NXP JCOP 3 P60

CSV information ?

Status active
Valid from 23.07.2021
Valid until 23.07.2026
Scheme 🇳🇱 NL
Manufacturer NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_DVS.2, ALC_FLR.1, ASE_TSS.2, AVA_VAN.5, EAL5+
Protection profiles

Heuristics summary ?

Certificate ID: NSCIB-CC-98209-CR5

Certificate ?

Certification report ?

Extracted keywords

File metadata

Title: Certification Report
Author: Microsoft Office User
Creation date: D:20210726132122+01'00'
Modification date: D:20210726132122+01'00'
Pages: 14
Creator: Microsoft® Word 2010
Producer: Microsoft® Word 2010

Frontpage

Certificate ID: NSCIB-CC-98209-CR5
Certified item: JCOP 3 P60
Certification lab: Brightsight B.V.
Developer: NXP Semiconductors GmbH

References

Security target ?

Extracted keywords

File metadata

Title: Security Target Lite
Subject: JCOP 3 P60
Keywords: ASE, JCOP, Common Criteria, EAL5 augmented
Author: NXP B.V.
Creation date: D:20210723103654+01'00'
Pages: 134
Creator: DITA Open Toolkit 3.3.1
Producer: Apache FOP Version 2.3

References

Heuristics ?

Certificate ID: NSCIB-CC-98209-CR5

References ?

No references are available for this certificate.

Updates ?

  • 23.02.2022 The certificate became unavailable, either the certification report or the security target was unavailable during processing.
    Certificate removed

    A Common Criteria certificate for a product named NXP JCOP 3 P60 is not available. This means that either its certification report or security target could not be downloaded during processing.

  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {'cert_id': 'NSCIB-CC-98209-CR5', 'cert_item': 'JCOP 3 P60', 'developer': 'NXP Semiconductors GmbH', 'cert_lab': ' Brightsight B.V.'}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['3']}.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 3.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['ANSSI-CC-PP-2010-03', 'JCSPPC', 'ANSSI-CC-PP-2001-03-M01']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP JCOP 3 P60 was processed.

