Philips Secure Smart Card Controller P5CD009V2A and P5CC009V2A each
CSV information ?
Status | archived |
---|---|
Valid from | 23.05.2006 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | Philips Semiconductors GmbH |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_DVS.2, AVA_VLA.4, AVA_MSU.3, EAL5+ |
Maintenance updates | NXP Smart Card Controller P5CD009V2A and P5CC009V2A each with IC Dedicated Software (22.06.2009) Certification report |
NXP Smart Card Controller P5CD009V2C and P5CC009V2C each with IC dedicated software (23.06.2009) Certification report Security target | |
NXP Secure Smart Card Controller P5CD009V2C and P5CC009V2C each with specific IC Dedicated Software (03.02.2011) Certification report Security target |
Heuristics summary ?
Certification report ?
Extracted keywords
Symmetric Algorithms
DES, DEA, Triple-DES, TDEARandomness
RNGEngines
SmartMXVendor
PhilipsSecurity level
EAL4, EAL 5, EAL 1, EAL 7, EAL 4, EAL5, EAL5+, EAL1, EAL3, EAL7, EAL2, EAL6, EAL 5 augmented, EAL5 augmentedClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ACM_SCP.3, ACM_AUT.1, ACM_CAP.4, ACM_AUT, ACM_CAP, ACM_SCP, ADO_DEL.2, ADO_IGS.1, ADO_DEL, ADO_IGS, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_RCR.2, ADV_SPM.3, ADV_LLD.1, ADV_FSP, ADV_HLD, ADV_IMP, ADV_INT, ADV_LLD, ADV_RCR, ADV_SPM, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_FLR, ALC_LCD, ALC_TAT, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_MSU.3, AVA_VLA.4, AVA_CCA.1, AVA_SOF.1, AVA_CCA, AVA_MSU, AVA_SOF, AVA_VLA, AVA_VLA.2, AVA_VLA.3, ASE_DES.1, ASE_ENV.1, ASE_INT.1, ASE_OBJ.1, ASE_PPC.1, ASE_REQ.1, ASE_SRE.1, ASE_TSS.1Security Functional Requirements (SFR)
FAU_SAS.1, FCS_COP.1, FCS_RND.1, FCS_CKM.1, FCS_CKM.4, FDP_ACC.1, FDP_ACF.1, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FMT_MSA.1, FMT_MSA.3, FMT_SMF.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_SMR.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001, BSI-PP- 0002-2001, BSI-PP-0002-Certificates
BSI-DSZ-CC-0360-2006, BSI-DSZ-CC-0231-2004Certification process
of Philips P5CD009V2A and P5CC009V2A Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0360, Version 1.0, 13 March 2006, Evaluation of Philips, Technical Report, Philips P5CD009V2A Secure Smart Card Controller, Version 1.1, 11. May 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German, according to AIS 36, Version 1.1, 11. May 2006 for Philips P5CD009V2A Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CD009V2A and P5CD009V2B, Version 1.0, Semiconductors, 20 February 2006 (confidential document) [12] Data Sheet, P5CD009V2, SmartMX, Secure Smart Card Controller, Product Specification, Philips, Revision 3.5, February 16th, 2006 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD, for the P5CD009V2A/B, BSI-DSZ-CC-0360/0361, Version 1.0, Philips Semiconductors, March 29th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification, Card Controller, Product Specification, Philips Semiconductors, Revision 3.5, February 16th, 2006 (confidential document) B-26 BSI-DSZ-CC-0360-2006 Certification Report C Excerpts from the Criteria CC Part 1: Caveats onSide-channel analysis
physical probing, Physical Probing, side channel, timing attacks, physical tampering, MalfunctionCertification process
of Philips P5CD009V2A and P5CC009V2A Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0360, Version 1.0, 13 March 2006, Evaluation of Philips, Technical Report, Philips P5CD009V2A Secure Smart Card Controller, Version 1.1, 11. May 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German, according to AIS 36, Version 1.1, 11. May 2006 for Philips P5CD009V2A Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CD009V2A and P5CD009V2B, Version 1.0, Semiconductors, 20 February 2006 (confidential document) [12] Data Sheet, P5CD009V2, SmartMX, Secure Smart Card Controller, Product Specification, Philips, Revision 3.5, February 16th, 2006 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD, for the P5CD009V2A/B, BSI-DSZ-CC-0360/0361, Version 1.0, Philips Semiconductors, March 29th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification, Card Controller, Product Specification, Philips Semiconductors, Revision 3.5, February 16th, 2006 (confidential document) B-26 BSI-DSZ-CC-0360-2006 Certification Report C Excerpts from the Criteria CC Part 1: Caveats onStandards
FIPS PUB 46-3, AIS 34, AIS 32, AIS 36, AIS 25, AIS 26, AIS 31, ISO/IEC 15408:1999, ISO/IEC15408: 1999Technical reports
BSI 7125, BSI 7148, BSI 7149File metadata
Title: | Certification Report BSI-DSZ-CC-0360-2006 |
---|---|
Keywords: | Common Criteria, Certification, Zertifizierung |
Author: | Bundesamt für Sicherheit in der Informationstechnik |
Creation date: | D:20060619104913+02'00' |
Modification date: | D:20060619110537+02'00' |
Pages: | 48 |
Creator: | Acrobat PDFMaker 7.0.7 für Word |
Producer: | Acrobat Distiller 7.0.5 (Windows) |
Frontpage
Certificate ID: | BSI-DSZ-CC-0360-2006 |
---|---|
Certified item: | Philips Secure Smart Card Controller P5CD009V2A and P5CC009V2A each with specific IC Dedicated Software |
Certification lab: | BSI |
Developer: | Philips Semiconductors GmbH Business Line Identification |
References
Outgoing- BSI-DSZ-CC-0231-2004 - Philips P5CC009VOM Secure Smart Card Controller
- BSI-DSZ-CC-0361-2006 - Philips Secure Smart Card Controller P5CD009V2B with specific IC Dedicated Software
Security target ?
