER_RSA, SIG_CIPHER_ECDSA_PLAIN, CIPHER_ECDSA, PAD_PKCS1_OAEP, TYPE_ACCESS, LENGTH_DES3_2KEY, LENGTH_DES3_3KEY, LENGTH_AES_192, LENGTH_AES_256, LENGTH_RSA_4096, LENGTH_EC_FP_160, LENGTH_EC_FP_192, LENGTH_EC_FP_224, LENGTH_EC_FP_256, LENGTH_EC_, LENGTH_EC_FP_384, LENGTH_EC_FP_521, LENGTH_EC_FP_320, LENGTH_AES_128, LENGTH_RSA_2048, LENGTH_SHA, LENGTH_SHA_224, LENGTH_SHA_256, LENGTH_SHA_384, LENGTH_RSA_1024
Operating System name
JCOP 4
Vendor
NXP Semiconductors, NXP

Security level
EAL6, EAL6 augmented
Claims
D.APP_CODE, D.APP_C_DATA, D.APP_I_DATA, D.APP_KEYS, D.APSD_KEYS, D.ISD_KEYS, D.VASD_KEYS, D.CARD_MNGT_DATA, D.PIN, D.API_DATA, D.CRYPTO, D.JCS_CODE, D.JCS_DATA, D.SEC_DATA, D.CONFIG_ITEM, D.MODULE_CODE, D.MODULE_DATA, D.ATTACK_COUNTER, D.APP_I_, D.API_, D.APP_, D.JCS_, D.MODULE_, D.APP_C_, D.ATTACK_, O.EXT-MEM, O.INSTALL, O.LOAD, O.DELETION, O.REMOTE, O.APPLET, O.CODE_PKG, O.JAVAOBJECT, O.EXT_MEM_INSTANCE, O.SB_SFR, O.NON_SB_SFR, O.PUF, O.CODE_MODULE, O.EXT_MEM_IN, O.EXT_MEM_, O.CODE_, O.EXT_, O.NON_, O.NON_SB_, T.OS_OPERATE, T.RND, T.COM_EXPLOIT, T.LIFE_CYCLE, T.UNAUTHORIZED_CARD_MNGT, T.INTEG-APPLI-DATA, T.CONFIG, T.SEC_BOX_BORDER, T.MODULE_EXEC, T.MODULE_REPLACEMENT, T.INSTALL, T.DELETION, T.INTEG-APPLI-, T.ATTACK-COUNTER, T.CONFID-JCS-CODE, T.CONFID-JCS-DATA, T.INTEG-JCS-CODE, T.INTEG-JCS-DATA, T.SID, T.EXE-CODE-REMOTE, T.CONFID-APPLI-DATA, T.INTEG-APPLI-CODE, T.EXE-CODE, T.NATIVE, T.RESOURCES, T.OBJ-DELETION, T.PHYSICAL, T.INTEG-APPLIDATA, A.USE_, A.USE_KEYS, A.PROCESS-SEC-IC, A.USE_DIAG, A.APPS-PROVIDER, A.VERIFICATION-AUTHORITY, A.DELETION, A.APPLET, A.VERIFICATION, R.JAVA, OT.IDENTIFICATION, OT.DOMAIN-RIGHTS, OT.APPLI-AUTH, OT.COMM_AUTH, OT.COMM_INTEGRITY, OT.COMM_CONFIDENTIALITY, OT.CARD-CONFIGURATION, OT.SEC_BOX_FW, OT.SID_MODULE, OT.COMM_, OT.SCP, OT.CARD-MANAGEMENT, OT.CARD-, OT.EXT-MEM, OT.SID, OT.FIREWALL, OT.GLOBAL_ARRAYS_CONFID, OT.GLOBAL_ARRAYS_INTEG, OT.NATIVE, OT.OPERATE, OT.REALLOCATION, OT.RESOURCES, OT.SENSITIVE_RESULTS_INTEG, OT.ALARM, OT.CIPHER, OT.RNG, OT.KEY-MNGT, OT.PIN-MNGT, OT.TRANSACTION, OT.OBJ-DELETION, OT.RND, OT.ATTACK-COUNTER, OT.RESTRICTED-MODE, OP.ARRAY_ACCESS, OP.ARRAY_LENGTH, OP.ARRAY_AASTORE, OP.CREATE, OP.DELETE_APPLET, OP.DELETE_PCKG, OP.DELETE_PCKG_APPLET, OP.INSTANCE_FIELD, OP.INVK_VIRTUAL, OP.INVK_INTERFACE, OP.JAVA, OP.THROW, OP.TYPE_ACCESS, OP.ARRAY_, OP.PUT, OP.CREATE_EXT_MEM_IN-, OP.READ_EXT_MEM, OP.WRITE_EXT_MEM, OP.SB_ACCESS, OP.SB_ACCESS_SFR, OP.INVOKE_MODULE, OP.DELETE_MODULE, OP.PUTFIELD, OP.PUTSTATIC, OP.DELETE_, OP.CREATE_EXT_MEM_INSTANCE, OE.USE_DIAG, OE.USE_KEYS, OE.APPLET, OE.VERIFICATION, OE.CODE-EVIDENCE, OE.SCP, OE.CARD-MANAGEMENT, OE.PROCESS_SEC_IC, OE.APPS-PROVIDER, OE.VERIFICATION-AUTHORITY, OE.KEY-CHANGE, OE.SECURITY-DOMAINS, OE.CODE-, OE.VERIFICATION-, SA.CONFID-APPLI-DATA, SA.CONFID-JCS-CODE, SA.CONFID-JCS-DATA, SA.INTEG-APPLI-CODE, SA.INTEG-APPLI-DATA, SA.INTEG-APPLI-DATA-PHYS, SA.INTEG-JCS-CODE, SA.INTEG-JCS-DATA, SA.EXE-APPLI-CODE, SA.EXE-JCS-CODE, SA.NATIVE, SA.FIREWALL, SA.VERIFICATION, SA.CARD-MANAGEMENT, SA.INSTALL, SA.SID, SA.OBJ-DELETION, SA.DELETION, SA.ALARM, SA.OPERATE, SA.RESOURCES, SA.CIPHER, SA.KEY-MNGT, SA.PIN-MNGT, SA.SCP, SA.TRANSACTION, SA.EXT-MNGT, SA.CONFIGURATION-MODULE, SA.MODULAR-DESIGN, SA.MODULE-INVOCATION, SA.RM, SA.EXE-, SA.MODULE-, OSP.PROCESS-TOE, OSP.KEY-CHANGE, OSP.SECURITY-DOMAINS, OSP.SECURE-BOX, OSP.VERIFICATION
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_FSP.4, AGD_OPE.1, ALC_FLR.1, AVA_VAN.5, ASE_INT, ASE_CCL, ASE_SPD, ASE_ECD, ASE_REQ, ASE_TSS.2, ASE_TSS
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_GEN, FAU_SAS.1.1, FAU_ARP.1, FAU_SAA.1, FAU_ARP.1.1, FCO_NRO, FCO_NRO.2, FCO_NRO.1, FCO_NRO.2.1, FCO_NRO.2.2, FCO_NRO.2.3, FCS_CKM.2, FCS_CKM.3, FCS_CKM.1, FCS_COP.1, FCS_CKM.4, FCS_CKM.1.1, FCS_CKM.4.1, FCS_COP.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2.1, FCS_CKM.3.1, FDP_ACF, FDP_IFC, FDP_IFF, FDP_ITC, FDP_ITC.2, FDP_IFC.2, FDP_IFF.1, FDP_UIT, FDP_UIT.1, FDP_ROL.1, FDP_ACC.1, FDP_ACF.1, FDP_ACC.2, FDP_IFC.1, FDP_ACC.2.1, FDP_ACC.2.2, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_RIP.1, FDP_RIP.1.1, FDP_ITC.1, FDP_ROL.1.2, FDP_ROL.1.1, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_UIT.1.1, FDP_UIT.1.2, FDP_ITC.2.1, FDP_ITC.2.2, FDP_ITC.2.3, FDP_ITC.2.4, FDP_ITC.2.5, FDP_ACC.1.1, FDP_IFC.2.1, FDP_IFC.2.2, FIA_UID, FIA_UID.1, FIA_UAU.1, FIA_UAU.4, FIA_ATD.1, FIA_USB.1, FIA_AFL.1, FIA_ATD.1.1, FIA_UID.2, FIA_UID.2.1, FIA_USB.1.1, FIA_USB.1.2, FIA_USB.1.3, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_MSA, FMT_SMF, FMT_REV, FMT_SMR, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_SMR.1, FMT_MSA.1.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1, FMT_MTD.1.1, FMT_MTD.3, FMT_MTD.3.1, FPR_UNO.1, FPR_UNO.1.1, FPT_FLS.1, FPT_PHP.3, FPT_FLS.1.1, FPT_TDC.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_RCV.3, FPT_RCV.2, FPT_RCV.3.1, FPT_RCV.3.2, FPT_RCV.3.3, FPT_RCV.3.4, FPT_PHP.3.1, FTP_ITC, FTP_ITC.1, FTP_TRP.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-CC-PP-0099-2017, BSI-PP-0084-2014, BSI-PP-0055, BSI-CC-PP-0055
Certificates
BSI-DSZ-CC-1136-V5-2026, NSCIB-2300172-02, CC-1136

Side-channel analysis
physical probing, side channel, side-channel, DPA, SPA, timing attacks, timing attack, Physical Tampering, physical tampering, malfunction, DFA, Fault Injection

Standards
FIPS 140-2, FIPS 197, PKCS1, AIS 20, RFC 5869, ISO/IEC 14888-3, ISO/IEC 14443, ICAO, SCP01, SCP02, SCP03, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title Security Target Lite for JCOP 4 P71/SE050
Subject JCOP 4 P71 Security Target Lite
Keywords ASE, JCOP, Common Criteria, EAL6 augmented
Author NXP B.V.
