This page was not yet optimized for use on mobile devices.
Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701
CSV information ?
Status | archived |
---|---|
Valid from | 24.01.2006 |
Valid until | 30.04.2013 |
Scheme | 🇬🇧 UK |
Manufacturer | Sony Corporation |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | EAL4 |
Heuristics summary ?
Certificate ID: CRP240
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, 3DESSecurity level
EAL4, EAL1, EAL7Certificates
CERTIFICATION REPORT No. P240Certification process
out of scope, interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and, by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contactStandards
CCIMB-2004-01-001, CCIMB-2004-01-002, CCIMB-2004-01-003, CCIMB-2004-01-004File metadata
Title | CRP240 |
---|---|
Subject | COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL |
Author | CESG |
Creation date | D:20060208162208Z |
Modification date | D:20120106121536Z |
Pages | 24 |
Creator | cp240_cr_1.02 - Microsoft Word |
Producer | Acrobat PDFWriter 5.0 for Windows NT |
Security target ?
Extracted keywords
Symmetric Algorithms
DES, Triple-DESBlock cipher modes
CBCSecurity level
EAL4Security Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.2, ACM_CAP.3, ADO_DEL.2, ADO_IGS.1, ADV_FSP.2, ADV_HLD.2, ADV_IMP.1, ADV_LLD.1, ADV_RCR.1, ADV_SPM.1, ADV_FSP.1, ADV_HLD.1, AGD_ADM.1, AGD_USR.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_MSU.2, AVA_SOF.1, AVA_VLA.2Security Functional Requirements (SFR)
FCS_RNG.1, FCS_CKM.1, FCS_CKM.4, FCS_COP.1, FCS_COP.1.1, FCS_RNG.1.1, FCS_CKM.1.1, FCS_CKM.4.1, FCS_RNG, FCS_IFC.1, FDP_ACF.1, FDP_ACC.1, FDP_ETC.1, FDP_IFC.1, FDP_IFF.1, FDP_ITC.1, FDP_ITT.1, FDP_UCT.1, FDP_UIT.1, FDP_SDI.1, FDP_ITT.1.1, FDP_ACC.1.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_IFC, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_IFF.1.6, FDP_UCT.1.1, FDP_UIT.1.1, FDP_UIT.1.2, FDP_SDI.1.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FIA_AFL.1, FIA_UAU.2, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.2.1, FIA_AFL.1.1, FIA_AFL.1.2, FMT_PUT.1, FMT_MOF.1, FMT_MSA.1, FMT_MSA.2, FMT_MSA.3, FMT_MTD.1, FMT_MTD.2, FMT_MTD.3, FMT_SMF.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1.1, FMT_MTD.1.1, FMT_MTD.2.1, FMT_MTD.2.2, FMT_MTD.3.1, FMT_MSA.2.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1, FMT_PUT, FPT_FLS.1, FPT_ITC.1, FPT_ITI.1, FPT_ITT.1, FPT_PHP.3, FPT_RCV.4, FPT_RPL.1, FPT_SEP.1, FPT_TDC.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_PHP.3.1, FPT_ITT.1.1, FPT_RCV.4.1, FPT_TDC.1.1, FPT_TDC.1.2, FPT_ITC.1.1, FPT_ITI.1.1, FPT_ITI.1.2, FPT_RPL.1.1, FPT_RPL.1.2, FPT_FSL.1, FRU_FLT.1, FRU_FLT.1.1, FTP_ITC, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3, FTP_TRP.1Side-channel analysis
Physical Probing, physical probing, DPA, SPA, Malfunction, malfunction, reverse engineering, JILStandards
AIS 20, AIS20, CCIMB-99-031, CCIMB-99-032, CCIMB-99-033File metadata
Title | CXD3715GG/GU-x Security Target |
---|---|
Subject | 英文 |
Author | katoh |
Creation date | D:20130430143756+01'00' |
Modification date | D:20130430143756+01'00' |
Pages | 126 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Certificate ID: CRP240
Extracted SARs
ATE_FUN.1, ALC_TAT.1, AGD_ADM.1, AVA_VLA.2, ALC_DVS.1, AVA_SOF.1, ATE_COV.2, ALC_LCD.1, AVA_MSU.2, ADV_FSP.2, ADV_SPM.1, ATE_DPT.1, ADV_HLD.2, ADV_LLD.1, AGD_USR.1, ADV_IMP.1, ATE_IND.2, ADV_RCR.1References ?
No references are available for this certificate.
Updates ?
