NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software

CSV information ?

Status active
Valid from 12.12.2022
Valid until 12.12.2027
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL6+, ASE_TSS.2, ALC_FLR.1
Protection profiles

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-1059-V5-2022

Certificate ?

Extracted keywords

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 6 augmented
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1059-V5-2022

Standards
ISO/IEC 15408, ISO/IEC 18045

File metadata

Title: Certificate BSI-DSZ-CC-1059-V5-2022
Subject: Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH
Keywords: "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Pages: 1

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES, TDEA
Schemes
MAC
Randomness
TRNG, RNG
Engines
SmartMX2
Block cipher modes
ECB, CBC

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL 5+, EAL 6 augmented
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ASE_TSS.2
Protection profiles
BSI-CC-PP-0084-2014
Certificates
BSI-DSZ-CC-1059-V5-2022, BSI-DSZ-CC-1059-V4-2021
Evaluation facilities
TĂśV Informationstechnik
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Smart Card Controller P6022y VB – Security Target, Version 2.8, 2021-03-09, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V5-2022, Version 1, 2022-10-24, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, COMP) for the P6022y VB, BSI-DSZ-CC-1059-V5, version 1, 2022-10-24, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller, Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1, NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1, 2018-11-27, NXP Semiconductors (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification, 3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification, Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Order Entry Form, Version 2.1, 2019-11-18, NXP Semiconductors [18] NXP Secure Smart Card, P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [19] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.8, 2021-05-04, NXP Semiconductors (confidential document) [20] Site Technical Audit Report (STAR), Firma C. Weber, Leiterplattenverarbeitung, Version 1

Side-channel analysis
physical probing, physical tampering, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Smart Card Controller P6022y VB – Security Target, Version 2.8, 2021-03-09, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V5-2022, Version 1, 2022-10-24, TÜV, GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January, COMP) for the P6022y VB, BSI-DSZ-CC-1059-V5, version 1, 2022-10-24, TÜV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller, Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1, NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1, 2018-11-27, NXP Semiconductors (confidential document) 7 specifically • AIS 1, Version 14, Durchführung der Ortsbesichtigung in der Entwicklungsumgebung, SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification, 3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification, Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Order Entry Form, Version 2.1, 2019-11-18, NXP Semiconductors [18] NXP Secure Smart Card, P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [19] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.8, 2021-05-04, NXP Semiconductors (confidential document) [20] Site Technical Audit Report (STAR), Firma C. Weber, Leiterplattenverarbeitung, Version 1

Standards
FIPS197, AIS 34, AIS 25, AIS 37, AIS 31, AIS 36, AIS31, AIS 35, AIS 1, AIS 26, AIS 32, AIS 38, AIS 39, AIS 46, AIS 47, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14443, ISO/IEC 7816
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-1059-V5-2022
Subject: Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH
Keywords: "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH"
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Pages: 31

Frontpage

Certificate ID: BSI-DSZ-CC-1059-V5-2022
Certified item: NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software
Certification lab: BSI
Developer: NXP Semiconductors Germany GmbH

References

Outgoing Incoming
  • NSCIB-CC-23-67206-CR - NXP Crypto Library V3.1.x on P6022y VB
  • NSCIB-CC-2200035-01-CR - NXP JCOP3 P60
  • ANSSI-CC-2020/51-R01 - IAS ECC v2, version 1.3, in configuration #2 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/51-R01)
  • ANSSI-CC-2020/50-R01 - IAS ECC v2, version 1.3, in configuration #1 on ID-One Cosmo v8.2 open platform on NXP P6022M VB (Identification de l’application : F0 02 02 13) (ANSSI-CC-2020/50-R01)
  • ANSSI-CC-2020/26-R01 - Plateforme ID-One Cosmo v8.2 masquĂ©e sur le composant NXP P60D145 Codes SAAAAR : 091121, 094223 et 094742 (ANSSI-CC-2020/26-R01)
  • ANSSI-CC-2020/52-R01 - IAS ECC v2, version 1.3, in configuration #3 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/52-R01)
  • ANSSI-CC-2020/53-R01 - IAS ECC v2, version 1.3, in configuration #4 on ID-One Cosmo v8.2 open platform on NXP P6022M VBIdentification de l’application : F0 02 02 13 (ANSSI-CC-2020/53-R01)

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDES, TDEA, CBC-MAC
Asymmetric Algorithms
ECC
Schemes
MAC
Randomness
TRNG, RND, RNG
Engines
SmartMX2, SmartMX
Block cipher modes
ECB, CBC

Vendor
NXP, NXP Semiconductors, NXP Semiconductors N.V

Security level
EAL6, EAL6+, EAL4, EAL4+, EAL6 augmented, EAL4 augmented
Claims
O.RND, O.TDES, O.AES, O.CUST_RECONF_PLAIN, O.E, O.F, O.MEM_ACCESS, O.SFR_ACCESS, O.PUF, O.FM_FW, O.SFR_, O.EEPROM_INTEGRITY, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_COP.1, FCS_CKM.4, FCS_RNG.1.1, FCS_RNG.1.2, FCS_CKM.1, FCS_COP.1.1, FCS_CKM.4.1, FCS_CKM.1.1, FCS_CKM.2, FDP_SDC.1, FDP_SDI.2, FDP_ITT.1, FDP_IFC.1, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_SDC.1.1, FDP_ITC.1, FDP_ITC.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_MSA.1.1, FMT_SMR.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-PP-0084-2014
Certificates
BSI-DSZ-CC-1059

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS 197, FIPS PUB 197, NIST SP 800-67, NIST SP 800-38A, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 9797-1, CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003, CCMB-2017-04-004

File metadata

Title: Security Target
Subject: NXP Secure Smart Card Controller P6022y VB
Keywords: CC, Security Target, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB
Author: Bundesamt fĂĽr Sicherheit in der Informationstechnik
Pages: 99

References

Outgoing
Incoming
  • ANSSI-CC-2023/38 - ChipDoc v2 on JCOP 3 P60 in SSCD configuration (v7b4_2) (ANSSI-CC-2023/38)
  • ANSSI-CC-2020/26-R01 - Plateforme ID-One Cosmo v8.2 masquĂ©e sur le composant NXP P60D145 Codes SAAAAR : 091121, 094223 et 094742 (ANSSI-CC-2020/26-R01)

Heuristics ?

Certificate ID: BSI-DSZ-CC-1059-V5-2022

Extracted SARs

ATE_DPT.3, ASE_REQ.2, ASE_INT.1, ASE_CCL.1, ADV_INT.3, ASE_OBJ.2, ADV_IMP.2, ADV_SPM.1, ATE_IND.2, ATE_FUN.2, AGD_OPE.1, ALC_CMC.5, ALC_CMS.5, AGD_PRE.1, ALC_TAT.3, ADV_FSP.5, ATE_COV.3, ALC_DVS.2, ALC_FLR.1, ASE_SPD.1, ALC_DEL.1, ASE_TSS.2, ADV_TDS.5, ASE_ECD.1, ADV_ARC.1, ALC_LCD.1, AVA_VAN.5