Creation date D:20260206132917+01'00'
Pages 152
Creator DITA Open Toolkit 3.3.1
Producer Apache FOP Version 2.3

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

NSCIB-CC-2300172-02-CR

Extracted SARs

ADV_FSP.4, ADV_SPM.1, AGD_OPE.1, ALC_FLR.1, ASE_TSS.2, AVA_VAN.5

Similar certificates

Name Certificate ID
NXP JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE0... NSCIB-CC-2300172-01-CR Compare
Ricoh imagio MP C5001A SP/C4001A SP both with imagio FAX Unit Type24 Version: - Software version: System/Copy 2.02, N... JISEC-CC-CRP-C0324 Compare
Ricoh imagio MP C5001 SP / imagio MP C4001 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C5001 SPF / imag... JISEC-CC-CRP-C0301 Compare
NXP JCOP 6.2 on SN220 Secure Element, versions R1.01.1, R1.02.1, R1.02.1-1, R1.02.1-2, R2.01.1, R5.01.1 NSCIB-CC-2300174-01-CR Compare
Ricoh imagio MP C5002A SP/C4002A SP all of above with Facsimile Function Version: - Software: System/Copy 1.05.4, Net... JISEC-CC-CRP-C0354 Compare
Ricoh Aficio MP C4501A/C4501AG/C5501A/C5501AG, Savin C9145A/C9145AG/C9155A/C9155AG, Lanier LD645CA/LD645CAG/LD655CA/L... JISEC-CC-CRP-C0326 Compare
Ricoh Aficio MP C4502A/C5502A, Savin MP C4502A/C5502A, Lanier MP C4502A/C5502A, nashuatec MP C4502A/C5502A, Rex-Rotar... JISEC-CC-CRP-C0355 Compare
Ricoh Aficio MP C4501/C4501G/C5501/C5501G, Savin C9145/C9145G/C9155/C9155G, Lanier LD645C/LD645CG/LD655C/LD655CG, Lan... JISEC-CC-CRP-C0302 Compare
Ricoh imagio MP C3302 SP/C3302 SPF/C2802 SP/C2802 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0352 Compare
Ricoh imagio MP C5002 SP/C5002 SPF/C4002 SP/C4002 SPF all of above with Facsimile Function Version: - Software: Syste... JISEC-CC-CRP-C0356 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, versions JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP... NSCIB-CC-3110-2025-08-2500052-01-CR Compare
Ricoh Aficio MP C3002/C3002G/C3502/C3502G, Savin MP C3002/C3002G/C3502/C3502G, Lanier MP C3002/C3002G/C3502/C3502G, n... JISEC-CC-CRP-C0353 Compare
Ricoh Aficio MP C4502/C4502G/C5502/C5502G, Savin MP C4502/C4502G/C5502/C5502G, Lanier MP C4502/C4502G/C5502/C5502G, n... JISEC-CC-CRP-C0357 Compare
NXP JCOP 7.x with eUICC extension on SN300 B1.1 Secure Element, version JCOP 7.0 R1.64.0.2, JCOP 7.0 R2.04.0.2, JCOP ... NSCIB-CC-2200029-03-CR Compare
Ricoh imagio MP 5002/4002 all of above with Printer/Scanner/Facsimile Functions Version: - Software: System/Copy 1.00... JISEC-CC-CRP-C0346 Compare
NXP JCOP 8.9 with eUICC extension on SN300 Secure Element, version JCOP-eUICC 8.9 R1.06.00.1.2, NXP JCOP 8.9 with eUI... NSCIB-CC-2300100-01-CR Compare
Ricoh imagio MP C2201 SP with imagio FAX Unit Type28, and Ricoh imagio MP C2201 SPF Version: - Software version: Syst... JISEC-CC-CRP-C0323 Compare
Ricoh Aficio MP C2051/C2551, Savin C9120/C9125, Lanier LD620C/LD625C, Lanier MP C2051/C2551, nashuatec MP C2051/C2551... JISEC-CC-CRP-C0325 Compare
Ricoh Aficio MP C3001/C3001G/C3501/C3501G, Savin C9130/C9130G/C9135/C9135G, Lanier LD630C/LD630CG/LD635C/LD635CG, Lan... JISEC-CC-CRP-C0300 Compare
Ricoh Aficio MP C6501 SP/C7501 SP, Savin C9065/C9075, Lanier LD365C/LD375C, Lanier MP C6501 SP/C7501 SP, nashuatec MP... JISEC-CC-CRP-C0321 Compare
Ricoh imagio MP C7501 SP/C6001 SP both with imagio FAX Unit Type23, imagio Security Card Type7, and imagio HDD Encryp... JISEC-CC-CRP-C0320 Compare
Ricoh Aficio MP 4002/4002G/5002/5002G, Savin MP 4002/4002G/5002/5002G, Lanier MP 4002/4002G/5002/5002G, nashuatec MP ... JISEC-CC-CRP-C0347 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 2851, Ricoh Aficio MP... JISEC-CC-CRP-C0286 Compare
NXP JCOP 7.x on SN300 Secure Element, versions JCOP 7.0 R1.62.0.1, JCOP 7.1 R1.04.0.1 and JCOP 7.2 R1.09.0.1 NSCIB-CC-2300065-02-CR Compare
Ricoh Aficio MP 301, Savin MP 301, Lanier MP 301, nashuatec MP 301, Rex-Rotary MP 301, Gestetner MP 301, infotec MP 3... JISEC-CC-CRP-C0382 Compare
Following MFP with FCU, DataOverwriteSecurity Unit and HDD Encryption Unit MFP: Ricoh Aficio MP 4001, Ricoh Aficio MP... JISEC-CC-CRP-C0285 Compare
Ricoh imagio MP C3301 SP / imagio MP C2801 SP, both with imagio FAX Unit Type24, and Ricoh imagio MP C3301 SPF / imag... JISEC-CC-CRP-C0299 Compare
Ricoh Aficio MP C300/C300SR/C400/C400SR, Savin C230/C230SR/C240/C240SR, Lanier LD130C/LD130CSR/LD140C/LD140CSR, Lanie... JISEC-CC-CRP-C0367 Compare
Ricoh imagio MP 9002/9002T/7502/6002/6002GP all of above with Printer/Scanner/Facsimile Functions Version: - Software... JISEC-CC-CRP-C0372 Compare
Ricoh imagio MP 5000SP/4000SP with security card Type 9 Version: - Firmware Configuration System Version V2.16-00 Sys... JISEC-CC-CRP-C0246 Compare
NXP JCOP 7.x on SN300 Secure Element, version JCOP 7.0 R1.62.0.1 and JCOP 7.1 R1.04.0.1 NSCIB-CC-2300065-01-CR Compare
NXP JCOP 6.2 on SN220 Secure Element, R1.01.1, R1.02.1, R1.02.1-1, R2.01.1 NSCIB-CC-0428888-CR2 Compare
Ricoh Aficio MP 6002/7502/9002, Gestetner MP 6002/7502/9002, Lanier MP 6002/7502/9002, nashuatec MP 6002/7502/9002, R... JISEC-CC-CRP-C0373 Compare
Following MFP with FCU, DataOverwriteSecurity Unit, HDD Encryption Unit and Printer/Scanner Unit, MFP: Ricoh Aficio M... JISEC-CC-CRP-C0289 Compare
Ricoh Aficio SP 5200S/5210SF/5210SR, Savin SP 5200S/5210SF/5210SR, Lanier SP 5200S/5210SF/5210SR, nashuatec SP 5200S/... JISEC-CC-CRP-C0366 Compare
Ricoh Aficio MP C305, Savin MP C305, Lanier MP C305, nashuatec MP C305, Rex-Rotary MP C305, Gestetner MP C305, infote... JISEC-CC-CRP-C0381 Compare
Composite system comprised of ECI LightSoft Software Version 11.2 (build 04113) with fixes NSx1120_4113-100 10, NC112... None Compare
ChipDoc v4 on JCOP 4.5 P71 in ICAO EAC(1&2) with PACE configuration (Version 4.0.1.52) (ANSSI-CC-2023/11-R01) ANSSI-CC-2023/11-R01 Compare
Showing 5 out of 38.

