NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 04.04.2014 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL6+, ALC_FLR.1 |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDESRandomness
RNGEngines
SmartMX2Vendor
NXP, NXP SemiconductorsSecurity level
EAL 6, EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 6 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0810-V2-2014, BSI-DSZ-CC-0810-2012, BSI-DSZ-CC-0810Side-channel analysis
physical probing, side channel, timing attacks, physical tampering, reverse engineering, JILCertification process
Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, 9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1, 11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the, platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL, smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual, Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev, 3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors, 3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0, May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP, Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List, composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the, List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online documentStandards
AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS 35, AIS36, AIS 32, AIS 38, ISO/IEC 7816, ISO/IEC 14443Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
Title | Certification Report BSI-DSZ-CC-0810-V2-2014 |
---|---|
Subject | IT Security |
Keywords | "Common Criteria, Certification, Zertifizierung, BSI, P60D024/016/012PVB/PVB(Y), Secure Smart Card Controller, EAL6, NXP" |
Author | Bundesamt für Sicherheit in der Informationstechnik |
Creation date | D:20140415164656+02'00' |
Modification date | D:20140415165055+02'00' |
Pages | 42 |
Creator | Writer |
Producer | LibreOffice 3.6 |
Frontpage
Certificate ID | BSI-DSZ-CC-0810-V2-2014 |
---|---|
Certified item | NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software |
Certification lab | BSI |
Developer | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0810-2012 - archived - NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA, TDESAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMX2, SmartMXVendor
NXP, NXP Semiconductors, PhilipsSecurity level
EAL6, EAL4, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL4 augmentedClaims
O.RND, O.INTEGRITY_CHK, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ITT.1.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_FLS.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FTP_ITT.1Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0810Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Security Target Lite |
---|---|
Subject | P60D024PVB |
Keywords | CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA |
Author | NXP Semiconductors |
Creation date | D:20131107104533+01'00' |
Modification date | D:20131107104604+01'00' |
Pages | 80 |
Creator | Acrobat PDFMaker 9.1 for Word |
Producer | Adobe PDF Library 10.0 |
Heuristics ?
Extracted SARs
ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ALC_CMC.5, ATE_IND.2, ADV_ARC.1, ADV_IMP.2, ATE_FUN.2, ASE_SPD.1, ASE_REQ.2, ASE_TSS.2, APE_INT.1, AGD_OPE.1, ATE_COV.3, APE_CCL.1, ALC_TAT.3, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_INT.3, ADV_SPM.1, ASE_INT.1, ADV_TDS.5, APE_OBJ.2, APE_SPD.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ALC_FLR.1, ASE_OBJ.2Similar certificates
References ?
Updates ?
-
17.10.2024 The certificate data changed.
Certificate changed
The Protection Profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}
.
- The new value is
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b10e1b13b1574906aa3ab8a601c451dc46d9990aa36f03d6e7ed47d8dc42613b', 'txt_hash': '46ed9220b989cac2201135b47a4ece78f9c420224830e3543c87c62ea52326d2'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '558cd6262fe13bd5b8b1d9207bb28ba72fbd3259b33223b42499b646527dabe1', 'txt_hash': 'c4ce1043468e5bba6a6fe9a8ff598e8ecafc52e7a4588cd0a7827b2e5bba7199'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1121979, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20140415164656+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, BSI, P60D024/016/012PVB/PVB(Y), Secure Smart Card Controller, EAL6, NXP"', '/ModDate': "D:20140415165055+02'00'", '/Producer': 'LibreOffice 3.6', '/Subject': 'IT Security', '/Title': 'Certification Report BSI-DSZ-CC-0810-V2-2014', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierung', 'http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 652575, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 80, '/Alternative descriptive title': 'Security Target Lite', '/Author': 'NXP Semiconductors', '/CertificationID': 'BSI-DSZ-CC-0810', '/Company': 'NXP Semiconductors GmbH Germany', '/Copyright date': '2012', '/CreationDate': "D:20131107104533+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/Descriptive title': 'Security Target Lite', '/Division': 'NXP Semiconductors', '/Document identifier': ' ', '/Keywords': 'CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA', '/ModDate': "D:20131107104604+01'00'", '/Modification date': '04 November 2013', '/Producer': 'Adobe PDF Library 10.0', '/Product name title': '<not applicable>', '/Revision': 'Rev. 2.2', '/Security status': '<Security status>', '/SourceModified': 'D:20131107093632', '/Specification status': 'Evaluation documentation Public', '/Subject': 'P60D024PVB', '/Template date': '29 January 2010', '/Template version': '2.9.0', '/Title': 'Security Target Lite', '/docpath': 'W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D024\\ASE', '/list_of_authors': 'Thomas Rottschaefer', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1', '/relBiblioPath': '..