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '10ebadd0839301a76c7511755cf84d6293f908bb07476b6009b939fbc3e1d014', 'txt_hash': '2538cfa3d05933577fc4da9c6ca31724d51d5d219756f1aca2e9ef4334ac9b83'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '830776385e6ff2d22602e111d0c4c5fe29197bc77a54d8398e3bc7e9181d29c0', 'txt_hash': '47d1701783430d7c83504661004f7572b1854d73c62c8531fb8fabfea7ca7c5c'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '2b94a8e5f95df23eecef0cc9664bf4618f28a31e5ed7fbb46d13586d7b5347e0', 'txt_hash': 'a2311dc8cc7ab3fa103f285756dc4fbebde7656612231e2b09fc930da8e4e35b'}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': {'pdf_file_size_bytes': 230975, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 1, '/Author': 'Bundesamt fĂĽr Sicherheit in der Informationstechnik', '/Keywords': '"Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH"', '/Subject': 'Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH', '/Title': 'Certificate BSI-DSZ-CC-1059-V5-2022', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}, 'cert_frontpage': None, 'cert_keywords': {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059-V5-2022': 1}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0084-2014': 1}}, 'cc_security_level': {'EAL': {'EAL 6': 1, 'EAL 5': 1, 'EAL 2': 1, 'EAL 6 augmented': 1}}, 'cc_sar': {'ALC': {'ALC_FLR.1': 1, 'ALC_FLR': 1}, 'ASE': {'ASE_TSS.2': 1}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {'NXP': {'NXP': 1, 'NXP Semiconductors': 1}}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 18045': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}, 'cert_filename': '1059V5c_pdf.pdf'}.
    • The report_frontpage property was set to {'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-1059-V5-2022', 'cert_item': 'NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI', 'ref_protection_profiles': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'cc_version': 'PP conformant plus product specific extensions Common Criteria Part 2 extended', 'cc_security_level': 'Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V5-2022': 19, 'BSI-DSZ-CC-1059-V4-2021': 2}, '__delete__': ['BSI-DSZ-CC-1059-V5']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059': 1}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-23-67206-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-23-67206-CR']}}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-1059-V5': 3}, '__update__': {'BSI-DSZ-CC-1059-V5-2022': 38, 'BSI-DSZ-CC-1059-V4-2021': 4}}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'9797-1-2011': 1}}, '__update__': {'DE': {'__update__': {'BSI-DSZ-CC-1059-V5-2022': 19, 'BSI-DSZ-CC-1059-V4-2021': 2}, '__delete__': ['BSI-DSZ-CC-1059-V5']}}}} data.
    • The st_keywords property was updated, with the {'cc_cert_id': {'DE': {'BSI-DSZ-CC-1059': 1}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
    • The st_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/26-R01']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/26-R01']}}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/51-R01', 'ANSSI-CC-2020/52-R01', 'ANSSI-CC-2020/26-R01', 'ANSSI-CC-2020/53-R01', 'ANSSI-CC-2020/50-R01']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2020/51-R01', 'ANSSI-CC-2020/52-R01', 'ANSSI-CC-2020/26-R01', 'ANSSI-CC-2020/53-R01', 'ANSSI-CC-2020/50-R01']}}} data.
    • The scheme_data property was set to None.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/38']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/38']}} data.
    • The report_references property was updated, with the {'directly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}, '__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6-CR']}}, 'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}, '__add__': {'_type': 'Set', 'elements': ['ANSSI-CC-2023/38', 'NSCIB-CC-67206-CR6-CR']}}} data.
    • The scheme_data property was updated, with the {'cert_id': 'BSI-DSZ-CC-1059-V5-2022', 'product': 'NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software', 'certification_date': '12.12.2022', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1059_1059V2_1059V3_1059V4_1059V5.html', 'enhanced': {'__update__': {'product': 'NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software', 'assurance_level': 'EAL6+, ALC_FLR.1,ASE_TSS.2', 'certification_date': '12.12.2022', 'expiration_date': '11.12.2027', 'entries': {'3': {'__update__': {'id': 'BSI', 'description': 'forerunner, changes include modifications on the documentation level as well as an update and reevaluation of the product life-cycle.'}}, '4': {'__update__': {'id': 'BSI'}}, '__insert__': [[0, {'id': 'BSI-DSZ-CC-1059-V5-2022 (Ausstellungsdatum / Certification Date 12.12.2022, gĂĽltig bis / valid until 11.12.2027) \nZertifizierungsreport / Certification Report\nSicherheitsvorgaben / Security Target\nZertifikat / Certificate', 'description': 'Certificate'}], [1, {'id': 'BSI', 'description': 'Compared to the TOE forerunner, changes include modifications on the documentation level as well as an update and reevaluation of the product life cycle. The revaluation focused on the vulnerability analysis.'}], [2, {'id': 'BSI', 'description': 'forerunner, changes include modifications on the documentation level as well as an update and reevaluation of the product life-cycle.'}]]}, 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1059V5b_pdf.pdf?