This page was not yet optimized for use on mobile
devices.
JPKI applet v1.0 on JCOP 8.9
CSV information
| Status | active |
|---|---|
| Valid from | 17.10.2024 |
| Valid until | 17.10.2029 |
| Scheme | 🇳🇱 NL |
| Manufacturer | FeliCa Networks, Inc |
| Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| Security level | EAL4+, ALC_DVS.2, AVA_VAN.5 |
| Protection profiles |
Heuristics summary
Certificate ID: NSCIB-CC-2400083-01-CR
Certificate
certificate file processing did not finish successfully.
Show more...
Download pdf:
OK
Convert pdf to text:
OK
Extract keywords:
ERROR
Extracted keywords
Operating System name
JCOP 8Security level
EAL4, EAL2, EAL7, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_DVS.2, ALC_FLR.3, ALC_FLR, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-, BSI-CC-PP- 0071-2012-MA-01Certificates
NSCIB-CC-2400083-01, NSCIB-2400083-01Evaluation facilities
TÜV InformationstechnikStandards
ISO/IEC 15408-1, ISO/IEC 18045, ISO/IEC 18045:2008Certification report
Extracted keywords
Operating System name
JCOP 8Vendor
NXPSecurity level
EAL4, EAL4+, EAL 4, EAL4 augmented, EAL 4 augmentedSecurity Assurance Requirements (SAR)
ADV_COMP.1, ALC_DVS.2, AVA_VAN.5Protection profiles
BSI-CC-PP-0059-, BSI-CC-PP- 0071-2012-MA-01, BSI-CC-PP-0084-2014Certificates
NSCIB-CC-2400083-01-CR, NSCIB-2400083-01, NSCIB-CC-2300083-CR, NSCIB-CC-2300099-01-CR, NSCIB-CC-2300099-01-MA1, NSCIB-2300099-01Evaluation facilities
TÜV InformationstechnikSide-channel analysis
JIL, JIL-AAPS, JIL-AMFile metadata
| Title | Certification Report |
|---|---|
| Author | Microsoft Office User |
| Creation date | D:20241101104431+00'00' |
| Modification date | D:20241101104431+00'00' |
| Pages | 11 |
| Creator | Microsoft® Word 2021 |
| Producer | Microsoft® Word 2021 |
Frontpage
| Certificate ID | NSCIB-CC-2400083-01-CR |
|---|---|
| Certified item | JPKI applet v1.0 on JCOP 8.9 |
| Certification lab | TÜV Informationstechnik GmbH |
| Developer | FeliCa Networks, Inc |
References
Outgoing- NSCIB-CC-2300099-01-CR - active - NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1
Security target
Extracted keywords
Hash functions
SHA-256Randomness
RND, RNGOperating System name
JCOP 8Vendor
NXPSecurity level
EAL4, EAL4 augmentedClaims
A.CGA, A.SCA, OT.RND, OE.HID_VADSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_LCD.1, ALC_TAT.1, ALC_DVS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1Security Functional Requirements (SFR)
FCS_RNG, FCS_CKM, FCS_CKM.1, FCS_CKM.4, FCS_COP, FCS_COP.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.2, FDP_ACC, FDP_ACC.1, FDP_ACF, FDP_ACF.1, FDP_RIP.1, FDP_RIP.1.1, FDP_SDI, FDP_SDI.2, FDP_DAU, FDP_DAU.2, FDP_ITC, FDP_ITC.1, FDP_AFC, FDP_ITC.2, FDP_IFC.1, FIA_API, FIA_API.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_AFL.1, FIA_AFL.1.1, FIA_AFL.1.2, FIA_API.1.1, FIA_UAU.4, FIA_UAU.4.1, FIA_UAU.5, FIA_UAU.5.1, FIA_UAU.5.2, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_SMF.1, FMT_SMF.1.1, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA, FMT_MSA.1, FMT_MSA.2, FMT_MSA.2.1, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.4, FMT_MSA.4.1, FMT_MTD, FMT_MTD.1, FPT_EMS, FPT_EMS.1, FPT_TST.1, FPT_EMS.1.1, FPT_EMS.1.2, FPT_FLS.1, FPT_FLS.1.1, FPT_TST, FPT_PHP.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTP_ITC, FTP_ITC.1Protection profiles