Raw data

{
  "_type": "CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-certificate%2021-98209.pdf",
  "dgst": "af86594cd7aaf6d4",
  "heuristics": {
    "_type": "CCHeuristics",
    "cert_id": "NSCIB-CC-98209-CR5",
    "cert_lab": null,
    "cpe_matches": null,
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "3"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP JCOP 3 P60",
  "not_valid_after": "2026-07-23",
  "not_valid_before": "2021-07-23",
  "pdf_data": {
    "_type": "PdfData",
    "report_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {
        "cert_id": "NSCIB-CC-98209-CR5",
        "cert_item": "JCOP 3 P60",
        "cert_lab": " Brightsight B.V.",
        "developer": "NXP Semiconductors GmbH"
      }
    },
    "report_keywords": {
      "rules_IC_data_groups": {},
      "rules_block_cipher_modes": {
        "CBC": 3,
        "ECB": 3
      },
      "rules_cc_claims": {},
      "rules_cert_id": {
        "BSI-DSZ-CC-1059-V4-2021": 2,
        "NSCIB-CC-15-67206-CR3": 1,
        "NSCIB-CC-67206-CR5": 1,
        "NSCIB-CC-98209-CR5": 14
      },
      "rules_certification_process": {},
      "rules_cplc": {},
      "rules_crypto_algs": {
        "3DES": 2,
        "AES": 3,
        "DES": 5,
        "DH": 1,
        "Diffie-Hellman": 1,
        "ECC": 7,
        "ECDH": 1,
        "ECDSA": 1,
        "HMAC": 1,
        "PACE": 1,
        "RNG": 2,
        "SHA-1": 2,
        "SHA-224": 2,
        "SHA-256": 2,
        "SHA-384": 2,
        "SHA-512": 2,
        "TRNG": 1
      },
      "rules_crypto_engines": {
        "SmartMX2": 2
      },
      "rules_crypto_libs": {},
      "rules_defenses": {
        "DFA": 1,
        "DPA": 1,
        "side-channel": 1
      },
      "rules_device_id": {},
      "rules_ecc_curves": {},
      "rules_javacard": {
        "Global Platform (version 2.2.1": 1,
        "Global Platform 2.2.1": 2,
        "Java Card 3.0.4": 1
      },
      "rules_javacard_api_consts": {},
      "rules_javacard_packages": {},
      "rules_os": {
        "JCOP 3": 17,
        "JCOP3": 1
      },
      "rules_other": {
        "library": 6
      },
      "rules_protection_profiles": {},
      "rules_security_assurance_components": {
        "ADV_IMP": 1,
        "ALC_DVS.2": 2,
        "ALC_FLR.1": 1,
        "ASE_TSS.2": 2,
        "AVA_VAN": 1,
        "AVA_VAN.5": 3
      },
      "rules_security_functional_components": {},
      "rules_security_level": {
        "EAL 5": 1,
        "EAL 5 augmented": 1,
        "EAL4": 1,
        "EAL5": 1,
        "EAL5 augmented": 1,
        "EAL5+": 3,
        "EAL6+": 1
      },
      "rules_standard_id": {
        "ISO/IEC 14443": 4,
        "ISO/IEC 7816": 4
      },
      "rules_technical_reports": {},
      "rules_vendor": {
        "NXP": 12
      },
      "rules_vulnerabilities": {}
    },
    "report_metadata": {
      "/Author": "Microsoft Office User",
      "/CreationDate": "D:20210726132122+01\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word 2010",