\\Bibliography.doc', '/test_sec_row_naming': 'manufacturer area', '/text_cert_body_long': 'Bundesamt fuer Sicherheit in der Informationstechnik', '/text_cert_body_short': 'BSI', '/text_developer_long': 'NXP Semiconductors, Business Unit Identification', '/text_developer_short': 'NXP', '/text_product_cfgC080': 'P60C080PVA', '/text_product_cfgC144': 'P60C144PVA', '/text_product_cfgD012': 'P60D012PVB', '/text_product_cfgD016': 'P60D016PVB', '/text_product_cfgD024': 'P60D024PVB', '/text_product_cfgD024_nameplate': '9047A', '/text_product_cfgD080': 'P60D080PVA', '/text_product_cfgD144': 'P60D144PVA', '/text_product_cfgD144_nameplate': '9050B', '/text_product_letter': 'B', '/text_product_long': 'NXP Secure Smart Card Controller P60D024/016/012P', '/text_product_minor': 'VB', '/text_product_short': 'P60D024/016/012PVB', '/text_sponsor_long': 'NXP Semiconductors, Business Unit Identification', '/text_sponsor_short': 'NXP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'http://www.nxp.com/']}}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0810-V2-2014', 'cert_item': 'NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0810-V2-2014': 22, 'BSI-DSZ-CC-0810-2012': 3, 'BSI-DSZ-CC-0810': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 4, 'EAL 4': 2, 'EAL 5': 3, 'EAL1': 7, 'EAL4': 7, 'EAL5': 7, 'EAL5+': 1, 'EAL6': 4, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL 6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 5}, 'R': {'R.O': 5}}, 'vendor': {'NXP': {'NXP': 24, 'NXP Semiconductors': 31}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 3}, '3DES': {'Triple-DES': 3, 'TDES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 13}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 1}, 'other': {'reverse engineering': 1, 'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 1, 'AIS 31': 2, 'AIS 36': 2, 'AIS 35': 2, 'AIS36': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 7816': 4, 'ISO/IEC 14443': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8': 1, '9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1': 1, '11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the': 1, 'platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL': 1, 'smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors': 1, 'Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual': 1, 'Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev': 1, '3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors': 1, '3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0': 1, 'May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP': 1, 'Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List': 1, 'composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the': 1, 'List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0810': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 36, 'EAL4': 3, 'EAL6+': 1, 'EAL4+': 1, 'EAL 6': 2, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 11, 'ADV_IMP.2': 4, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 4, 'ADV_IMP': 1, 'ADV_FSP.4': 3, 'ADV_SPM': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_CMC.5': 4, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 4, 'ALC_CMC': 4, 'ALC_CMS.4': 3, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 9, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 5, 'FCS_CKM.4': 3}, 'FDP': {'FDP_ITT.1': 14, 'FDP_IFC.1': 11, 'FDP_ACC.1': 36, 'FDP_ITT.1.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_SDI.2': 7, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 32, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_FLS.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 4, 'FMT_MSA.3': 20, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 25, 'FMT_SMR.1': 7, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 7, 'FPT_ITT.1': 13, 'FPT_ITT.1.1': 1}, 'FRU': {'FRU_FLT.2': 7}, 'FTP': {'FTP_ITT.1': 1}}, 'cc_claims': {'O': {'O.RND': 3, 'O.INTEGRITY_CHK': 7, 'O.HW_AES': 7, 'O.CUST_RECONFIG': 5, 'O.EEPROM_INTEGRITY': 5, 'O.FM_FW': 9, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 9}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 111, 'NXP Semiconductors': 30}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 31}}, 'DES': {'DES': {'DES': 16, 'DEA': 2}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1, 'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 14}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 15, 'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 18, 'ISO/IEC 14443': 10, 'ISO/IEC 18092': 2}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
0810V2a_pdf.pdf
. - The st_filename property was set to
0810V2b_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0810-V2-2014
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0810-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0810-2012']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0810V2a_pdf.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0810V2b_pdf.pdf
.
The state of the certificate object was updated.
- The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}]}
values discarded.
- The new value is
-
12.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}]}
values discarded.