Extracted keywords
Symmetric Algorithms
DES, DEA, Triple-DES, TDEA, Triple-DEAAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMXVendor
PhilipsSecurity level
EAL5, EAL 5, EAL4, EAL5+, EAL4+, EAL5 augmented, EAL 5 augmented, EAL4 augmentedClaims
O.RND, O.MF_FW, O.MEM_ACCESS, O.SFR_ACCESS, O.CONFIG, T.RNDSecurity Assurance Requirements (SAR)
ACM_AUT.1, ACM_CAP.4, ACM_SCP.3, ACM_SCP.2, ACM_SCP, ACM_AUT, ACM_CAP, ADO_DEL.2, ADO_IGS.1, ADO_IGS, ADO_DEL, ADV_FSP.3, ADV_HLD.3, ADV_IMP.2, ADV_INT.1, ADV_LLD.1, ADV_RCR.2, ADV_SPM.3, ADV_FSP.2, ADV_FSP, ADV_RCR, ADV_SPM, ADV_HLD, ADV_LLD, ADV_INT, ADV_IMP, AGD_ADM.1, AGD_USR.1, AGD_ADM, AGD_USR, ALC_DVS.2, ALC_LCD.2, ALC_TAT.2, ALC_DVS, ALC_LCD, ALC_TAT, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VLA.4, AVA_CCA.1, AVA_MSU.3, AVA_SOF.1, AVA_MSUSecurity Functional Requirements (SFR)
FAU_SAS.1, FCS_RND.1, FCS_RND.1.1, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FCS_CKM, FDP_IFC.1, FDP_ITT.1, FDP_ITC.1, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_ITT.1, FPT_PHP.3, FPT_SEP.1, FPT_SEP.1.1, FPT_SEP.1.2, FPT_AMT.1, FRU_FLT.2Protection profiles
BSI-PP-0002-2001Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 46, AIS31File metadata
Title: | Security Target |
---|---|
Author: | HGA |
Creation date: | D:20060313182037+01'00' |
Modification date: | D:20060313182242+01'00' |
Pages: | 79 |
Creator: | Acrobat PDFMaker 6.0 for Word |
Producer: | Acrobat Distiller 6.0 (Windows) |
References
OutgoingHeuristics ?
Extracted SARs
ALC_LCD.2, ADV_FSP.3, AGD_USR.1, ASE_TSS.1, ATE_FUN.1, AVA_CCA.1, ASE_SRE.1, ADV_RCR.2, AGD_ADM.1, ASE_INT.1, ADV_SPM.3, ADV_HLD.3, ASE_OBJ.1, ADV_INT.1, ADV_IMP.2, AVA_VLA.4, ASE_DES.1, ADV_LLD.1, ALC_TAT.2, ATE_DPT.2, ASE_PPC.1, AVA_SOF.1, ASE_ENV.1, ALC_DVS.2, ATE_IND.2, ASE_REQ.1, ATE_COV.2, AVA_MSU.3References ?
Updates ?
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2009-06-22', 'maintenance_title': 'NXP Smart Card Controller P5CD009V2A and P5CC009V2A each with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma1.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2009-06-23', 'maintenance_title': 'NXP Smart Card Controller P5CD009V2C and P5CC009V2C each with IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma2a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma2b.pdf'}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2011-02-03', 'maintenance_title': 'NXP Secure Smart Card Controller P5CD009V2C and P5CC009V2C each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma3a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma3b_pdf.pdf'}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
53a572abe2ca34da844e3e3b4d78083c781d93bf0f6b5114d4f608be6b2e1c6e
. - The st_txt_hash property was set to
c3144bc887652a82098f81ef7bb2da3673ed0e25f89a5b0271023bb8a2df6473
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 691723, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 79, '/ModDate': "D:20060313182242+01'00'", '/CreationDate': "D:20060313182037+01'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'HGA', '/Company': 'Philips Semiconductors BL ID', '/SourceModified': 'D:20060313171012', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 34, 'EAL 5': 4, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 4, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 6, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 4, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 2, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 5, 'FCS_RND.1.1': 1, 'FCS_COP.1': 13, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ACC.1': 33, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 15, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 8, 'O.SFR_ACCESS': 8, 'O.CONFIG': 6}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 110}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 29, 'DEA': 2}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 10}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0360b.pdf
.