      "/ModDate": "D:20210726132122+01\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word 2010",
      "/Title": "Certification Report",
      "pdf_file_size_bytes": 761147,
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 14
    },
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "rules_IC_data_groups": {},
      "rules_block_cipher_modes": {
        "CBC": 5,
        "ECB": 2
      },
      "rules_cc_claims": {
        "A.ALARM": 3,
        "A.APPLET": 9,
        "A.APPS-": 1,
        "A.APPS-PROVIDER": 9,
        "A.CARD-MANAGEMENT": 2,
        "A.CIPHER": 3,
        "A.CONFID-APPLI-DATA": 3,
        "A.CONFID-JCS-CODE": 3,
        "A.CONFID-JCS-DATA": 3,
        "A.DELETION": 3,
        "A.EXE-": 1,
        "A.EXE-APPLI-CODE": 4,
        "A.EXE-JCS-CODE": 3,
        "A.EXT-MNGT": 2,
        "A.FIREWALL": 3,
        "A.INSTALL": 3,
        "A.INTEG-APPLI-CODE": 4,
        "A.INTEG-APPLI-DATA": 4,
        "A.INTEG-JCS-CODE": 3,
        "A.INTEG-JCS-DATA": 3,
        "A.KEY-MNGT": 3,
        "A.LOAD": 6,
        "A.NATIVE": 5,
        "A.OBJ-DELETION": 4,
        "A.OPERATE": 3,
        "A.PIN-MNGT": 3,
        "A.PROCESS-SEC-IC": 9,
        "A.RESOURCES": 4,
        "A.SCP": 6,
        "A.SID": 4,
        "A.TRANSACTION": 3,
        "A.USE_DIAG": 10,
        "A.USE_KEYS": 10,
        "A.VERIFICATION": 11,
        "A.VERIFICATION-AUTHORITY": 10,
        "D.ADMIN_CONF_DATA": 1,
        "D.API_": 1,
        "D.API_DATA": 2,
        "D.APP_": 3,
        "D.APP_CODE": 5,
        "D.APP_C_": 1,
        "D.APP_C_DATA": 4,
        "D.APP_I_": 2,
        "D.APP_I_DATA": 4,
        "D.APP_KEYS": 9,
        "D.APSD_KEYS": 3,
        "D.CARD_MNGT_DATA": 3,
        "D.CRYPTO": 6,
        "D.GP_CODE": 1,
        "D.ISD_KEYS": 4,
        "D.JCS_": 1,
        "D.JCS_CODE": 3,
        "D.JCS_DATA": 4,
        "D.PERSO_CONF_DATA": 1,
        "D.PIN": 10,
        "D.SEC_DATA": 6,
        "D.TSF_KEYS": 2,
        "D.VASD_KEYS": 3,
        "O.APPLET": 16,
        "O.CODE_PKG": 12,
        "O.CONFIG-ITEM": 7,
        "O.CONFIG-SERVICE": 2,
        "O.DELETION": 4,
        "O.EXT-MEM": 1,
        "O.EXT_": 4,
        "O.EXT_MEM_IN": 2,
        "O.EXT_MEM_IN-STANCE": 2,
        "O.EXT_MEM_INSTANCE": 4,
        "O.INSTALL": 3,
        "O.JAVAOBJECT": 54,
        "O.LOAD": 4,
        "O.NON_": 1,
        "O.NON_SB_": 1,
        "O.NON_SB_SFR": 3,
        "O.PUF": 1,
        "O.REMOTE": 1,
        "O.SB_SFR": 5,
        "OE.APPLET": 8,
        "OE.APPS-PROVIDER": 6,
        "OE.CARD-MANAGEMENT": 3,
        "OE.CODE-EVIDENCE": 22,
        "OE.KEY-": 1,
        "OE.KEY-CHANGE": 6,
        "OE.PROCESS_SEC_IC": 6,
        "OE.SCP.IC": 4,
        "OE.SCP.RECOVERY": 4,
        "OE.SCP.SUPPORT": 4,
        "OE.SECURITY-DOMAINS": 6,
        "OE.USE_DIAG": 7,
        "OE.USE_KEYS": 7,
        "OE.VERIFICATION": 30,
        "OE.VERIFICATION-AUTHORITY": 5,
        "OE.VERIFICATION_AUTHORITY": 1,
        "OP.ARRAY_ACCESS": 4,
        "OP.CREATE": 7,