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'e048e6d3ab123fc994a225e8447483412d340ae2d9fefd49bb85f31f6aa2e8b3', 'txt_hash': '62d57b56e7cd258b30c2cbddcc7cb511ff82f03ce168548d8c8b78faa9de4e29'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '68a797f917cce5fd39e92443615f9838f75119b2031613fe564b45e258ddbb04', 'txt_hash': '506efaf7001a601e85ca34c4b763a2db0ad23d679aa0860bf8cf9efe85f0a865'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 55971, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 24, '/ModDate': 'D:20120106121536Z', '/CreationDate': 'D:20060208162208Z', '/Title': 'CRP240', '/Creator': 'cp240_cr_1.02 - Microsoft Word', '/Author': 'CESG', '/Subject': 'COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL ', '/Producer': 'Acrobat PDFWriter 5.0 for Windows NT', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 861962, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 126, '/Title': 'CXD3715GG/GU-x Security Target', '/Author': 'katoh', '/Subject': '英文', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': "D:20130430143756+01'00'", '/ModDate': "D:20130430143756+01'00'", '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CERTIFICATION REPORT No. P240': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 18, 'EAL1': 1, 'EAL7': 1}}, 'cc_sar': {}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 2}, '3DES': {'3DES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCIMB-2004-01-001': 1, 'CCIMB-2004-01-002': 1, 'CCIMB-2004-01-003': 1, 'CCIMB-2004-01-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 2, 'interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and': 1, 'by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 34}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 4, 'ACM_CAP.4': 4, 'ACM_SCP.2': 6, 'ACM_CAP.3': 1}, 'ADO': {'ADO_DEL.2': 4, 'ADO_IGS.1': 4}, 'ADV': {'ADV_FSP.2': 4, 'ADV_HLD.2': 4, 'ADV_IMP.1': 5, 'ADV_LLD.1': 5, 'ADV_RCR.1': 6, 'ADV_SPM.1': 9, 'ADV_FSP.1': 7, 'ADV_HLD.1': 2}, 'AGD': {'AGD_ADM.1': 8, 'AGD_USR.1': 6}, 'ALC': {'ALC_DVS.1': 5, 'ALC_LCD.1': 4, 'ALC_TAT.1': 5}, 'ATE': {'ATE_COV.2': 4, 'ATE_DPT.1': 3, 'ATE_FUN.1': 6, 'ATE_IND.2': 4}, 'AVA': {'AVA_MSU.2': 4, 'AVA_SOF.1': 4, 'AVA_VLA.2': 6}}, 'cc_sfr': {'FCS': {'FCS_RNG.1': 10, 'FCS_CKM.1': 18, 'FCS_CKM.4': 16, 'FCS_COP.1': 32, 'FCS_COP.1.1': 2, 'FCS_RNG.1.1': 10, 'FCS_CKM.1.1': 2, 'FCS_CKM.4.1': 2, 'FCS_RNG': 2, 'FCS_IFC.1': 2}, 'FDP': {'FDP_ACF.1': 21, 'FDP_ACC.1': 24, 'FDP_ETC.1': 9, 'FDP_IFC.1': 35, 'FDP_IFF.1': 16, 'FDP_ITC.1': 13, 'FDP_ITT.1': 13, 'FDP_UCT.1': 9, 'FDP_UIT.1': 9, 'FDP_SDI.1': 13, 'FDP_ITT.1.1': 1, 'FDP_ACC.1.1': 1, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_IFC': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_IFF.1.6': 1, 'FDP_UCT.1.1': 1, 'FDP_UIT.1.1': 1, 'FDP_UIT.1.2': 1, 'FDP_SDI.1.1': 1, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 1, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 1, 'FDP_ITC.1.3': 1}, 'FIA': {'FIA_AFL.1': 10, 'FIA_UAU.2': 11, 'FIA_UID.1': 12, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.2.1': 1, 'FIA_AFL.1.1': 1, 'FIA_AFL.1.2': 1}, 'FMT': {'FMT_PUT.1': 18, 'FMT_MOF.1': 8, 'FMT_MSA.1': 13, 'FMT_MSA.2': 15, 'FMT_MSA.3': 13, 'FMT_MTD.1': 10, 'FMT_MTD.2': 9, 'FMT_MTD.3': 9, 'FMT_SMF.1': 10, 'FMT_SMR.1': 17, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1.1': 1, 'FMT_MTD.1.1': 1, 'FMT_MTD.2.1': 1, 'FMT_MTD.2.2': 1, 'FMT_MTD.3.1': 1, 'FMT_MSA.2.1': 1, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 1, 'FMT_SMF.1.1': 1, 'FMT_PUT': 1}, 'FPT': {'FPT_FLS.1': 30, 'FPT_ITC.1': 9, 'FPT_ITI.1': 11, 'FPT_ITT.1': 12, 'FPT_PHP.3': 11, 'FPT_RCV.4': 13, 'FPT_RPL.1': 11, 'FPT_SEP.1': 11, 'FPT_TDC.1': 9, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_PHP.3.1': 1, 'FPT_ITT.1.1': 1, 'FPT_RCV.4.1': 1, 'FPT_TDC.1.1': 1, 'FPT_TDC.1.2': 1, 'FPT_ITC.1.1': 1, 'FPT_ITI.1.1': 1, 'FPT_ITI.1.2': 1, 'FPT_RPL.1.1': 1, 'FPT_RPL.1.2': 1, 'FPT_FSL.1': 1}, 'FRU': {'FRU_FLT.1': 16, 'FRU_FLT.1.1': 1}, 'FTP': {'FTP_ITC': 3, 'FTP_ITC.1': 20, 'FTP_ITC.1.1': 2, 'FTP_ITC.1.2': 3, 'FTP_ITC.1.3': 2, 'FTP_TRP.1': 2}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 44}, '3DES': {'Triple-DES': 5}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 3}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Physical Probing': 11, 'physical probing': 8, 'DPA': 4, 'SPA': 2}, 'FI': {'Malfunction': 7, 'malfunction': 18}, 'other': {'reverse engineering': 2, 'JIL': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 20': 2, 'AIS20': 2}, 'CC': {'CCIMB-99-031': 1, 'CCIMB-99-032': 1, 'CCIMB-99-033': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
CRP240.pdf
. - The st_filename property was set to
ST Public v1.04.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP240
. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 1}]}
.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The extracted_sars property was set to
None
.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "794b142b57afbe13",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP240",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"0701"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Sony Corporation",
"manufacturer_web": "https://www.sony.com/",
"name": "Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701",
"not_valid_after": "2013-04-30",
"not_valid_before": "2006-01-24",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "CRP240.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CERTIFICATION REPORT No. P240": 1
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {},
"cc_security_level": {
"EAL": {
"EAL1": 1,
"EAL4": 18,
"EAL7": 1
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact": 1,
"interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and": 1,
"out of scope": 2
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCIMB-2004-01-001": 1,
"CCIMB-2004-01-002": 1,
"CCIMB-2004-01-003": 1,
"CCIMB-2004-01-004": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"3DES": 1
},
"DES": {
"DES": 2
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "CESG",
"/CreationDate": "D:20060208162208Z",
"/Creator": "cp240_cr_1.02 - Microsoft Word",
"/ModDate": "D:20120106121536Z",
"/Producer": "Acrobat PDFWriter 5.0 for Windows NT",
"/Subject": "COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL ",
"/Title": "CRP240",
"pdf_file_size_bytes": 55971,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 24
},
"st_filename": "ST Public v1.04.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ACM": {
"ACM_AUT.1": 4,
"ACM_CAP.3": 1,
"ACM_CAP.4": 4,
"ACM_SCP.2": 6
},
"ADO": {
"ADO_DEL.2": 4,
"ADO_IGS.1": 4
},
"ADV": {
"ADV_FSP.1": 7,
"ADV_FSP.2": 4,
"ADV_HLD.1": 2,
"ADV_HLD.2": 4,
"ADV_IMP.1": 5,
"ADV_LLD.1": 5,
"ADV_RCR.1": 6,
"ADV_SPM.1": 9
},
"AGD": {
"AGD_ADM.1": 8,
"AGD_USR.1": 6
},
"ALC": {
"ALC_DVS.1": 5,
"ALC_LCD.1": 4,
"ALC_TAT.1": 5
},
"ATE": {
"ATE_COV.2": 4,
"ATE_DPT.1": 3,
"ATE_FUN.1": 6,