References

No references are available for this certificate.

Updates Feed

  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-02-Cert.pdf",
  "dgst": "0256b19dc23be24a",
  "heuristics": {
    "_type": "sec_certs.sample.cc_eucc_common.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-2300172-02-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL6+",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 4
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.02.4",
        "2.00.11",
        "4.7",
        "1.00.4",
        "1.01.4",
        "2.03.11"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "7f886b64878b68c1"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 4 P71 Versions: JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11",
  "not_valid_after": "2031-02-12",
  "not_valid_before": "2026-02-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc_eucc_common.PdfData",
    "cert_filename": "NSCIB-CC-2300172-02-Cert.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-2300172-02": 1,
          "NSCIB-CC-2300172-02": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-2017": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1,
          "ALC_FLR.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL2": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL7": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 1
        },
        "SGS": {
          "SGS": 1,
          "SGS Brightsight": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 6
        }
      },
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408-1": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 18045:2008": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": null,
    "report_filename": "NSCIB-CC-2300172-02-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-2300172-02-CR",
        "cert_item": "JCOP 4 P71, versions JCOP 4 P71 v4.7 R1.00.4, JCOP 4 P71 v4.7 R1.01.4, JCOP 4 P71 v4.7 R1.02.4, JCOP 4 SE050 v4.7 R2.00.11, JCOP 4 SE050 v4.7 R2.03.11",
        "cert_lab": " SGS Brightsight B.V.",
        "developer": "NXP Semiconductors Germany GmbH"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 3
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 2
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 2
          }
        },
        "RSA": {
          "RSA-CRT": 1
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V5-2026": 2
        },
        "NL": {
          "NSCIB-2300172-02": 1,
          "NSCIB-CC-2300172-02-CR": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0099-2017": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_IMP": 1
        },
        "ALC": {
          "ALC_FLR.1": 2
        },
        "ASE": {
          "ASE_TSS.2": 2
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 1,
          "EAL 6 augmented": 1,
          "EAL4": 1,
          "EAL6": 1,
          "EAL6 augmented": 1,
          "EAL6+": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "provided by the composite (certified hardware and crypto library). The items in light-grey are out of scope. 2.5 Documentation The following documentation is provided with the product by the developer to the": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 3
        },
        "CCM": {
          "CCM": 1
        },
        "ECB": {
          "ECB": 3
        }
      },
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        },
        "SGS": {
          "SGS": 3,
          "SGS Brightsight": 3
        }
      },
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 77
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 1
        },
        "SCA": {
          "side channel": 1,
          "side-channel": 3
        },
        "other": {
          "JIL": 2,
          "JIL-AAPS": 1,
          "JIL-AM": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        },
        "RFC": {
          "RFC-5869": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 4
          }
        },
        "DES": {
          "3DES": {
            "3DES": 1
          },
          "DES": {
            "DES": 1
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 4,
            "CMAC": 2,
            "HMAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 8,
          "NXP Semiconductors": 11
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Haak",
      "/CreationDate": "D:20260214091327+00\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2021",
      "/ModDate": "D:20260214091327+00\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2021",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 483611,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.sogis.eu/",
          "https://trustcb.com/common-criteria/nscib/",