        "OP.CREATE_EXT_MEM_": 1,
        "OP.CREATE_EXT_MEM_INSTANCE": 2,
        "OP.DELETE_": 2,
        "OP.DELETE_AP-": 1,
        "OP.DELETE_APPLET": 2,
        "OP.DELETE_PCKG": 2,
        "OP.DELETE_PCKG_APPLET": 3,
        "OP.INSTANCE_": 2,
        "OP.INSTANCE_FIELD": 2,
        "OP.INVK_": 2,
        "OP.INVK_INTER-": 1,
        "OP.INVK_INTERFACE": 4,
        "OP.INVK_VIRTUAL": 6,
        "OP.JAVA": 5,
        "OP.MODIFY_CON-": 1,
        "OP.MODIFY_CONFIG_": 1,
        "OP.MODIFY_CONFIG_ITEM": 2,
        "OP.PUT": 6,
        "OP.READ_": 1,
        "OP.READ_CON-FIG_ITEM": 1,
        "OP.READ_CONFIG_ITEM": 2,
        "OP.READ_EXT_": 1,
        "OP.READ_EXT_MEM": 2,
        "OP.SB_AC-CESS": 1,
        "OP.SB_ACCESS": 3,
        "OP.SB_ACCESS_SFR": 4,
        "OP.SECURE_": 1,
        "OP.SECURE_CARD": 3,
        "OP.THROW": 5,
        "OP.TYPE_ACCESS": 5,
        "OP.USE_CONFIG_ITEM": 3,
        "OP.WRITE_EXT_": 1,
        "OP.WRITE_EXT_MEM": 2,
        "OSP.KEY-CHANGE": 10,
        "OSP.PROCESS-TOE": 9,
        "OSP.SECURE-BOX": 9,
        "OSP.SECURITY-DOMAINS": 9,
        "OSP.VERIFICATION": 7,
        "OT.ALARM": 21,
        "OT.APPLI-AUTH": 15,
        "OT.CARD-": 2,
        "OT.CARD-MANAGEMENT": 38,
        "OT.CIPHER": 9,
        "OT.COMM_AUTH": 11,
        "OT.COMM_CONFIDENTIALITY": 9,
        "OT.COMM_INTEGRITY": 11,
        "OT.CONFIG-LIMIT": 9,
        "OT.DOMAIN-RIGHTS": 13,
        "OT.EXT-MEM": 17,
        "OT.FIREWALL": 19,
        "OT.GLOBAL_ARRAYS_CONFID": 7,
        "OT.GLOBAL_ARRAYS_INTEG": 9,
        "OT.IDENTIFICATION": 10,
        "OT.KEY-MNGT": 9,
        "OT.NATIVE": 13,
        "OT.OBJ-DELETION": 7,
        "OT.OPERATE": 31,
        "OT.PIN-MNGT": 9,
        "OT.REALLOCATION": 9,
        "OT.RESOURCES": 9,
        "OT.RND": 10,
        "OT.SCP.IC": 12,
        "OT.SCP.RECOVERY": 22,
        "OT.SCP.SUPPORT": 22,
        "OT.SEC_BOX_FW": 9,
        "OT.SID": 17,
        "OT.TRANSACTION": 9,
        "SA.ALARM": 3,
        "SA.CARD-MANAGEMENT": 2,
        "SA.CIPHER": 3,
        "SA.CONFID-APPLI-DATA": 3,
        "SA.CONFID-JCS-CODE": 3,
        "SA.CONFID-JCS-DATA": 3,
        "SA.DELETION": 2,
        "SA.EXE-": 1,
        "SA.EXE-APPLI-CODE": 4,
        "SA.EXE-JCS-CODE": 3,
        "SA.EXT-MNGT": 2,
        "SA.FIREWALL": 3,
        "SA.INSTALL": 3,
        "SA.INTEG-APPLI-CODE": 4,
        "SA.INTEG-APPLI-DATA": 4,
        "SA.INTEG-JCS-CODE": 3,
        "SA.INTEG-JCS-DATA": 3,
        "SA.KEY-MNGT": 3,
        "SA.NATIVE": 5,
        "SA.OBJ-DELETION": 4,
        "SA.OPERATE": 3,
        "SA.PIN-MNGT": 3,
        "SA.RESOURCES": 4,
        "SA.SCP": 6,
        "SA.SID": 4,
        "SA.TRANSACTION": 3,
        "SA.VERIFICATION": 4,
        "T.ALARM": 21,
        "T.APPLI-AUTH": 15,
        "T.CARD-": 2,
        "T.CARD-MANAGEMENT": 38,
        "T.CIPHER": 9,
        "T.COMM_AUTH": 11,
        "T.COMM_CONFIDENTIALITY": 9,
        "T.COMM_INTEGRITY": 11,
        "T.COM_EXPLOIT": 8,
        "T.CONFID-APPLI-DATA": 6,