- The st_download_ok property was set to
-
25.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0360b.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
53a572abe2ca34da844e3e3b4d78083c781d93bf0f6b5114d4f608be6b2e1c6e
. - The st_txt_hash property was set to
c3144bc887652a82098f81ef7bb2da3673ed0e25f89a5b0271023bb8a2df6473
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 691723, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 79, '/ModDate': "D:20060313182242+01'00'", '/CreationDate': "D:20060313182037+01'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'HGA', '/Company': 'Philips Semiconductors BL ID', '/SourceModified': 'D:20060313171012', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 34, 'EAL 5': 4, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 2, 'EAL4 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 4, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 6, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 4, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 2, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 5, 'FCS_RND.1.1': 1, 'FCS_COP.1': 13, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 3, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ACC.1': 33, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 30, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 22, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 14, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 15, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 8, 'O.SFR_ACCESS': 8, 'O.CONFIG': 6}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 110}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 29, 'DEA': 2}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 10}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 14, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 1, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 10, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0360b.pdf
.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0360b.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
- The st_download_ok property was set to
-
05.10.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The following values were inserted:
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '0360a.pdf', 'st_filename': '0360b.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0360-2006': 48}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL2': 3, 'EAL6': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_LCD': 1}}}}, 'cc_sfr': {'__update__': {'FDP': {'__update__': {'FDP_ACC.1': 3, 'FDP_ACF.1': 3}}}}, 'cc_claims': {'__update__': {'R': {'R.O': 1}}}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 3, 'DEA': 1}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__delete__': ['SPA', 'DPA']}}}, 'tee_name': {}, 'standard_id': {'__update__': {'FIPS': {'__update__': {'FIPS PUB 46-3': 3}}, 'BSI': {'__update__': {'AIS 36': 6}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'of Philips P5CD009V2A and P5CC009V2A Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0360, Version 1.0, 13 March 2006, Evaluation of Philips': 1, 'Technical Report, Philips P5CD009V2A Secure Smart Card Controller, Version 1.1, 11. May 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German': 1, 'Semiconductors, 20 February 2006 (confidential document) [12] Data Sheet, P5CD009V2, SmartMX, Secure Smart Card Controller, Product Specification, Philips': 1, 'Revision 3.5, February 16th, 2006 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD': 1}, '__delete__': ['aluation of Philips P5CD009V2A and P5CC009V2A Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0360, Version 1.0, 13 March 2006, Evaluation of Philips', 'ation Technical Report, Philips P5CD009V2A Secure Smart Card Controller, Version 1.1, 11. May 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German', 'Philips Semiconductors, 20 February 2006 (confidential document) [12] Data Sheet, P5CD009V2, SmartMX, Secure Smart Card Controller, Product Specification, Philips', 'Semiconductors, Revision 3.5, February 16th, 2006 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD ']}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4 augmented': 1}, '__update__': {'EAL 5': 4, 'EAL 5 augmented': 2}}}}, 'cc_sar': {'__update__': {'ACM': {'__update__': {'ACM_SCP.2': 4}}, 'ADV': {'__update__': {'ADV_FSP.3': 6, 'ADV_FSP.2': 4}}, 'AVA': {'__update__': {'AVA_SOF.1': 2}}}}, 'cc_sfr': {'__update__': {'FCS': {'__insert__': {'FCS_COP.1': 13}, '__update__': {'FCS_RND.1': 5, 'FCS_CKM.4': 3}}, 'FDP': {'__update__': {'FDP_ACC.1': 33, 'FDP_ACF.1': 30}}, 'FMT': {'__update__': {'FMT_MSA.3': 22, 'FMT_MSA.1': 29, 'FMT_SMR.1': 8, 'FMT_SMF.1': 14}}, 'FPT': {'__update__': {'FPT_SEP.1': 15}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.MEM_ACCESS': 8, 'O.CONFIG': 6}}}}, 'vendor': {'__update__': {'Philips': {'__update__': {'Philips': 110}}}}, 'eval_facility': {}, 'symmetric_crypto': {'__update__': {'DES': {'__update__': {'DES': {'__update__': {'DES': 29, 'DEA': 2}}}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 10}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'Leak-Inherent': 14, 'DPA': 1}, '__delete__': ['SPA']}, 'FI': {'__insert__': {'physical tampering': 1}, '__update__': {'Malfunction': 10}}}}}
data.