          "mailto:[email protected]",
          "https://nscib.nl/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 15
    },
    "st_filename": "NSCIB-CC-2300172-02-ST Lite.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 14
          },
          "ECDH": {
            "ECDH": 2
          },
          "ECDSA": {
            "ECDSA": 1
          }
        },
        "FF": {
          "DH": {
            "Diffie-Hellman": 5
          }
        },
        "RSA": {
          "RSA-CRT": 2
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1136-V5-2026": 1
        },
        "NL": {
          "CC-1136": 1,
          "NSCIB-2300172-02": 2
        }
      },
      "cc_claims": {
        "A": {
          "A.APPLET": 7,
          "A.APPS-PROVIDER": 9,
          "A.DELETION": 1,
          "A.PROCESS-SEC-IC": 8,
          "A.USE_": 1,
          "A.USE_DIAG": 8,
          "A.USE_KEYS": 9,
          "A.VERIFICATION": 6,
          "A.VERIFICATION-AUTHORITY": 9
        },
        "D": {
          "D.API_": 1,
          "D.API_DATA": 2,
          "D.APP_": 2,
          "D.APP_CODE": 5,
          "D.APP_C_": 1,
          "D.APP_C_DATA": 4,
          "D.APP_I_": 2,
          "D.APP_I_DATA": 5,
          "D.APP_KEYS": 10,
          "D.APSD_KEYS": 3,
          "D.ATTACK_": 1,
          "D.ATTACK_COUNTER": 6,
          "D.CARD_MNGT_DATA": 3,
          "D.CONFIG_ITEM": 8,
          "D.CRYPTO": 6,
          "D.ISD_KEYS": 4,
          "D.JCS_": 1,
          "D.JCS_CODE": 3,
          "D.JCS_DATA": 5,
          "D.MODULE_": 1,
          "D.MODULE_CODE": 5,
          "D.MODULE_DATA": 2,
          "D.PIN": 11,
          "D.SEC_DATA": 6,
          "D.VASD_KEYS": 3
        },
        "O": {
          "O.APPLET": 19,
          "O.CODE_": 1,
          "O.CODE_MODULE": 16,
          "O.CODE_PKG": 17,
          "O.DELETION": 4,
          "O.EXT-MEM": 1,
          "O.EXT_": 4,
          "O.EXT_MEM_": 2,
          "O.EXT_MEM_IN": 2,
          "O.EXT_MEM_INSTANCE": 4,
          "O.INSTALL": 3,
          "O.JAVAOBJECT": 65,
          "O.LOAD": 5,
          "O.NON_": 2,
          "O.NON_SB_": 1,
          "O.NON_SB_SFR": 3,
          "O.PUF": 1,
          "O.REMOTE": 1,
          "O.SB_SFR": 4
        },
        "OE": {
          "OE.APPLET": 11,
          "OE.APPS-PROVIDER": 5,
          "OE.CARD-MANAGEMENT": 3,
          "OE.CODE-": 1,
          "OE.CODE-EVIDENCE": 19,
          "OE.KEY-CHANGE": 6,
          "OE.PROCESS_SEC_IC": 5,
          "OE.SCP": 12,
          "OE.SECURITY-DOMAINS": 5,
          "OE.USE_DIAG": 6,
          "OE.USE_KEYS": 6,
          "OE.VERIFICATION": 30,
          "OE.VERIFICATION-": 1,
          "OE.VERIFICATION-AUTHORITY": 4
        },
        "OP": {
          "OP.ARRAY_": 1,
          "OP.ARRAY_AASTORE": 3,
          "OP.ARRAY_ACCESS": 4,
          "OP.ARRAY_LENGTH": 3,
          "OP.CREATE": 7,
          "OP.CREATE_EXT_MEM_IN-": 1,
          "OP.CREATE_EXT_MEM_INSTANCE": 2,
          "OP.DELETE_": 2,
          "OP.DELETE_APPLET": 3,
          "OP.DELETE_MODULE": 2,
          "OP.DELETE_PCKG": 3,
          "OP.DELETE_PCKG_APPLET": 3,
          "OP.INSTANCE_FIELD": 3,
          "OP.INVK_INTERFACE": 7,
          "OP.INVK_VIRTUAL": 6,
          "OP.INVOKE_MODULE": 4,
          "OP.JAVA": 5,
          "OP.PUT": 6,
          "OP.PUTFIELD": 1,
          "OP.PUTSTATIC": 1,
          "OP.READ_EXT_MEM": 3,
          "OP.SB_ACCESS": 4,
          "OP.SB_ACCESS_SFR": 4,
          "OP.THROW": 5,
          "OP.TYPE_ACCESS": 5,
          "OP.WRITE_EXT_MEM": 3
        },
        "OSP": {
          "OSP.KEY-CHANGE": 8,
          "OSP.PROCESS-TOE": 8,
          "OSP.SECURE-BOX": 8,
          "OSP.SECURITY-DOMAINS": 8,
          "OSP.VERIFICATION": 7
        },
        "OT": {
          "OT.ALARM": 23,
          "OT.APPLI-AUTH": 14,
          "OT.ATTACK-COUNTER": 5,
          "OT.CARD-": 2,
          "OT.CARD-CONFIGURATION": 9,
          "OT.CARD-MANAGEMENT": 29,
          "OT.CIPHER": 10,
          "OT.COMM_": 1,
          "OT.COMM_AUTH": 11,
          "OT.COMM_CONFIDENTIALITY": 9,
          "OT.COMM_INTEGRITY": 10,
          "OT.DOMAIN-RIGHTS": 13,
          "OT.EXT-MEM": 19,
          "OT.FIREWALL": 14,
          "OT.GLOBAL_ARRAYS_CONFID": 10,
          "OT.GLOBAL_ARRAYS_INTEG": 8,
          "OT.IDENTIFICATION": 10,
          "OT.KEY-MNGT": 9,
          "OT.NATIVE": 13,
          "OT.OBJ-DELETION": 7,
          "OT.OPERATE": 38,
          "OT.PIN-MNGT": 10,
          "OT.REALLOCATION": 9,
          "OT.RESOURCES": 9,
          "OT.RESTRICTED-MODE": 8,
          "OT.RND": 8,
          "OT.RNG": 7,
          "OT.SCP": 61,
          "OT.SEC_BOX_FW": 10,
          "OT.SENSITIVE_RESULTS_INTEG": 7,
          "OT.SID": 18,
          "OT.SID_MODULE": 17,