"ATE_IND.2": 4
},
"AVA": {
"AVA_MSU.2": 4,
"AVA_SOF.1": 4,
"AVA_VLA.2": 6
}
},
"cc_security_level": {
"EAL": {
"EAL4": 34
}
},
"cc_sfr": {
"FCS": {
"FCS_CKM.1": 18,
"FCS_CKM.1.1": 2,
"FCS_CKM.4": 16,
"FCS_CKM.4.1": 2,
"FCS_COP.1": 32,
"FCS_COP.1.1": 2,
"FCS_IFC.1": 2,
"FCS_RNG": 2,
"FCS_RNG.1": 10,
"FCS_RNG.1.1": 10
},
"FDP": {
"FDP_ACC.1": 24,
"FDP_ACC.1.1": 1,
"FDP_ACF.1": 21,
"FDP_ACF.1.1": 1,
"FDP_ACF.1.2": 1,
"FDP_ACF.1.3": 1,
"FDP_ACF.1.4": 1,
"FDP_ETC.1": 9,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 1,
"FDP_IFC": 1,
"FDP_IFC.1": 35,
"FDP_IFF.1": 16,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_IFF.1.6": 1,
"FDP_ITC.1": 13,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 1,
"FDP_ITC.1.3": 1,
"FDP_ITT.1": 13,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 13,
"FDP_SDI.1.1": 1,
"FDP_UCT.1": 9,
"FDP_UCT.1.1": 1,
"FDP_UIT.1": 9,
"FDP_UIT.1.1": 1,
"FDP_UIT.1.2": 1
},
"FIA": {
"FIA_AFL.1": 10,
"FIA_AFL.1.1": 1,
"FIA_AFL.1.2": 1,
"FIA_UAU.2": 11,
"FIA_UAU.2.1": 1,
"FIA_UID.1": 12,
"FIA_UID.1.1": 1,
"FIA_UID.1.2": 1
},
"FMT": {
"FMT_MOF.1": 8,
"FMT_MOF.1.1": 1,
"FMT_MSA.1": 13,
"FMT_MSA.2": 15,
"FMT_MSA.2.1": 1,
"FMT_MSA.3": 13,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 1,
"FMT_MTD.1": 10,
"FMT_MTD.1.1": 1,
"FMT_MTD.2": 9,
"FMT_MTD.2.1": 1,
"FMT_MTD.2.2": 1,
"FMT_MTD.3": 9,
"FMT_MTD.3.1": 1,
"FMT_PUT": 1,
"FMT_PUT.1": 18,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 17,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 30,
"FPT_FSL.1": 1,
"FPT_ITC.1": 9,
"FPT_ITC.1.1": 1,
"FPT_ITI.1": 11,
"FPT_ITI.1.1": 1,
"FPT_ITI.1.2": 1,
"FPT_ITT.1": 12,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 11,
"FPT_PHP.3.1": 1,
"FPT_RCV.4": 13,
"FPT_RCV.4.1": 1,
"FPT_RPL.1": 11,
"FPT_RPL.1.1": 1,
"FPT_RPL.1.2": 1,
"FPT_SEP.1": 11,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1,
"FPT_TDC.1": 9,
"FPT_TDC.1.1": 1,
"FPT_TDC.1.2": 1
},
"FRU": {
"FRU_FLT.1": 16,
"FRU_FLT.1.1": 1
},
"FTP": {
"FTP_ITC": 3,
"FTP_ITC.1": 20,
"FTP_ITC.1.1": 2,
"FTP_ITC.1.2": 3,
"FTP_ITC.1.3": 2,
"FTP_TRP.1": 2
}
},
"certification_process": {},
"cipher_mode": {
"CBC": {
"CBC": 3
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"Malfunction": 7,
"malfunction": 18
},
"SCA": {
"DPA": 4,
"Physical Probing": 11,
"SPA": 2,
"physical probing": 8
},
"other": {
"JIL": 2,
"reverse engineering": 2
}
},
"standard_id": {
"BSI": {
"AIS 20": 2,
"AIS20": 2
},
"CC": {
"CCIMB-99-031": 1,
"CCIMB-99-032": 1,
"CCIMB-99-033": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"Triple-DES": 5
},
"DES": {
"DES": 44
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "katoh",
"/CreationDate": "D:20130430143756+01\u002700\u0027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20130430143756+01\u002700\u0027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Subject": "\u82f1\u6587",
"/Title": "CXD3715GG/GU-x Security Target",
"pdf_file_size_bytes": 861962,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 126
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"EAL4"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "e048e6d3ab123fc994a225e8447483412d340ae2d9fefd49bb85f31f6aa2e8b3",
"txt_hash": "62d57b56e7cd258b30c2cbddcc7cb511ff82f03ce168548d8c8b78faa9de4e29"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "68a797f917cce5fd39e92443615f9838f75119b2031613fe564b45e258ddbb04",
"txt_hash": "506efaf7001a601e85ca34c4b763a2db0ad23d679aa0860bf8cf9efe85f0a865"
}
},
"status": "archived"
}