- The following values were inserted:
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 691723, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 79, '/ModDate': "D:20060313182242+01'00'", '/CreationDate': "D:20060313182037+01'00'", '/Title': 'Security Target', '/Creator': 'Acrobat PDFMaker 6.0 for Word', '/Producer': 'Acrobat Distiller 6.0 (Windows)', '/Author': 'HGA', '/Company': 'Philips Semiconductors BL ID', '/SourceModified': 'D:20060313171012', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
.
- The st_extract_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Maintenance Updates of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2011-02-03', 'maintenance_title': 'NXP Secure Smart Card Controller P5CD009V2C and P5CC009V2C each with specific IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma3a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma3b_pdf.pdf'}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2009-06-23', 'maintenance_title': 'NXP Smart Card Controller P5CD009V2C and P5CC009V2C each with IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma2a.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma2b.pdf'}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2009-06-22', 'maintenance_title': 'NXP Smart Card Controller P5CD009V2A and P5CC009V2A each with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0360_ma1.pdf', 'maintenance_st_link': None}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_LLD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_MSU', 'level': 3}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/c3dc8cfd97735115.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/c3dc8cfd97735115.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
values inserted. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0360-2006': 94, 'BSI-DSZ-CC-0231-2004': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3, 'BSI-PP- 0002-2001': 1, 'BSI-PP-0002-': 1}}, 'cc_security_level': {'EAL': {'EAL4': 10, 'EAL 5': 3, 'EAL 1': 1, 'EAL 7': 1, 'EAL 4': 1, 'EAL5': 8, 'EAL5+': 1, 'EAL1': 5, 'EAL2': 4, 'EAL3': 4, 'EAL6': 4, 'EAL7': 4, 'EAL 5 augmented': 2, 'EAL5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_SCP.3': 3, 'ACM_AUT.1': 2, 'ACM_CAP.4': 2, 'ACM_AUT': 2, 'ACM_CAP': 2, 'ACM_SCP': 2}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_DEL': 2, 'ADO_IGS': 2}, 'ADV': {'ADV_FSP.3': 2, 'ADV_HLD.3': 2, 'ADV_IMP.2': 2, 'ADV_INT.1': 2, 'ADV_RCR.2': 2, 'ADV_SPM.3': 2, 'ADV_LLD.1': 1, 'ADV_FSP': 2, 'ADV_HLD': 2, 'ADV_IMP': 2, 'ADV_INT': 2, 'ADV_LLD': 2, 'ADV_RCR': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_ADM.1': 1, 'AGD_USR.1': 1, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 6, 'ALC_LCD.2': 3, 'ALC_TAT.2': 3, 'ALC_DVS': 2, 'ALC_FLR': 2, 'ALC_LCD': 2, 'ALC_TAT': 2}, 'ATE': {'ATE_DPT.2': 2, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1, 'ATE_COV': 2, 'ATE_DPT': 2, 'ATE_FUN': 2, 'ATE_IND': 2}, 'AVA': {'AVA_MSU.3': 5, 'AVA_VLA.4': 6, 'AVA_CCA.1': 2, 'AVA_SOF.1': 1, 'AVA_CCA': 2, 'AVA_MSU': 2, 'AVA_SOF': 4, 'AVA_VLA': 4, 'AVA_VLA.2': 1, 'AVA_VLA.3': 1}, 'ASE': {'ASE_DES.1': 1, 'ASE_ENV.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.1': 1, 'ASE_PPC.1': 1, 'ASE_REQ.1': 1, 'ASE_SRE.1': 1, 'ASE_TSS.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 1}, 'FCS': {'FCS_COP.1': 2, 'FCS_RND.1': 1, 'FCS_CKM.1': 1, 'FCS_CKM.4': 1}, 'FDP': {'FDP_ACC.1': 2, 'FDP_ACF.1': 2, 'FDP_IFC.1': 1, 'FDP_ITT.1': 1, 'FDP_ITC.1': 1}, 'FMT': {'FMT_MSA.1': 3, 'FMT_MSA.3': 3, 'FMT_SMF.1': 1, 'FMT_LIM.1': 1, 'FMT_LIM.2': 1, 'FMT_MSA.2': 1, 'FMT_SMR.1': 1}, 'FPT': {'FPT_FLS.1': 1, 'FPT_ITT.1': 1, 'FPT_PHP.3': 1, 'FPT_SEP.1': 2}, 'FRU': {'FRU_FLT.2': 1}}, 'cc_claims': {'O': {'O.C': 1}, 'R': {'R.O.C': 1}}, 'vendor': {'Philips': {'Philips': 53}}, 'eval_facility': {}, 'symmetric_crypto': {'DES': {'DES': {'DES': 18, 'DEA': 3}, '3DES': {'Triple-DES': 11, 'TDEA': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 4}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 2, 'Physical Probing': 