        "T.CONFID-JCS-CODE": 6,
        "T.CONFID-JCS-DATA": 6,
        "T.CONFIG": 8,
        "T.CONFIG-LIMIT": 9,
        "T.DELETION": 2,
        "T.DOMAIN-RIGHTS": 13,
        "T.EXE-CODE-REMOTE": 1,
        "T.EXT-MEM": 17,
        "T.FIREWALL": 19,
        "T.GLOBAL_ARRAYS_CONFID": 7,
        "T.GLOBAL_ARRAYS_INTEG": 9,
        "T.IDENTIFICATION": 10,
        "T.INSTALL": 2,
        "T.INTEG-APPLI-": 1,
        "T.INTEG-APPLI-CODE": 6,
        "T.INTEG-APPLI-CODE.LOAD": 6,
        "T.INTEG-APPLI-DATA": 2,
        "T.INTEG-APPLI-DATA.LOAD": 6,
        "T.INTEG-JCS-CODE": 6,
        "T.INTEG-JCS-DATA": 6,
        "T.KEY-MNGT": 9,
        "T.LIFE_CYCLE": 8,
        "T.NATIVE": 19,
        "T.OBJ-DELETION": 13,
        "T.OPERATE": 31,
        "T.OS_OPERATE": 8,
        "T.PHYSICAL": 6,
        "T.PIN-MNGT": 9,
        "T.REALLOCATION": 9,
        "T.RESOURCES": 15,
        "T.RND": 18,
        "T.SCP.IC": 12,
        "T.SCP.RECOVERY": 22,
        "T.SCP.SUPPORT": 22,
        "T.SEC_BOX_FW": 9,
        "T.SID": 17,
        "T.TRANSACTION": 9,
        "T.UNAUTHORIZED_CARD_MNGT": 8
      },
      "rules_cert_id": {
        "NSCIB-CC-67206-CR3": 1,
        "NSCIB-CC-98209": 2
      },
      "rules_certification_process": {
        ". Component of the TOE 1 MIFARE is out of scope of the certified Micro Controller": 1,
        "134 NXP Semiconductors JCOP 3 P60 Security Target Lite Figure 1. Component of the TOE 1 MIFARE is out of scope of the certified Micro Controller. Figure 1.1 also shows applets and the Secure Box Native Library": 1,
        "cro Controller, called MC FW including MIFARE implementations, where the MIFARE implementations are out of scope of the certified Micro Controller. \u2022 Software for implementing cryptographic operations on the": 1,
        "out of scope": 2
      },
      "rules_cplc": {},
      "rules_crypto_algs": {
        "3DES": 3,
        "AES": 16,
        "DES": 6,
        "DH": 3,
        "Diffie-Hellman": 4,
        "ECC": 5,
        "ECDH": 1,
        "ECDSA": 2,
        "PACE": 1,
        "RND": 18,
        "RNG": 25,
        "SHA-1": 1,
        "SHA-224": 1,
        "SHA-256": 1,
        "SHA-384": 1,
        "SHA-512": 1,
        "TRNG": 2
      },
      "rules_crypto_engines": {
        "SmartMX2": 3
      },
      "rules_crypto_libs": {
        "Crypto Library ..........7": 1,
        "Crypto Library 1.3.1.3": 1
      },
      "rules_defenses": {
        "DFA": 2,
        "DPA": 3,
        "Fault Injection": 2,
        "Physical Tampering": 3,
        "SPA": 2,
        "fault injection": 1,
        "malfunction": 3,
        "physical probing": 2,
        "physical tampering": 1,
        "side channel": 2,
        "side-channel": 1,
        "timing attack": 1,
        "timing attacks": 1
      },
      "rules_device_id": {},
      "rules_ecc_curves": {},
      "rules_javacard": {
        "GlobalPlatform 2.2.1": 1,
        "Java Card 3.0.4": 1
      },
      "rules_javacard_api_consts": {