__blob=publicationFile&v=2', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1059V5a_pdf.pdf?__blob=publicationFile&v=2', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1000/1059V5c_pdf.pdf?__blob=publicationFile&v=2', 'description': 'The Target of Evaluation (TOE) is the IC hardware platform NXP Secure Smart Card Controller P6022y VB with IC Dedicated Software and user documentation, but without the MIFARE emulations available for this chip plattform. The TOE is intended to be used for applications runnning on an on-chip smart card operating system. Operating system an applictions are not part of the TOE. The P6022y VB is a 8-bit microcontroller incorporating a central processing unit, special function registers, AES und Triple-DES coprocessors, CRC coprocessor, Fame2 coprocessor, memories accessible via a Memory Management Unit, physical random number generator, sensors and filters as well as communication interfaces. The P60022y VB supports the integrity and confidentiality of data stored in the memories and supports the integrity of its security functionality in operation.'}}} data.
  • 17.07.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-2200035-01-CR']}}, 'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['NSCIB-CC-2200035-01-CR']}}} data.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': {'cert_id': 'BSI-DSZ-CC-1149-2022', 'product': 'NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1)', 'vendor': 'NXP Semiconductors Germany GmbH', 'certification_date': '30.06.2022', 'category': 'Smart Cards and similar devices', 'url': 'https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/SmartCards_IC_Cryptolib/1149.html', 'enhanced': {'product': 'NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1)', 'applicant': 'NXP Semiconductors Germany GmbH\nTroplowitzstrasse 20\n22529 Hamburg', 'evaluation_facility': 'TĂśV Informationstechnik GmbH', 'assurance_level': 'EAL6+,ALC_FLR.1,ASE_TSS.2', 'protection_profile': 'Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014', 'certification_date': '30.06.2022', 'expiration_date': '29.06.2027', 'entries': [{'id': 'BSI-DSZ-CC-1149-2022-MA-01', 'description': 'The change to the certified product is at the level of a none security relevant pure functional improvement for contactless communication compliance.'}, {'id': 'BSI-DSZ-CC-1149-2022', 'description': 'Certificate'}], 'target_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1149b_pdf.pdf?__blob=publicationFile&v=4', 'report_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1149a_pdf.pdf?__blob=publicationFile&v=3', 'cert_link': 'https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Reporte/Reporte1100/1149c_pdf.pdf?__blob=publicationFile&v=3', 'description': 'The TOE is the hard macro “NXP Secure Smart Card Controller N7122 with IC Dedicated Software and Crypto Library (R1)”, or in short “N7122”, and comprises of hardware, software (security IC Dedicated Software), and documentation. The N7122 is self-sufficient at the boundary of the hard macro and can be instantiated within packaged products. The TOE does not include a customer-specific Security IC Embedded Software, however, it provides secure mechanisms for customers to download and execute their code on the TOE.\nThe IC Dedicated Software comprises IC Dedicated Test Software for test purposes and IC Dedicated Support Software. The IC Dedicated Support Software consists of the Boot Software, which controls the boot process of the hardware platform, and a Firmware Interface.'}, 'subcategory': 'ICs, Cryptolib'}}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['NSCIB-CC-67206-CR6']}} data.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/1059V5c_pdf.pdf",
  "dgst": "985b19ea05e44c61",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "BSI-DSZ-CC-1059-V5-2022",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/26-R01",
          "NSCIB-CC-2200035-01-CR",
          "ANSSI-CC-2020/50-R01",
          "ANSSI-CC-2020/53-R01",
          "ANSSI-CC-2020/52-R01",
          "ANSSI-CC-2020/51-R01",
          "NSCIB-CC-23-67206-CR"
        ]
      },
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-1059-V4-2021"
        ]
      },
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/26-R01",
          "NSCIB-CC-2200035-01-CR",
          "ANSSI-CC-2020/50-R01",
          "ANSSI-CC-2020/53-R01",
          "ANSSI-CC-2020/52-R01",
          "ANSSI-CC-2023/38",
          "ANSSI-CC-2020/51-R01",
          "NSCIB-CC-23-67206-CR"
        ]
      },
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0973-2016",
          "BSI-DSZ-CC-0973-V2-2016",
          "BSI-DSZ-CC-1059-V4-2021",
          "BSI-DSZ-CC-1059-V2-2019",
          "BSI-DSZ-CC-1059-2018",
          "BSI-DSZ-CC-1059-V3-2019"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/26-R01",
          "ANSSI-CC-2023/38"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2020/26-R01",
          "ANSSI-CC-2023/38"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software",
  "not_valid_after": "2027-12-12",
  "not_valid_before": "2022-12-12",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "1059V5c_pdf.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-V5-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 1
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_FLR": 1,
          "ALC_FLR.1": 1
        },