BSI-PP- 0084, BSI-PP-0084, BSI-CC-PP-0084-, BSI-CC-PP-0099-V2-2020, BSI-CC-PP-0059-2009-MA-02, BSI-CC-PP-0071-2012-MA-01Certificates
NSCIB-CC-2300099-01, NSCIB-CC-2300083-01Side-channel analysis
physical probing, side channel, side channels, physical tampering, DFA, fault injectionStandards
FIPS 186-4, FIPS180-4, FIPS 180-4, PKCS #1, AIS20, AIS 20, CCMB-2017-04-004, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003File metadata
| Creation date | D:20240924130316+09'00' |
|---|---|
| Modification date | D:20240924130428+09'00' |
| Pages | 46 |
| Creator | Acrobat PDFMaker 24 for Word |
| Producer | Adobe PDF Library 24.3.144 |
References
Outgoing- NSCIB-CC-2300099-01-CR - active - NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1
- NSCIB-CC-2300083-01-CR - active - NXP SN300 B5 Series - Secure Element version SN300_SE B5.1.002 JD
Heuristics
Automated inference - use with caution
All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.Certificate ID
NSCIB-CC-2400083-01-CRExtracted SARs
ADV_ARC.1, ADV_COMP.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.5Similar certificates
| Name | Certificate ID | |
|---|---|---|
| NXP JCOP 8.x/9.x on SN300 B2 Secure Element, versions JCOP 8.0 R1.38.0.1, JCOP 8.1 R1.06.0.1, JCOP 9.0 R1.07.0.1, JCO... | NSCIB-CC-2200030-02-CR | Compare |
| NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JC... | NSCIB-CC-3110-2025-08-2500053-01-CR | Compare |
| NXP JCOP 8.x/9.x with eUICC extension on SN300 B2 Secure Element, versions JCOP 8.0 R1.39.0.2, JCOP 8.1 R1.06.0.2, JC... | NSCIB-CC-3110-2025-08-2500053-01-CR | Compare |
References
Loading...
Updates Feed
-
The certificate data changed.
-
The certificate data changed.
-
The certificate was first processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400083-01-Cert.pdf",
"dgst": "03944c4c217e7e05",
"heuristics": {
"_type": "sec_certs.sample.cc_eucc_common.Heuristics",
"annotated_references": null,
"cert_id": "NSCIB-CC-2400083-01-CR",
"cert_lab": [
""
],
"cpe_matches": null,
"direct_transitive_cves": null,
"eal": "EAL4+",
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_COMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"1.0",
"8.9"
]
},
"indirect_transitive_cves": null,
"next_certificates": null,
"prev_certificates": null,
"protection_profiles": {
"_type": "Set",
"elements": [
"1f7ea2e05de5b88b",
"d918b28fd7bb5d79"
]
},
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300099-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300099-01-CR",
"NSCIB-CC-2300083-01-CR"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300099-01-CR",
"NSCIB-CC-2300083-01-CR"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"NSCIB-CC-2300099-01-CR",
"NSCIB-CC-2300083-01-CR"
]
}
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "FeliCa Networks, Inc",
"manufacturer_web": "https://https://www.felicanetworks.co.jp/en/",
"name": "JPKI applet v1.0 on JCOP 8.9",
"not_valid_after": "2029-10-17",
"not_valid_before": "2024-10-17",
"pdf_data": {
"_type": "sec_certs.sample.cc_eucc_common.PdfData",
"cert_filename": "NSCIB-CC-2400083-01-Cert.pdf",
"cert_frontpage": null,
"cert_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2400083-01": 1,
"NSCIB-CC-2400083-01": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0071-2012-MA-01": 1,
"BSI-CC-PP-0059-": 1
}
},
"cc_sar": {
"ALC": {
"ALC_DVS.2": 1,