        "ALG_AES_BLOCK_128_CBC_": 1,
        "ALG_AES_BLOCK_128_ECB_NOPAD": 1,
        "ALG_AES_CMAC16": 1,
        "ALG_AES_MAC_128_NOPAD": 1,
        "ALG_DES_CBC_ISO9797_M1": 1,
        "ALG_DES_CBC_NOPAD": 1,
        "ALG_DES_ECB_ISO9797_": 1,
        "ALG_DES_ECB_ISO9797_M2": 1,
        "ALG_DES_ECB_NOPAD": 1,
        "ALG_DES_MAC8_ISO9797_1_M1_ALG3": 1,
        "ALG_DES_MAC8_ISO9797_1_M2_": 1,
        "ALG_DES_MAC8_ISO9797_M1": 1,
        "ALG_DES_MAC8_ISO9797_M2": 1,
        "ALG_ECDSA_SHA_": 1,
        "ALG_ECDSA_SHA_256": 2,
        "ALG_ECDSA_SHA_384": 1,
        "ALG_ECDSA_SHA_512": 1,
        "ALG_EC_SVDP_DH": 1,
        "ALG_EC_SVDP_DHC": 1,
        "ALG_EC_SVDP_DHC_PLAIN": 1,
        "ALG_EC_SVDP_DH_PLAIN": 1,
        "ALG_PSEUDO_RANDOM": 1,
        "ALG_RSA_NOPAD": 1,
        "ALG_RSA_PKCS1_OAEP": 1,
        "ALG_RSA_SHA_": 1,
        "ALG_RSA_SHA_224_PKCS1_PSS": 1,
        "ALG_RSA_SHA_256_ISO9796": 1,
        "ALG_RSA_SHA_256_PKCS1": 1,
        "ALG_RSA_SHA_256_PKCS1_PSS": 1,
        "ALG_RSA_SHA_384_PKCS1": 1,
        "ALG_RSA_SHA_512_PKCS1": 1,
        "ALG_RSA_SHA_512_PKCS1_PSS": 1,
        "ALG_RSA_SHA_ISO9796": 1,
        "ALG_RSA_SHA_PKCS1": 1,
        "ALG_SECURE_RANDOM": 1,
        "ALG_SHA_224": 2,
        "ALG_SHA_256": 2,
        "ALG_SHA_384": 3,
        "ALG_SHA_512": 2,
        "CIPHER_ECDSA": 1,
        "CIPHER_RSA": 1,
        "LENGTH_AES_128": 2,
        "LENGTH_AES_192": 2,
        "LENGTH_AES_256": 3,
        "LENGTH_DES3_2KEY": 2,
        "LENGTH_DES3_3KEY": 1,
        "LENGTH_EC_": 2,
        "LENGTH_EC_FP_160": 4,
        "LENGTH_EC_FP_192": 3,
        "LENGTH_EC_FP_224": 3,
        "LENGTH_EC_FP_256": 5,
        "LENGTH_EC_FP_320": 3,
        "LENGTH_EC_FP_384": 3,
        "LENGTH_EC_FP_521": 3,
        "LENGTH_RSA_1024": 1,
        "LENGTH_RSA_2048": 1,
        "LENGTH_RSA_4096": 2,
        "LENGTH_SHA": 1,
        "LENGTH_SHA_224": 1,
        "LENGTH_SHA_256": 1,
        "LENGTH_SHA_384": 1,
        "PAD_PKCS1_OAEP": 1,
        "SIG_CIPHER_RSA": 1,
        "TYPE_ACCESS": 4
      },
      "rules_javacard_packages": {
        "javacard.security": 2,
        "javacardx.crypto": 1
      },
      "rules_os": {
        "JCOP 3": 282,
        "JCOP3": 5
      },
      "rules_other": {
        "library": 14
      },
      "rules_protection_profiles": {
        "BSI-CC-PP-0055": 1,
        "BSI-PP-0055": 1,
        "BSI-PP-0084": 1,
        "BSI-PP-0084-2014": 1
      },
      "rules_security_assurance_components": {
        "AGD_OPE.1": 2,
        "ALC_DVS.2": 4,
        "ALC_FLR.1": 2,
        "ASE_CCL": 2,
        "ASE_ECD": 1,
        "ASE_INT": 2,
        "ASE_REQ": 2,
        "ASE_SPD": 2,
        "ASE_TSS": 2,
        "ASE_TSS.2": 3,
        "AVA_VAN.5": 5
      },
      "rules_security_functional_components": {
        "FAU_ARP.1": 20,
        "FAU_ARP.1.1": 1,
        "FAU_GEN": 1,
        "FAU_SAA.1": 4,
        "FAU_SAS": 3,
        "FAU_SAS.1": 3,
        "FAU_SAS.1.1": 1,
        "FCO_NRO.1": 1,