        "ASE": {
          "ASE_TSS.2": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 2": 1,
          "EAL 5": 1,
          "EAL 6": 1,
          "EAL 6 augmented": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {
        "ISO": {
          "ISO/IEC 15408": 2,
          "ISO/IEC 18045": 2
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 1,
          "NXP Semiconductors": 1
        }
      },
      "vulnerability": {}
    },
    "cert_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH",
      "/Title": "Certificate BSI-DSZ-CC-1059-V5-2022",
      "pdf_file_size_bytes": 230975,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "1059V5a_pdf.pdf",
    "report_frontpage": {
      "DE": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-1059-V5-2022",
        "cert_item": "NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059-V4-2021": 2,
          "BSI-DSZ-CC-1059-V5-2022": 19
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 5
        },
        "R": {
          "R.O": 5
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0084-2014": 4
        }
      },
      "cc_sar": {
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR": 3,
          "ALC_FLR.1": 4,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_TSS.2": 4
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 1,
          "EAL 2": 3,
          "EAL 4": 1,
          "EAL 5": 4,
          "EAL 5+": 1,
          "EAL 6": 5,
          "EAL 6 augmented": 3
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "2018-11-27, NXP Semiconductors (confidential document) 7 specifically \u2022 AIS 1, Version 14, Durchf\u00fchrung der Ortsbesichtigung in der Entwicklungsumgebung": 1,
          "3.7, 2017-05-15, NXP Semiconductors (confidential document) [16] Objective Data Sheet Addendum - SmartMX2 P602xy VB Family Firmware Interface Specification": 1,
          "COMP) for the P6022y VB, BSI-DSZ-CC-1059-V5, version 1, 2022-10-24, T\u00dcV Informationstechnik GmbH (confidential document) [11] Product Data Sheet - SmartMX2 family P6022y VB, Secure high-performance smart card controller": 1,
          "GmbH (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January": 1,
          "NXP Semiconductors (confidential document) [13] Information on Guidance and Operation, NXP Secure Smart Card Controller P6022y VB, Version 1": 1,
          "NXP Semiconductors (confidential document) [20] Site Technical Audit Report (STAR), Firma C. Weber, Leiterplattenverarbeitung, Version 1": 1,
          "P6022y VB Configuration List - Hardware IC, Version 1.6, 2019-08-09, NXP Semiconductors (confidential document) [19] NXP Secure Smart Card Controller P6022y VB Evaluation Reference List, Version 2.8, 2021-05-04": 1,
          "Smart Card Controller P6022y VB \u2013 Security Target, Version 2.8, 2021-03-09, NXP Semiconductors (confidential document) [7] Evaluation Technical Report BSI-DSZ-CC-1059-V5-2022, Version 1, 2022-10-24, T\u00dcV": 1,
          "SmartMX2 P6022y VB, Wafer and delivery specification, Version 3.3, 2019-07-12, NXP Semiconductors (confidential document) [15] Product data sheet addendum - SmartMX2 P602xy VB family, Firmware Interface Specification": 1,
          "Version 1.1, 2016-05-23, NXP Semiconductors (confidential document) [17] Order Entry Form, Version 2.1, 2019-11-18, NXP Semiconductors [18] NXP Secure Smart Card": 1,
          "Version 3.6, 2019-08-22, NXP Semiconductors (confidential document) [12] Instruction Set for the SmartMX2 family, Secure smart card controller, Version 3.1": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {
        "CBC": {
          "CBC": 2
        },
        "ECB": {
          "ECB": 7
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX2": 10
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 3
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 5
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        },
        "TRNG": {
          "TRNG": 2
        }
      },
      "side_channel_analysis": {
        "FI": {
          "physical tampering": 1
        },
        "SCA": {
          "physical probing": 1
        },
        "other": {
          "JIL": 4
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 1": 1,
          "AIS 25": 2,
          "AIS 26": 1,
          "AIS 31": 3,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 2,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS 39": 1,
          "AIS 46": 1,
          "AIS 47": 1,
          "AIS31": 2
        },
        "FIPS": {
          "FIPS197": 4
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 12
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 1,
            "Triple-DES": 5
          },
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 40,
          "NXP Semiconductors": 30
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH\"",
      "/Subject": "Common Criteria, Certification, Zertifizierung, NXP Secure Smart Card Controller P6022y VB* including IC Dedicated Software, NXP Semiconductors Germany GmbH",
      "/Title": "Certification Report BSI-DSZ-CC-1059-V5-2022",
      "pdf_file_size_bytes": 507897,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/zertifizierungsreporte",
          "https://www.sogis.eu/",
          "http://www.commoncriteriaportal.org/cc/",
          "https://www.bsi.bund.de/AIS",
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 31
    },