- The report property was updated, with the
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "e23c44eaf63786a6",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0810-V2-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"016"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0810-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0810-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2014-04-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0810V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0810-V2-2014",
"cert_item": "NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0810": 1,
"BSI-DSZ-CC-0810-2012": 3,
"BSI-DSZ-CC-0810-V2-2014": 22
}
},
"cc_claims": {
"O": {
"O.C": 5
},
"R": {
"R.O": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 2,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 2,
"ADV_SPM": 1,
"ADV_SPM.1": 2,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 2,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 3,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 1,
"ALC_FLR.1": 6,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 2,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 2,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 5": 3,
"EAL 6": 4,
"EAL 6 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the": 1,
"3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors": 1,
"3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0": 1,
"9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1": 1,
"List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document": 1,
"May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP": 1,
"Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List": 1,
"Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev": 1,
"Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual": 1,
"Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8": 1,
"composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the": 1,
"platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
"smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 13
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"physical probing": 1,
"side channel": 2,
"timing attacks": 1
},
"other": {
"JIL": 4,
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS36": 1
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDES": 2,
"Triple-DES": 3
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 24,
"NXP Semiconductors": 31
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20140415164656+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, BSI, P60D024/016/012PVB/PVB(Y), Secure Smart Card Controller, EAL6, NXP\"",
"/ModDate": "D:20140415165055+02\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "IT Security",
"/Title": "Certification Report BSI-DSZ-CC-0810-V2-2014",
"pdf_file_size_bytes": 1121979,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/zertifizierung",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
},
"st_filename": "0810V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0810": 1
}
},
"cc_claims": {
"O": {
"O.CUST_RECONFIG": 5,
"O.EEPROM_INTEGRITY": 5,
"O.FM_FW": 9,
"O.HW_AES": 7,
"O.INTEGRITY_CHK": 7,
"O.MEM_ACCESS": 9,
"O.RND": 3,
"O.SFR_ACCESS": 9
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 3,
"ADV_FSP.5": 11,
"ADV_IMP": 1,
"ADV_IMP.2": 4,
"ADV_INT.3": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 4,
"ALC_CMC.4": 3,
"ALC_CMC.5": 4,
"ALC_CMS": 4,
"ALC_CMS.4": 3,
"ALC_CMS.5": 5,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 4,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6": 36,
"EAL6 augmented": 3,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 7,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.4": 3,
"FCS_COP.1": 23,
"FCS_COP.1.1": 2,
"FCS_RNG.1": 9,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 36,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 32,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_FLS.1": 1,
"FDP_IFC.1": 11,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_ITT.1": 14,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 4,
"FMT_MSA.1": 25,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 20,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_ITT.1": 13,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 7
},
"FRU": {
"FRU_FLT.2": 7
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 1,
"SmartMX2": 15
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 14
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"fault injection": 3,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 13,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS PUB 197": 3,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 14443": 10,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 18
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31
}
},
"DES": {
"3DES": {
"TDEA": 3,
"TDES": 1,
"Triple-DEA": 1,
"Triple-DES": 9
},
"DES": {
"DEA": 2,
"DES": 16
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 111,
"NXP Semiconductors": 30
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Alternative descriptive title": "Security Target Lite",
"/Author": "NXP Semiconductors",
"/CertificationID": "BSI-DSZ-CC-0810",
"/Company": "NXP Semiconductors GmbH Germany",
"/Copyright date": "2012",
"/CreationDate": "D:20131107104533+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.1 for Word",
"/Descriptive title": "Security Target Lite",
"/Division": "NXP Semiconductors",
"/Document identifier": " ",
"/Keywords": "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA",
"/ModDate": "D:20131107104604+01\u002700\u0027",
"/Modification date": "04 November 2013",
"/Producer": "Adobe PDF Library 10.0",
"/Product name title": "\u003cnot applicable\u003e",
"/Revision": "Rev. 2.2",
"/Security status": "\u003cSecurity status\u003e",
"/SourceModified": "D:20131107093632",
"/Specification status": "Evaluation documentation Public",
"/Subject": "P60D024PVB",
"/Template date": "29 January 2010",
"/Template version": "2.9.0",
"/Title": "Security Target Lite",
"/docpath": "W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D024\\ASE",
"/list_of_authors": "Thomas Rottschaefer",
"/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1",
"/relBiblioPath": "..\\Bibliography.doc",
"/test_sec_row_naming": "manufacturer area",
"/text_cert_body_long": "Bundesamt fuer Sicherheit in der Informationstechnik",
"/text_cert_body_short": "BSI",
"/text_developer_long": "NXP Semiconductors, Business Unit Identification",
"/text_developer_short": "NXP",
"/text_product_cfgC080": "P60C080PVA",
"/text_product_cfgC144": "P60C144PVA",
"/text_product_cfgD012": "P60D012PVB",
"/text_product_cfgD016": "P60D016PVB",
"/text_product_cfgD024": "P60D024PVB",
"/text_product_cfgD024_nameplate": "9047A",
"/text_product_cfgD080": "P60D080PVA",
"/text_product_cfgD144": "P60D144PVA",
"/text_product_cfgD144_nameplate": "9050B",
"/text_product_letter": "B",
"/text_product_long": "NXP Secure Smart Card Controller P60D024/016/012P",
"/text_product_minor": "VB",
"/text_product_short": "P60D024/016/012PVB",
"/text_sponsor_long": "NXP Semiconductors, Business Unit Identification",
"/text_sponsor_short": "NXP",
"pdf_file_size_bytes": 652575,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.nxp.com/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 80
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"SECURITY_IC_V1.0",
"PKISKPP"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
"pp_name": "Security IC Platform Protection Profile, Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0810V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL6+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0810V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b10e1b13b1574906aa3ab8a601c451dc46d9990aa36f03d6e7ed47d8dc42613b",
"txt_hash": "46ed9220b989cac2201135b47a4ece78f9c420224830e3543c87c62ea52326d2"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "558cd6262fe13bd5b8b1d9207bb28ba72fbd3259b33223b42499b646527dabe1",
"txt_hash": "c4ce1043468e5bba6a6fe9a8ff598e8ecafc52e7a4588cd0a7827b2e5bba7199"
}
},
"status": "archived"
}