1, 'side channel': 1, 'SPA': 2, 'DPA': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 1, 'Malfunction': 1}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1, 'BSI 7149': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 2}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 2}, 'BSI': {'AIS 34': 3, 'AIS 32': 3, 'AIS 36': 5, 'AIS 25': 2, 'AIS 26': 3, 'AIS 31': 4}, 'ISO': {'ISO/IEC 15408:1999': 1, 'ISO/IEC15408: 1999': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'aluation of Philips P5CD009V2A and P5CC009V2A Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0360, Version 1.0, 13 March 2006, Evaluation of Philips': 1, 'ation Technical Report, Philips P5CD009V2A Secure Smart Card Controller, Version 1.1, 11. May 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German': 1, 'according to AIS 36, Version 1.1, 11. May 2006 for Philips P5CD009V2A Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CD009V2A and P5CD009V2B, Version 1.0': 1, 'Philips Semiconductors, 20 February 2006 (confidential document) [12] Data Sheet, P5CD009V2, SmartMX, Secure Smart Card Controller, Product Specification, Philips': 1, 'Semiconductors, Revision 3.5, February 16th, 2006 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD ': 1, 'for the P5CD009V2A/B, BSI-DSZ-CC-0360/0361, Version 1.0, Philips Semiconductors, March 29th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification': 1, 'Card Controller, Product Specification, Philips Semiconductors, Revision 3.5, February 16th, 2006 (confidential document) B-26 BSI-DSZ-CC-0360-2006 Certification Report C Excerpts from the Criteria CC Part 1: Caveats on': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0002-2001': 3}}, 'cc_security_level': {'EAL': {'EAL5': 34, 'EAL 5': 3, 'EAL4': 4, 'EAL5+': 1, 'EAL4+': 1, 'EAL5 augmented': 1, 'EAL 5 augmented': 1}}, 'cc_sar': {'ACM': {'ACM_AUT.1': 1, 'ACM_CAP.4': 2, 'ACM_SCP.3': 5, 'ACM_SCP.2': 3, 'ACM_SCP': 3, 'ACM_AUT': 1, 'ACM_CAP': 1}, 'ADO': {'ADO_DEL.2': 2, 'ADO_IGS.1': 2, 'ADO_IGS': 2, 'ADO_DEL': 2}, 'ADV': {'ADV_FSP.3': 5, 'ADV_HLD.3': 1, 'ADV_IMP.2': 1, 'ADV_INT.1': 1, 'ADV_LLD.1': 1, 'ADV_RCR.2': 1, 'ADV_SPM.3': 1, 'ADV_FSP.2': 3, 'ADV_FSP': 3, 'ADV_RCR': 4, 'ADV_SPM': 1, 'ADV_HLD': 1, 'ADV_LLD': 1, 'ADV_INT': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_ADM.1': 2, 'AGD_USR.1': 2, 'AGD_ADM': 2, 'AGD_USR': 2}, 'ALC': {'ALC_DVS.2': 2, 'ALC_LCD.2': 1, 'ALC_TAT.2': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.2': 2, 'ATE_DPT.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VLA.4': 3, 'AVA_CCA.1': 1, 'AVA_MSU.3': 1, 'AVA_SOF.1': 1, 'AVA_MSU': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RND.1': 4, 'FCS_RND.1.1': 1, 'FCS_COP.1.1': 1, 'FCS_CKM.1': 4, 'FCS_CKM.4': 4, 'FCS_CKM': 1}, 'FDP': {'FDP_IFC.1': 10, 'FDP_ITT.1': 6, 'FDP_ITC.1': 4, 'FDP_ACC.1': 11, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 10, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_SDI.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 3, 'FMT_MSA.2': 4, 'FMT_MSA.3': 6, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 11, 'FMT_SMR.1': 10, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 15, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_ITT.1': 6, 'FPT_PHP.3': 7, 'FPT_SEP.1': 1, 'FPT_SEP.1.1': 1, 'FPT_SEP.1.2': 1, 'FPT_AMT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.MF_FW': 8, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 8, 'O.CONFIG': 7}, 'T': {'T.RND': 2}}, 'vendor': {'Philips': {'Philips': 109}}, 'eval_facility': {'KSEL': {'KSEL': 1}}, 'symmetric_crypto': {'DES': {'DES': {'DES': 46, 'DEA': 6}, '3DES': {'Triple-DES': 10, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 12}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX': 2}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'SPA': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'Malfunction': 11, 'malfunction': 1, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 3}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}]}
values discarded.