"ALC_FLR": 1,
"ALC_FLR.3": 1
},
"AVA": {
"AVA_VAN.5": 1
}
},
"cc_security_level": {
"EAL": {
"EAL2": 1,
"EAL4": 1,
"EAL4 augmented": 1,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 1
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 8": 1
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"ISO": {
"ISO/IEC 15408-1": 2,
"ISO/IEC 18045": 4,
"ISO/IEC 18045:2008": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"cert_metadata": null,
"report_filename": "NSCIB-CC-2400083-01-CR.pdf",
"report_frontpage": {
"NL": {
"cert_id": "NSCIB-CC-2400083-01-CR",
"cert_item": "JPKI applet v1.0 on JCOP 8.9",
"cert_lab": " T\u00dcV Informationstechnik GmbH",
"developer": "FeliCa Networks, Inc"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-2300099-01": 1,
"NSCIB-2400083-01": 2,
"NSCIB-CC-2300083-CR": 1,
"NSCIB-CC-2300099-01-CR": 1,
"NSCIB-CC-2300099-01-MA1": 1,
"NSCIB-CC-2400083-01-CR": 11
}
},
"cc_claims": {},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP- 0071-2012-MA-01": 1,
"BSI-CC-PP-0059-": 1,
"BSI-CC-PP-0084-2014": 1
}
},
"cc_sar": {
"ADV": {
"ADV_COMP.1": 1
},
"ALC": {
"ALC_DVS.2": 2
},
"AVA": {
"AVA_VAN.5": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 1,
"EAL 4 augmented": 1,
"EAL4": 2,
"EAL4 augmented": 1,
"EAL4+": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {
"TUV": {
"T\u00dcV Informationstechnik": 2
}
},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 8": 16
}
},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"other": {
"JIL": 2,
"JIL-AAPS": 1,
"JIL-AM": 1
}
},
"standard_id": {},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 7
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Microsoft Office User",
"/CreationDate": "D:20241101104431+00\u002700\u0027",
"/Creator": "Microsoft\u00ae Word 2021",
"/ModDate": "D:20241101104431+00\u002700\u0027",
"/Producer": "Microsoft\u00ae Word 2021",
"/Title": "Certification Report",
"pdf_file_size_bytes": 251266,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.sogis.eu/",
"https://trustcb.com/common-criteria/nscib/",
"mailto:[email protected]",
"https://nscib.nl/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 11
},
"st_filename": "NSCIB-CC-2400083-01-ST_v1.0.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"NL": {
"NSCIB-CC-2300083-01": 1,
"NSCIB-CC-2300099-01": 1
}
},
"cc_claims": {
"A": {
"A.CGA": 3,
"A.SCA": 3
},
"OE": {
"OE.HID_VAD": 3
},
"OT": {
"OT.RND": 6
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0059-2009-MA-02": 1,
"BSI-CC-PP-0071-2012-MA-01": 1,
"BSI-CC-PP-0084-": 1,
"BSI-CC-PP-0099-V2-2020": 1,
"BSI-PP- 0084": 1,
"BSI-PP-0084": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 8,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.5": 8
}
},
"cc_security_level": {
"EAL": {
"EAL4": 5,
"EAL4 augmented": 1
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM": 13,
"FCS_CKM.1": 10,
"FCS_CKM.2": 1,
"FCS_CKM.4": 12,
"FCS_COP": 10,
"FCS_COP.1": 10,
"FCS_RNG": 2,
"FCS_RNG.1": 5,
"FCS_RNG.1.1": 1,
"FCS_RNG.1.2": 1
},
"FDP": {
"FDP_ACC": 29,
"FDP_ACC.1": 18,
"FDP_ACF": 19,
"FDP_ACF.1": 25,
"FDP_AFC": 1,
"FDP_DAU": 6,
"FDP_DAU.2": 2,
"FDP_IFC.1": 6,
"FDP_ITC": 7,
"FDP_ITC.1": 8,
"FDP_ITC.2": 5,
"FDP_RIP.1": 7,
"FDP_RIP.1.1": 1,
"FDP_SDI": 13,
"FDP_SDI.2": 4
},
"FIA": {
"FIA_AFL.1": 5,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_API": 1,
"FIA_API.1": 8,
"FIA_API.1.1": 1,