        "FCS_CKM.1": 16,
        "FCS_CKM.1.1": 1,
        "FCS_CKM.2": 9,
        "FCS_CKM.2.1": 1,
        "FCS_CKM.3": 7,
        "FCS_CKM.3.1": 1,
        "FCS_CKM.4": 16,
        "FCS_CKM.4.1": 1,
        "FCS_COP.1": 12,
        "FCS_RNG": 3,
        "FCS_RNG.1": 9,
        "FCS_RNG.1.1": 2,
        "FCS_RNG.1.2": 2,
        "FDP_ACC.1": 41,
        "FDP_ACF.1": 12,
        "FDP_IFC.1": 31,
        "FDP_IFF.1": 4,
        "FDP_IFF.1.2": 1,
        "FDP_IFF.1.4": 1,
        "FDP_ITC.1": 8,
        "FDP_ITC.2": 8,
        "FDP_ROL.1": 2,
        "FDP_SDI.1": 1,
        "FDP_SDI.2": 6,
        "FDP_SDI.2.1": 1,
        "FDP_SDI.2.2": 1,
        "FIA_ATD.1": 2,
        "FIA_UAU.1": 4,
        "FIA_UID.1": 19,
        "FMT_MSA.1": 16,
        "FMT_MSA.3": 16,
        "FMT_MTD.1": 1,
        "FMT_SMF.1": 27,
        "FMT_SMF.1.1": 1,
        "FMT_SMR.1": 39,
        "FMT_SMR.1.1": 1,
        "FMT_SMR.1.2": 1,
        "FPR_UNO.1": 7,
        "FPR_UNO.1.1": 1,
        "FPT_FLS.1": 10,
        "FPT_FLS.1.1": 1,
        "FPT_PHP.3": 4,
        "FPT_PHP.3.1": 1,
        "FPT_RCV.2": 1,
        "FPT_TDC.1": 6,
        "FPT_TDC.1.1": 1,
        "FPT_TDC.1.2": 1,
        "FTP_ITC.1": 2,
        "FTP_TRP.1": 4
      },
      "rules_security_level": {
        "EAL5": 8,
        "EAL5 augmented": 2
      },
      "rules_standard_id": {
        "AIS 20": 1,
        "CCMB-2012-09-001": 1,
        "CCMB-2012-09-002": 1,
        "CCMB-2012-09-004": 1,
        "FIPS 197": 2,
        "ICAO": 5,
        "ISO/IEC 14443": 1,
        "ISO/IEC 14888-3": 1,
        "PKCS1": 7,
        "SCP01": 1,
        "SCP02": 1,
        "SCP03": 1
      },
      "rules_technical_reports": {},
      "rules_vendor": {
        "NXP": 308
      },
      "rules_vulnerabilities": {}
    },
    "st_metadata": {
      "/Author": "NXP B.V.",
      "/CreationDate": "D:20210723103654+01\u002700\u0027",
      "/Creator": "DITA Open Toolkit 3.3.1",
      "/Keywords": "ASE, JCOP, Common Criteria, EAL5 augmented",
      "/Producer": "Apache FOP Version 2.3",
      "/Subject": "JCOP 3 P60",
      "/Title": "Security Target Lite",
      "pdf_file_size_bytes": 1283021,
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 134
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "ProtectionProfile",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "ANSSI-CC-PP-2001-03-M01",
            "JCSPPC",
            "ANSSI-CC-PP-2010-03"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf",
        "pp_name": "Java Card\u2122 System Protection Profile Open Configuration, Version 3.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-98209_5-CR5.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "ASE_TSS.2",
      "ALC_FLR.1",
      "AVA_VAN.5",
      "ALC_DVS.2",
      "EAL5+"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/NSCIB-CC-98209_5-STLite.pdf",
  "state": {
    "_type": "InternalState",
    "errors": [],
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true
  },
  "status": "active"
}