- The st_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': '93d25d381481f05fe155f541f31177aad5cadac1eab98788f69323b808d05c54', 'st_pdf_hash': '53a572abe2ca34da844e3e3b4d78083c781d93bf0f6b5114d4f608be6b2e1c6e', 'report_txt_hash': '2c3ec2de973689acec9a614b2da8975db96e3ed535007b9801a5c091e021a312', 'st_txt_hash': 'c3144bc887652a82098f81ef7bb2da3673ed0e25f89a5b0271023bb8a2df6473'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 18, 'TDEA': 2, 'DEA': 1}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 4}, 'rules_tee': {'SE': 2}, 'rules_side_channels': {'Malfunction': 1, 'physical probing': 2, 'Physical Probing': 1, 'physical tampering': 1, 'side channel': 1, 'DPA': 2, 'timing attacks': 1}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'DES': 46, 'TDEA': 3, 'DEA': 3}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'RND': 5, 'RNG': 12}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 11, 'malfunction': 1, 'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'DPA': 2, 'fault injection': 3, 'timing attacks': 2}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_RCR', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_SRE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_USR', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 3}, {'_type': 'SAR', 'family': 'ACM_SCP', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_VLA', 'level': 4}, {'_type': 'SAR', 'family': 'ASE_PPC', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ENV', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_HLD', 'level': 3}, {'_type': 'SAR', 'family': 'AVA_MSU', 'level': 3}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_ADM', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_IGS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 1}, {'_type': 'SAR', 'family': 'ADO_DEL', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_CAP', 'level': 4}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'SAR', 'family': 'AVA_CCA', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_SOF', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'SAR', 'family': 'ACM_AUT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_DES', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_LLD', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0361-2006']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0361-2006']}, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0231-2004']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0231-2004']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['-']}
. - The directly_affected_by property was set to
{'_type': 'Set', 'elements': ['BSI-DSZ-CC-0361-2006']}
.
- The report_frontpage property was updated, with the
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Philips Secure Smart Card Controller P5CD009V2A and P5CC009V2A each was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "c3dc8cfd97735115",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"cert_id": "BSI-DSZ-CC-0360-2006",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ENV",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VLA",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_RCR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_ADM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_SOF",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_CCA",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_DES",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_MSU",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_USR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_LLD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_PPC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_HLD",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SRE",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0361-2006"
]
},
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0231-2004"
]
},
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0361-2006"
]
},
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0231-2004"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2011-02-03",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0360_ma3a_pdf.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/0360_ma3b_pdf.pdf",
"maintenance_title": "NXP Secure Smart Card Controller P5CD009V2C and P5CC009V2C each with specific IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-06-22",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0360_ma1.pdf",
"maintenance_st_link": null,
"maintenance_title": "NXP Smart Card Controller P5CD009V2A and P5CC009V2A each with IC Dedicated Software"
},
{
"_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
"maintenance_date": "2009-06-23",
"maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0360_ma2a.pdf",
"maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/0360_ma2b.pdf",