"FIA_UAU.1": 7,
"FIA_UAU.1.1": 1,
"FIA_UAU.1.2": 1,
"FIA_UAU.4": 5,
"FIA_UAU.4.1": 1,
"FIA_UAU.5": 5,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UID.1": 10,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 6,
"FMT_MOF.1.1": 1,
"FMT_MSA": 26,
"FMT_MSA.1": 6,
"FMT_MSA.2": 7,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 16,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MSA.4": 8,
"FMT_MSA.4.1": 1,
"FMT_MTD": 13,
"FMT_MTD.1": 2,
"FMT_SMF.1": 20,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 19,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_EMS": 1,
"FPT_EMS.1": 6,
"FPT_EMS.1.1": 2,
"FPT_EMS.1.2": 1,
"FPT_FLS.1": 6,
"FPT_FLS.1.1": 1,
"FPT_PHP.1": 5,
"FPT_PHP.1.1": 1,
"FPT_PHP.1.2": 1,
"FPT_PHP.3": 6,
"FPT_PHP.3.1": 1,
"FPT_TST": 2,
"FPT_TST.1": 9,
"FPT_TST.1.1": 1,
"FPT_TST.1.2": 1,
"FPT_TST.1.3": 1
},
"FTP": {
"FTP_ITC": 9,
"FTP_ITC.1": 3
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {
"SHA": {
"SHA2": {
"SHA-256": 2
}
}
},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {
"JCOP": {
"JCOP 8": 7
}
},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 10,
"RNG": 6
}
},
"side_channel_analysis": {
"FI": {
"DFA": 1,
"fault injection": 1,
"physical tampering": 4
},
"SCA": {
"physical probing": 1,
"side channel": 1,
"side channels": 1
}
},
"standard_id": {
"BSI": {
"AIS 20": 1,
"AIS20": 7
},
"CC": {
"CCMB-2017-04-001": 1,
"CCMB-2017-04-002": 1,
"CCMB-2017-04-003": 1,
"CCMB-2017-04-004": 1
},
"FIPS": {
"FIPS 180-4": 1,
"FIPS 186-4": 3,
"FIPS180-4": 1
},
"PKCS": {
"PKCS #1": 5
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 4
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "",
"/Comments": "",
"/Company": "",
"/CreationDate": "D:20240924130316+09\u002700\u0027",
"/Creator": "Acrobat PDFMaker 24 for Word",
"/Keywords": "",
"/ModDate": "D:20240924130428+09\u002700\u0027",
"/Producer": "Adobe PDF Library 24.3.144",
"/SourceModified": "D:20240924040241",
"/Subject": "",
"/Title": "",
"pdf_file_size_bytes": 1008809,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 46
}
},
"protection_profile_links": {
"_type": "Set",
"elements": [
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf",
"https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf"
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400083-01-CR.pdf",
"scheme": "NL",
"security_level": {
"_type": "Set",
"elements": [
"ALC_DVS.2",
"EAL4+",
"AVA_VAN.5"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2400083-01-ST_v1.0.pdf",
"state": {
"_type": "sec_certs.sample.cc_eucc_common.InternalState",
"cert": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": false,
"json_hash": null,
"pdf_hash": "9cbf21901e8fdfa837086b10665a5af088622b4a6bb8af29385230629b1272c8",
"txt_hash": "a987216886f091cffbc884058c4c096668f965adeb9f6b3bb11864ad2089a318"
},
"report": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "9f04b7d2df7d6233812362fb16d5137ab898832b786880bc05cd3ddbdb38aa6a",
"txt_hash": "65c58949237f3dd3739a301f4b647b4bd5b459ac958c12fde838121af82ea719"
},
"st": {
"_type": "sec_certs.sample.document_state.DocumentState",
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"json_hash": null,
"pdf_hash": "aec7a012bd8d2e1a9396d42281d9471afe86b47963203eed42636a9cc2661e81",
"txt_hash": "c70caaad2cb526e9c852dce2ec83f17d969edfefd6fbd2bb45f68147d93775a0"
}
},
"status": "active"
}