    "st_filename": "1059V5b_pdf.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 2
          }
        }
      },
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-1059": 1
        }
      },
      "cc_claims": {
        "O": {
          "O.AES": 7,
          "O.CUST_RECONF_PLAIN": 6,
          "O.E": 1,
          "O.EEPROM_INTEGRITY": 4,
          "O.F": 1,
          "O.FM_FW": 8,
          "O.MEM_ACCESS": 10,
          "O.PUF": 6,
          "O.RND": 3,
          "O.SFR_": 1,
          "O.SFR_ACCESS": 8,
          "O.TDES": 7
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0084-2014": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 3,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 11,
          "ADV_IMP": 1,
          "ADV_IMP.2": 3,
          "ADV_INT.3": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 3,
          "ALC_CMC.4": 3,
          "ALC_CMC.5": 4,
          "ALC_CMS": 3,
          "ALC_CMS.4": 3,
          "ALC_CMS.5": 5,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 6,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 3,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 1,
          "EAL4 augmented": 1,
          "EAL4+": 2,
          "EAL6": 44,
          "EAL6 augmented": 5,
          "EAL6+": 11
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 17,
          "FCS_CKM.1.1": 1,
          "FCS_CKM.2": 2,
          "FCS_CKM.4": 44,
          "FCS_CKM.4.1": 3,
          "FCS_COP.1": 42,
          "FCS_COP.1.1": 4,
          "FCS_RNG.1": 8,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 35,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 32,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 14,
          "FDP_ITC.2": 14,
          "FDP_ITT.1": 6,
          "FDP_SDC.1": 16,
          "FDP_SDC.1.1": 2,
          "FDP_SDI.1": 5,
          "FDP_SDI.2": 36,
          "FDP_SDI.2.1": 5,
          "FDP_SDI.2.2": 5
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 4,
          "FMT_MSA.1": 26,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 22,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 20,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 5
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 8
        },
        "FRU": {
          "FRU_FLT.2": 8
        }
      },
      "certification_process": {},
      "cipher_mode": {
        "CBC": {
          "CBC": 4
        },
        "ECB": {
          "ECB": 6
        }
      },
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 1,
          "SmartMX2": 13
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {
        "MAC": {
          "MAC": 4
        }
      },
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 14
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 2,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 11,
          "Physical Probing": 2,
          "physical probing": 1,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 2
        },
        "CC": {
          "CCMB-2017-04-001": 2,
          "CCMB-2017-04-002": 2,
          "CCMB-2017-04-003": 2,
          "CCMB-2017-04-004": 2
        },
        "FIPS": {
          "FIPS 197": 3,
          "FIPS PUB 197": 2
        },
        "ISO": {
          "ISO/IEC 14443": 20,
          "ISO/IEC 7816": 28,
          "ISO/IEC 9797-1": 1
        },
        "NIST": {
          "NIST SP 800-38A": 3,
          "NIST SP 800-67": 4
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 81
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 1,
            "TDES": 45,
            "Triple-DES": 19
          },
          "DES": {
            "DEA": 1,
            "DES": 8
          }
        },
        "constructions": {
          "MAC": {
            "CBC-MAC": 1
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 204,
          "NXP Semiconductors": 140,
          "NXP Semiconductors N.V": 1
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/Keywords": "CC, Security Target, P6022P VB, P6022X VB, P6022M VB, P6022D VB, P6022J VB",
      "/Subject": "NXP Secure Smart Card Controller P6022y VB",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 1313917,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.nxp.com/",
          "mailto:salesaddresses@nxp.com"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 99
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SECURITY_IC_AUGP_V1.0",
            "BAROC_SC_PP_V1.0",
            "JAVA_OC"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf",
        "pp_name": "Security IC Platform Protection Profile with Augmentation Packages"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/1059V5a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ALC_FLR.1",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/1059V5b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "2b94a8e5f95df23eecef0cc9664bf4618f28a31e5ed7fbb46d13586d7b5347e0",
      "txt_hash": "a2311dc8cc7ab3fa103f285756dc4fbebde7656612231e2b09fc930da8e4e35b"
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "10ebadd0839301a76c7511755cf84d6293f908bb07476b6009b939fbc3e1d014",
      "txt_hash": "2538cfa3d05933577fc4da9c6ca31724d51d5d219756f1aca2e9ef4334ac9b83"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "830776385e6ff2d22602e111d0c4c5fe29197bc77a54d8398e3bc7e9181d29c0",
      "txt_hash": "47d1701783430d7c83504661004f7572b1854d73c62c8531fb8fabfea7ca7c5c"
    }
  },
  "status": "active"
}