          "OT.TRANSACTION": 9
        },
        "R": {
          "R.JAVA": 17
        },
        "SA": {
          "SA.ALARM": 2,
          "SA.CARD-MANAGEMENT": 1,
          "SA.CIPHER": 2,
          "SA.CONFID-APPLI-DATA": 2,
          "SA.CONFID-JCS-CODE": 2,
          "SA.CONFID-JCS-DATA": 2,
          "SA.CONFIGURATION-MODULE": 1,
          "SA.DELETION": 2,
          "SA.EXE-": 1,
          "SA.EXE-APPLI-CODE": 3,
          "SA.EXE-JCS-CODE": 2,
          "SA.EXT-MNGT": 1,
          "SA.FIREWALL": 2,
          "SA.INSTALL": 3,
          "SA.INTEG-APPLI-CODE": 3,
          "SA.INTEG-APPLI-DATA": 3,
          "SA.INTEG-APPLI-DATA-PHYS": 2,
          "SA.INTEG-JCS-CODE": 2,
          "SA.INTEG-JCS-DATA": 2,
          "SA.KEY-MNGT": 2,
          "SA.MODULAR-DESIGN": 4,
          "SA.MODULE-": 1,
          "SA.MODULE-INVOCATION": 1,
          "SA.NATIVE": 4,
          "SA.OBJ-DELETION": 3,
          "SA.OPERATE": 2,
          "SA.PIN-MNGT": 2,
          "SA.RESOURCES": 3,
          "SA.RM": 1,
          "SA.SCP": 5,
          "SA.SID": 3,
          "SA.TRANSACTION": 2,
          "SA.VERIFICATION": 2
        },
        "T": {
          "T.ATTACK-COUNTER": 6,
          "T.COM_EXPLOIT": 7,
          "T.CONFID-APPLI-DATA": 6,
          "T.CONFID-JCS-CODE": 6,
          "T.CONFID-JCS-DATA": 6,
          "T.CONFIG": 7,
          "T.DELETION": 2,
          "T.EXE-CODE": 10,
          "T.EXE-CODE-REMOTE": 1,
          "T.INSTALL": 2,
          "T.INTEG-APPLI-": 2,
          "T.INTEG-APPLI-CODE": 11,
          "T.INTEG-APPLI-DATA": 13,
          "T.INTEG-APPLIDATA": 1,
          "T.INTEG-JCS-CODE": 6,
          "T.INTEG-JCS-DATA": 6,
          "T.LIFE_CYCLE": 7,
          "T.MODULE_EXEC": 7,
          "T.MODULE_REPLACEMENT": 7,
          "T.NATIVE": 6,
          "T.OBJ-DELETION": 5,
          "T.OS_OPERATE": 7,
          "T.PHYSICAL": 5,
          "T.RESOURCES": 5,
          "T.RND": 7,
          "T.SEC_BOX_BORDER": 4,
          "T.SID": 12,
          "T.UNAUTHORIZED_CARD_MNGT": 7
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0055": 1,
          "BSI-CC-PP-0099-2017": 1,
          "BSI-PP-0055": 1,
          "BSI-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_FSP.4": 1,
          "ADV_SPM.1": 3
        },
        "AGD": {
          "AGD_OPE.1": 2
        },
        "ALC": {
          "ALC_FLR.1": 4
        },
        "ASE": {
          "ASE_CCL": 2,
          "ASE_ECD": 1,
          "ASE_INT": 2,
          "ASE_REQ": 2,
          "ASE_SPD": 2,
          "ASE_TSS": 2,
          "ASE_TSS.2": 3
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL6": 9,
          "EAL6 augmented": 3
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_ARP.1": 22,
          "FAU_ARP.1.1": 1,
          "FAU_GEN": 1,
          "FAU_SAA.1": 3,
          "FAU_SAS": 6,
          "FAU_SAS.1": 8,
          "FAU_SAS.1.1": 3
        },
        "FCO": {
          "FCO_NRO": 1,
          "FCO_NRO.1": 1,
          "FCO_NRO.2": 7,
          "FCO_NRO.2.1": 2,
          "FCO_NRO.2.2": 1,
          "FCO_NRO.2.3": 2
        },
        "FCS": {
          "FCS_CKM.1": 18,
          "FCS_CKM.1.1": 4,
          "FCS_CKM.2": 11,
          "FCS_CKM.2.1": 1,
          "FCS_CKM.3": 9,
          "FCS_CKM.3.1": 1,
          "FCS_CKM.4": 16,
          "FCS_CKM.4.1": 4,
          "FCS_COP.1": 16,
          "FCS_COP.1.1": 25,
          "FCS_RNG.1": 10,
          "FCS_RNG.1.1": 2,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 64,
          "FDP_ACC.1.1": 2,
          "FDP_ACC.2": 26,
          "FDP_ACC.2.1": 5,
          "FDP_ACC.2.2": 4,
          "FDP_ACF": 1,
          "FDP_ACF.1": 49,
          "FDP_ACF.1.1": 12,
          "FDP_ACF.1.2": 7,
          "FDP_ACF.1.3": 6,
          "FDP_ACF.1.4": 8,
          "FDP_IFC": 2,
          "FDP_IFC.1": 38,
          "FDP_IFC.1.1": 2,
          "FDP_IFC.2": 19,
          "FDP_IFC.2.1": 2,
          "FDP_IFC.2.2": 2,
          "FDP_IFF": 2,
          "FDP_IFF.1": 36,
          "FDP_IFF.1.1": 6,
          "FDP_IFF.1.2": 5,
          "FDP_IFF.1.3": 5,
          "FDP_IFF.1.4": 5,
          "FDP_IFF.1.5": 5,
          "FDP_ITC": 1,
          "FDP_ITC.1": 8,
          "FDP_ITC.2": 18,
          "FDP_ITC.2.1": 1,
          "FDP_ITC.2.2": 1,
          "FDP_ITC.2.3": 1,
          "FDP_ITC.2.4": 1,
          "FDP_ITC.2.5": 1,
          "FDP_RIP.1": 78,
          "FDP_RIP.1.1": 9,
          "FDP_ROL.1": 18,
          "FDP_ROL.1.1": 2,
          "FDP_ROL.1.2": 3,
          "FDP_SDI.1": 2,
          "FDP_SDI.2": 11,
          "FDP_SDI.2.1": 2,
          "FDP_SDI.2.2": 2,
          "FDP_UIT": 1,
          "FDP_UIT.1": 5,
          "FDP_UIT.1.1": 1,
          "FDP_UIT.1.2": 1
        },
        "FIA": {
          "FIA_AFL.1": 9,
          "FIA_AFL.1.1": 1,