"maintenance_title": "NXP Smart Card Controller P5CD009V2C and P5CC009V2C each with IC dedicated software"
}
]
},
"manufacturer": "Philips Semiconductors GmbH",
"manufacturer_web": "https://www.philips.com/",
"name": "Philips Secure Smart Card Controller P5CD009V2A and P5CC009V2A each",
"not_valid_after": "2019-09-01",
"not_valid_before": "2006-05-23",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"report_filename": "0360a.pdf",
"report_frontpage": {
"anssi": {},
"bsi": {
"cert_id": "BSI-DSZ-CC-0360-2006",
"cert_item": "Philips Secure Smart Card Controller P5CD009V2A and P5CC009V2A each with specific IC Dedicated Software",
"cert_lab": "BSI",
"developer": "Philips Semiconductors GmbH Business Line Identification",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
},
"canada": {},
"niap": {},
"nscib": {}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0231-2004": 2,
"BSI-DSZ-CC-0360-2006": 48
}
},
"cc_claims": {
"O": {
"O.C": 1
},
"R": {
"R.O": 1
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP- 0002-2001": 1,
"BSI-PP-0002-": 1,
"BSI-PP-0002-2001": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 2,
"ACM_AUT.1": 2,
"ACM_CAP": 2,
"ACM_CAP.4": 2,
"ACM_SCP": 2,
"ACM_SCP.3": 3
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 2,
"ADV_FSP.3": 2,
"ADV_HLD": 2,
"ADV_HLD.3": 2,
"ADV_IMP": 2,
"ADV_IMP.2": 2,
"ADV_INT": 2,
"ADV_INT.1": 2,
"ADV_LLD": 2,
"ADV_LLD.1": 1,
"ADV_RCR": 2,
"ADV_RCR.2": 2,
"ADV_SPM": 2,
"ADV_SPM.3": 2
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 1,
"AGD_USR": 2,
"AGD_USR.1": 1
},
"ALC": {
"ALC_DVS": 2,
"ALC_DVS.2": 6,
"ALC_FLR": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 3,
"ALC_TAT": 2,
"ALC_TAT.2": 3
},
"ASE": {
"ASE_DES.1": 1,
"ASE_ENV.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.1": 1,
"ASE_PPC.1": 1,
"ASE_REQ.1": 1,
"ASE_SRE.1": 1,
"ASE_TSS.1": 1
},
"ATE": {
"ATE_COV": 2,
"ATE_COV.2": 1,
"ATE_DPT": 2,
"ATE_DPT.2": 2,
"ATE_FUN": 2,
"ATE_FUN.1": 1,
"ATE_IND": 2,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA": 2,
"AVA_CCA.1": 2,
"AVA_MSU": 2,
"AVA_MSU.3": 5,
"AVA_SOF": 4,
"AVA_SOF.1": 1,
"AVA_VLA": 4,
"AVA_VLA.2": 1,
"AVA_VLA.3": 1,
"AVA_VLA.4": 6
}
},
"cc_security_level": {
"EAL": {
"EAL 1": 1,
"EAL 4": 1,
"EAL 5": 3,
"EAL 5 augmented": 2,
"EAL 7": 1,
"EAL1": 5,
"EAL2": 3,
"EAL3": 4,
"EAL4": 10,
"EAL5": 8,
"EAL5 augmented": 1,
"EAL5+": 1,
"EAL6": 3,
"EAL7": 4
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 1
},
"FCS": {
"FCS_CKM.1": 1,
"FCS_CKM.4": 1,
"FCS_COP.1": 2,
"FCS_RND.1": 1
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ACF.1": 3,
"FDP_IFC.1": 1,
"FDP_ITC.1": 1,
"FDP_ITT.1": 1
},
"FMT": {
"FMT_LIM.1": 1,
"FMT_LIM.2": 1,
"FMT_MSA.1": 3,
"FMT_MSA.2": 1,
"FMT_MSA.3": 3,
"FMT_SMF.1": 1,
"FMT_SMR.1": 1
},
"FPT": {
"FPT_FLS.1": 1,
"FPT_ITT.1": 1,
"FPT_PHP.3": 1,
"FPT_SEP.1": 2
},
"FRU": {
"FRU_FLT.2": 1
}
},
"certification_process": {
"ConfidentialDocument": {
"Card Controller, Product Specification, Philips Semiconductors, Revision 3.5, February 16th, 2006 (confidential document) B-26 BSI-DSZ-CC-0360-2006 Certification Report C Excerpts from the Criteria CC Part 1: Caveats on": 1,
"Revision 3.5, February 16th, 2006 (confidential document) [13] FIPS PUB 46-3 FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION DATA ENCRYPTION STANDARD": 1,
"Semiconductors, 20 February 2006 (confidential document) [12] Data Sheet, P5CD009V2, SmartMX, Secure Smart Card Controller, Product Specification, Philips": 1,
"Technical Report, Philips P5CD009V2A Secure Smart Card Controller, Version 1.1, 11. May 2006 (confidential document) [9] Smart Card IC Platform Protection Profile, Version 1.0, July 2001, registered at the German": 1,
"according to AIS 36, Version 1.1, 11. May 2006 for Philips P5CD009V2A Secure Smart Card Controller (confidential document) [11] Guidance, Delivery and Operation Manual for the P5CD009V2A and P5CD009V2B, Version 1.0": 1,
"for the P5CD009V2A/B, BSI-DSZ-CC-0360/0361, Version 1.0, Philips Semiconductors, March 29th, 2006 (confidential document) [15] Instruction Set SmartMX-Family, Secure Smart Card Controller, Objective Specification": 1,
"of Philips P5CD009V2A and P5CC009V2A Secure Smart Card Controller, Philips Semiconductors (confidential document) [7] Security Target Lite BSI-DSZ-CC-0360, Version 1.0, 13 March 2006, Evaluation of Philips": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 4
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 4
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 1,
"physical tampering": 1
},
"SCA": {
"Physical Probing": 1,
"physical probing": 2,
"side channel": 1,
"timing attacks": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 3,
"AIS 31": 4,
"AIS 32": 3,
"AIS 34": 3,
"AIS 36": 6
},
"FIPS": {
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 15408:1999": 1,
"ISO/IEC15408: 1999": 1
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDEA": 2,
"Triple-DES": 11
},
"DES": {
"DEA": 1,
"DES": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI 7149": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Philips": {
"Philips": 53
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/Company": "BSI, Postfach 200363, 53133 Bonn",
"/CreationDate": "D:20060619104913+02\u002700\u0027",
"/Creator": "Acrobat PDFMaker 7.0.7 f\u00fcr Word",
"/Keywords": "Common Criteria, Certification, Zertifizierung",
"/ModDate": "D:20060619110537+02\u002700\u0027",
"/Producer": "Acrobat Distiller 7.0.5 (Windows)",
"/SourceModified": "D:20060619084837",
"/Title": "Certification Report BSI-DSZ-CC-0360-2006",
"pdf_file_size_bytes": 318993,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 48
},
"st_filename": "0360b.pdf",
"st_frontpage": {
"anssi": {},
"bsi": {},
"canada": {},
"niap": {},
"nscib": {}
},
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {},
"cc_claims": {
"O": {
"O.CONFIG": 6,
"O.MEM_ACCESS": 8,
"O.MF_FW": 8,
"O.RND": 3,
"O.SFR_ACCESS": 8
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0002-2001": 3
}
},
"cc_sar": {
"ACM": {
"ACM_AUT": 1,
"ACM_AUT.1": 1,
"ACM_CAP": 1,
"ACM_CAP.4": 2,
"ACM_SCP": 3,
"ACM_SCP.2": 4,
"ACM_SCP.3": 5
},
"ADO": {
"ADO_DEL": 2,
"ADO_DEL.2": 2,
"ADO_IGS": 2,
"ADO_IGS.1": 2
},
"ADV": {
"ADV_FSP": 3,
"ADV_FSP.2": 4,
"ADV_FSP.3": 6,
"ADV_HLD": 1,
"ADV_HLD.3": 1,
"ADV_IMP": 1,
"ADV_IMP.2": 1,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_LLD": 1,
"ADV_LLD.1": 1,
"ADV_RCR": 4,
"ADV_RCR.2": 1,
"ADV_SPM": 1,
"ADV_SPM.3": 1
},
"AGD": {
"AGD_ADM": 2,
"AGD_ADM.1": 2,
"AGD_USR": 2,
"AGD_USR.1": 2
},
"ALC": {
"ALC_DVS": 1,
"ALC_DVS.2": 2,
"ALC_LCD": 1,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.2": 1
},
"ATE": {
"ATE_COV.2": 2,
"ATE_DPT.2": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_CCA.1": 1,
"AVA_MSU": 2,
"AVA_MSU.3": 1,
"AVA_SOF.1": 2,
"AVA_VLA.4": 3
}
},
"cc_security_level": {
"EAL": {
"EAL 5": 4,
"EAL 5 augmented": 2,
"EAL4": 4,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL5": 34,
"EAL5 augmented": 1,
"EAL5+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 4
},
"FCS": {
"FCS_CKM": 1,
"FCS_CKM.1": 4,
"FCS_CKM.4": 3,
"FCS_COP.1": 13,
"FCS_COP.1.1": 1,
"FCS_RND.1": 5,
"FCS_RND.1.1": 1
},
"FDP": {
"FDP_ACC.1": 33,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 30,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_IFC.1": 10,
"FDP_ITC.1": 4,
"FDP_ITT.1": 6,
"FDP_SDI.1": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 3,
"FMT_MSA.1": 29,
"FMT_MSA.1.1": 2,
"FMT_MSA.2": 4,
"FMT_MSA.3": 22,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 14,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 8
},
"FPT": {
"FPT_AMT.1": 1,
"FPT_FLS.1": 7,
"FPT_ITT.1": 6,
"FPT_PHP.3": 7,
"FPT_SEP.1": 15,
"FPT_SEP.1.1": 1,
"FPT_SEP.1.2": 1
},
"FRU": {
"FRU_FLT.2": 7
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 2
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 10
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 10,
"fault injection": 3,
"malfunction": 1,
"physical tampering": 1
},
"SCA": {
"DPA": 1,
"Leak-Inherent": 14,
"Physical Probing": 2,
"physical probing": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 3
},
"FIPS": {
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
}
},
"symmetric_crypto": {
"DES": {
"3DES": {
"TDEA": 3,
"Triple-DEA": 1,
"Triple-DES": 10
},
"DES": {
"DEA": 2,
"DES": 29
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"Philips": {
"Philips": 110
}
},
"vulnerability": {}
},
"st_metadata": {
"/Author": "HGA",
"/Company": "Philips Semiconductors BL ID",
"/CreationDate": "D:20060313182037+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 6.0 for Word",
"/ModDate": "D:20060313182242+01\u002700\u0027",
"/Producer": "Acrobat Distiller 6.0 (Windows)",
"/SourceModified": "D:20060313171012",
"/Title": "Security Target",
"pdf_file_size_bytes": 691723,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 79
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0360a.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"AVA_VLA.4",
"EAL5+",
"ALC_DVS.2",
"AVA_MSU.3"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0360b.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"report_convert_garbage": false,
"report_convert_ok": true,
"report_download_ok": true,
"report_extract_ok": true,
"report_pdf_hash": "93d25d381481f05fe155f541f31177aad5cadac1eab98788f69323b808d05c54",
"report_txt_hash": "2c3ec2de973689acec9a614b2da8975db96e3ed535007b9801a5c091e021a312",
"st_convert_garbage": false,
"st_convert_ok": true,
"st_download_ok": true,
"st_extract_ok": true,
"st_pdf_hash": "53a572abe2ca34da844e3e3b4d78083c781d93bf0f6b5114d4f608be6b2e1c6e",
"st_txt_hash": "c3144bc887652a82098f81ef7bb2da3673ed0e25f89a5b0271023bb8a2df6473"
},
"status": "archived"
}