          "FIA_AFL.1.2": 1,
          "FIA_ATD.1": 16,
          "FIA_ATD.1.1": 2,
          "FIA_UAU.1": 17,
          "FIA_UAU.1.1": 2,
          "FIA_UAU.1.2": 2,
          "FIA_UAU.4": 6,
          "FIA_UAU.4.1": 1,
          "FIA_UID": 1,
          "FIA_UID.1": 52,
          "FIA_UID.1.1": 4,
          "FIA_UID.1.2": 4,
          "FIA_UID.2": 5,
          "FIA_UID.2.1": 1,
          "FIA_USB.1": 10,
          "FIA_USB.1.1": 2,
          "FIA_USB.1.2": 2,
          "FIA_USB.1.3": 2
        },
        "FMT": {
          "FMT_MSA": 5,
          "FMT_MSA.1": 89,
          "FMT_MSA.1.1": 10,
          "FMT_MSA.2": 4,
          "FMT_MSA.2.1": 2,
          "FMT_MSA.3": 86,
          "FMT_MSA.3.1": 12,
          "FMT_MSA.3.2": 11,
          "FMT_MTD.1": 8,
          "FMT_MTD.1.1": 1,
          "FMT_MTD.3": 6,
          "FMT_MTD.3.1": 1,
          "FMT_REV": 1,
          "FMT_SMF": 2,
          "FMT_SMF.1": 88,
          "FMT_SMF.1.1": 9,
          "FMT_SMR": 2,
          "FMT_SMR.1": 80,
          "FMT_SMR.1.1": 6,
          "FMT_SMR.1.2": 5
        },
        "FPR": {
          "FPR_UNO.1": 10,
          "FPR_UNO.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 47,
          "FPT_FLS.1.1": 6,
          "FPT_PHP.3": 5,
          "FPT_PHP.3.1": 1,
          "FPT_RCV.2": 1,
          "FPT_RCV.3": 6,
          "FPT_RCV.3.1": 2,
          "FPT_RCV.3.2": 2,
          "FPT_RCV.3.3": 2,
          "FPT_RCV.3.4": 1,
          "FPT_TDC.1": 6,
          "FPT_TDC.1.1": 1,
          "FPT_TDC.1.2": 1
        },
        "FTP": {
          "FTP_ITC": 1,
          "FTP_ITC.1": 14,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1,
          "FTP_TRP.1": 3
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 5
        },
        "CCM": {
          "CCM": 44
        },
        "ECB": {
          "ECB": 2
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX3": 1
        }
      },
      "crypto_library": {},
      "crypto_protocol": {
        "PACE": {
          "PACE": 2
        }
      },
      "crypto_scheme": {
        "KA": {
          "Key Agreement": 1
        },
        "MAC": {
          "MAC": 9
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {
        "SHA": {
          "SHA1": {
            "SHA-1": 1
          },
          "SHA2": {
            "SHA-224": 1,
            "SHA-256": 1,
            "SHA-384": 1,
            "SHA-512": 1
          }
        }
      },
      "ic_data_group": {},
      "javacard_api_const": {
        "ALG": {
          "AES": {
            "ALG_AES_BLOCK_128_": 1,
            "ALG_AES_BLOCK_128_CBC_": 1,
            "ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD": 1,
            "ALG_AES_CBC_ISO9797_M1": 1,
            "ALG_AES_CBC_ISO9797_M2": 1,
            "ALG_AES_CMAC16_STANDARD": 1,
            "ALG_AES_CMAC8": 1,
            "ALG_AES_CMAC_128": 1,
            "ALG_AES_CTR": 1,
            "ALG_AES_ECB_": 1,
            "ALG_AES_ECB_ISO9797_M1": 1,
            "ALG_AES_MAC_128_ISO9797_1_M2_ALG3": 1,
            "ALG_AES_MAC_128_NOPAD": 1
          },
          "DES": {
            "ALG_DES_CBC_ISO9797_M1": 1,
            "ALG_DES_CBC_NOPAD": 1,
            "ALG_DES_ECB_ISO9797_": 1,
            "ALG_DES_ECB_ISO9797_M2": 1,
            "ALG_DES_ECB_NOPAD": 1,
            "ALG_DES_MAC4_ISO9797_1_M1_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC4_ISO9797_M1": 1,
            "ALG_DES_MAC4_ISO9797_M2": 1,
            "ALG_DES_MAC8_": 2,
            "ALG_DES_MAC8_ISO9797_1_M2_ALG3": 1,
            "ALG_DES_MAC8_ISO9797_M2": 1,
            "ALG_DES_MAC8_NOPAD": 1
          },
          "EC": {
            "ALG_EC_SVDP_": 1,
            "ALG_EC_SVDP_DH": 1,
            "ALG_EC_SVDP_DHC": 1,
            "ALG_EC_SVDP_DHC_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN": 1,
            "ALG_EC_SVDP_DH_PLAIN_XY": 1
          },
          "ECDSA": {
            "ALG_ECDSA_SHA_": 1,
            "ALG_ECDSA_SHA_256": 2,
            "ALG_ECDSA_SHA_384": 1,
            "ALG_ECDSA_SHA_512": 1
          },
          "RSA": {
            "ALG_RSA_NOPAD": 1,
            "ALG_RSA_PKCS1_OAEP": 1,
            "ALG_RSA_SHA_224_PKCS1_PSS": 1,
            "ALG_RSA_SHA_256_ISO9796": 1,
            "ALG_RSA_SHA_256_PKCS1": 1,
            "ALG_RSA_SHA_256_PKCS1_PSS": 1,
            "ALG_RSA_SHA_384_PKCS1": 1,
            "ALG_RSA_SHA_384_PKCS1_PSS": 1,
            "ALG_RSA_SHA_512_PKCS1": 1,
            "ALG_RSA_SHA_512_PKCS1_PSS": 1,
            "ALG_RSA_SHA_ISO9796": 1,
            "ALG_RSA_SHA_PKCS1": 1
          },
          "SHA": {
            "ALG_SHA_224": 2,
            "ALG_SHA_256": 2,
            "ALG_SHA_384": 3,
            "ALG_SHA_512": 2
          }
        },
        "misc": {
          "CIPHER_ECDSA": 1,
          "LENGTH_AES_128": 2,
          "LENGTH_AES_192": 3,
          "LENGTH_AES_256": 1,
          "LENGTH_DES3_2KEY": 2,
          "LENGTH_DES3_3KEY": 2,
          "LENGTH_EC_": 3,
          "LENGTH_EC_FP_160": 5,
          "LENGTH_EC_FP_192": 3,
          "LENGTH_EC_FP_224": 4,
          "LENGTH_EC_FP_256": 6,
          "LENGTH_EC_FP_320": 4,
          "LENGTH_EC_FP_384": 3,
          "LENGTH_EC_FP_521": 3,
          "LENGTH_RSA_1024": 1,
          "LENGTH_RSA_2048": 1,
          "LENGTH_RSA_4096": 2,
          "LENGTH_SHA": 1,
          "LENGTH_SHA_224": 1,
          "LENGTH_SHA_256": 1,
          "LENGTH_SHA_384": 1,
          "PAD_PKCS1_OAEP": 1,
          "SIG_CIPHER_ECDSA_PLAIN": 1,
          "SIG_CIPHER_RSA": 1,
          "TYPE_ACCESS": 5
        }
      },
      "javacard_packages": {
        "com": {
          "com.nxp.id.jcopx.security": 2
        },
        "java": {
          "java.lang": 1
        },
        "javacard": {
          "javacard.framework": 2,
          "javacard.framework.applet": 1,
          "javacard.security": 3
        },
        "javacardx": {
          "javacardx.crypto": 1
        }
      },
      "javacard_version": {},
      "os_name": {
        "JCOP": {
          "JCOP 4": 342
        }
      },
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 15,
          "RNG": 27
        }
      },
      "side_channel_analysis": {
        "FI": {
          "DFA": 3,
          "Fault Injection": 2,
          "Physical Tampering": 2,
          "malfunction": 3,
          "physical tampering": 2
        },
        "SCA": {
          "DPA": 5,
          "SPA": 2,
          "physical probing": 3,
          "side channel": 2,
          "side-channel": 1,
          "timing attack": 1,
          "timing attacks": 1
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1
        },
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1,
          "CCMB-2017-04-004": 1
        },
        "FIPS": {
          "FIPS 140-2": 1,
          "FIPS 197": 2
        },
        "ICAO": {
          "ICAO": 5
        },
        "ISO": {
          "ISO/IEC 14443": 2,
          "ISO/IEC 14888-3": 1
        },
        "PKCS": {
          "PKCS1": 1
        },
        "RFC": {
          "RFC 5869": 1
        },
        "SCP": {
          "SCP01": 1,
          "SCP02": 1,
          "SCP03": 1
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 21
          }
        },
        "DES": {
          "3DES": {
            "3DES": 3,
            "Triple-DES": 1,
            "TripleDES": 1
          },
          "DES": {
            "DES": 4
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 6,
            "CMAC": 3,
            "HMAC": 7
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 197,
          "NXP Semiconductors": 27
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20260206132917+01\u002700\u0027",
      "/Creator": "DITA Open Toolkit 3.3.1",
      "/Keywords": "ASE, JCOP, Common Criteria, EAL6 augmented",
      "/Producer": "Apache FOP Version 2.3",
      "/Subject": "JCOP 4 P71 Security Target Lite",
      "/Title": "Security Target Lite for JCOP 4 P71/SE050",
      "pdf_file_size_bytes": 1650389,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://SF.OM",
          "http://csrc.nist.gov/publications/fips/%20fips197/fips-%20197.pdf",
          "https://www.docstore.nxp.com",
          "http://www.nxp.com/documents/user_manual/UM10204.pdf.",
          "http://dx.doi.org/10.6028/NIST.SP.800-56Ar2",
          "http://SF.MM",
          "mailto:[email protected]",
          "http://dx.doi.org/10.6028/NIST.SP.800-73-4"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 152
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-02-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ALC_FLR.1",
      "EAL6+",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300172-02-ST%20Lite.pdf",
  "state": {
    "_type": "sec_certs.sample.cc_eucc_common.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": false,
      "json_hash": null,
      "pdf_hash": "9b4486860fb66f4f55ab5e63a121ad90c65f5f5631d3ec7b31f2c36304ebb2a7",
      "txt_hash": "ddbcd2517f4e73351df416533d7e1cb05d7a93696f79740ce3217b130938c662"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "2211e52979b93e47c2fd94bd3342388fe5aeb5f8595bed8b2c48231b26840cd5",
      "txt_hash": "002f09a97f6dd44c2b197e4a4d6e168a9200c3def05ef62cc88500cd41bcdec4"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "json_hash": null,
      "pdf_hash": "5654233e8967b7330f030b3d02052f0e0fcfdbebe63639071462cb00df699527",
      "txt_hash": "fa7d5e4553377d468c8e22569ca9d7cc23c1557ed68da124e6da6dba998390fb"
    }
  },
  "status": "active"
}