FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.0

CSV information ?

Status archived
Valid from 19.03.2013
Valid until 19.03.2023
Scheme 🇳🇱 NL
Manufacturer Sony Corporation
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level EAL6+, ASE_TSS.2
Protection profiles
Maintenance updates Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01 (21.05.2014) Certification report Security target
Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01 (10.06.2016) Certification report

Heuristics summary ?

Certificate ID: NSCIB-CC-12-36329-CR

Certificate ?

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES

Security level
EAL4, EAL6, EAL5+, EAL6+, EAL6 augmented
Security Assurance Requirements (SAR)
ADV_TDS, ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ATE_IND, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FPR_UNL.1
Protection profiles
BSI-PP-0035
Certificates
NSCIB-CC-12-36329-CR, NSCIB-CC-12-36329, NSCIB-10-30075
Evaluation facilities
Brightsight

Side-channel analysis
JIL, JHAS

Standards
AIS20, AIS 20, AIS34, AIS 34, ISO/IEC 18092

File metadata

Title: Certification Report NSCIB-CC-12-36329-CR.doc
Creation date: D:20130319155121+01'00'
Pages: 16
Creator: pdfFactory Pro www.pdffactory.com
Producer: pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)

Frontpage

Certificate ID: NSCIB-CC-12-36329-CR
Certified item: FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC- SA01/2 Series, version 1.0
Certification lab: Brightsight
Developer: Sony Corporation

References

Outgoing
  • NSCIB-CC-10-30075-CR - FeliCa Contactless Smartcard IC RC-SA00/1 Series and RC-SA00/2 Series, version 1.0

Security target ?

Extracted keywords

Symmetric Algorithms
AES
Randomness
RND, RNG

Security level
EAL6
Claims
O.AC, O.SC, O.RND, T.RND
Security Assurance Requirements (SAR)
ADV_SPM.1, ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_FSP, ADV_IMP, AGD_OPE.1, AGD_PRE.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_CMC, ALC_CMS, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG, FCS_RNG.1.1, FCS_RNG.1.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_SDI.2, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ITT.1, FDP_IFC.1, FDP_IFF.1, FIA_UID.1, FIA_UID.1.1, FIA_UID.1.2, FIA_UAU.1, FIA_UAU.1.1, FIA_UAU.1.2, FIA_UAU.4, FIA_UAU.4.1, FMT_SMR.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MOF.1, FMT_MOF.1.1, FMT_MSA.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FPR_UNL.1, FPR_UNL.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2, FTP_ITC.1, FTP_ITC.1.1, FTP_ITC.1.2, FTP_ITC.1.3
Protection profiles
BSI-PP-0035, BSI-PP- 0035
Certification process
out of scope, the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, Side-channel, side-channel, Malfunction, malfunction
Certification process
out of scope, the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including

Standards
ISO/IEC 18092

File metadata

Creation date: D:20130228184005+09'00'
Modification date: D:20130228184230+09'00'
Pages: 45
Creator: PScript5.dll Version 5.2.2
Producer: Acrobat Distiller 9.5.3 (Windows)

References

Outgoing

Heuristics ?

Certificate ID: NSCIB-CC-12-36329-CR

Extracted SARs

ATE_DPT.3, ASE_REQ.2, ASE_INT.1, ASE_CCL.1, ADV_INT.3, ASE_OBJ.2, ADV_IMP.2, ADV_SPM.1, ATE_IND.2, ATE_FUN.2, AGD_OPE.1, ALC_CMC.5, ALC_CMS.5, AGD_PRE.1, ALC_TAT.3, ADV_FSP.5, ATE_COV.3, ALC_DVS.2, ASE_SPD.1, ALC_DEL.1, ASE_TSS.2, ADV_TDS.5, ASE_ECD.1, ADV_ARC.1, ALC_LCD.1, AVA_VAN.5

References ?

Updates ?

  • 15.02.2024 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '745e8719532aba0f7ed5f2993a3e9ca46e5a6bfca347068f17843ea59fc41f46', 'txt_hash': 'cbe39f50679ebbb5c1320183c63a0404c5153449c25bf0f9f141b45a928d7b25'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '26dee7f5154c8bed99622fc28852c722255518ea311acc2d263f01aad72990bc', 'txt_hash': '9f80ccc6009f6b84c1c760c290bf639448dd05f8cda868a03c084353fc657849'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}.
    • The following properties were deleted: ['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash'].

    The PDF extraction data was updated.

    • The following values were inserted: {'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}.
    • The report_frontpage property was set to {'NL': {'cert_id': 'NSCIB-CC-12-36329-CR', 'cert_item': 'FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC- SA01/2 Series, version 1.0', 'developer': 'Sony Corporation', 'cert_lab': ' Brightsight'}}.
    • The st_frontpage property was set to None.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'NL': {'__insert__': {'NSCIB-CC-12-36329-CR': 15, 'NSCIB-10-30075': 1}, '__update__': {'NSCIB-CC-12-36329': 1}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-10-30075-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-10-30075-CR']}} data.
  • 13.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'NL': {'__update__': {'NSCIB-CC-12-36329': 2}, '__delete__': ['NSCIB-CC-12-36329-CR', 'NSCIB-10-30075']}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__delete__': ['CA']}} data.
  • 07.02.2024 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'cc_cert_id': {'__insert__': {'CA': {'888 7 888': 3, '888 7 879': 2, '888 7 859': 1, '1-7-1': 1}}, '__update__': {'NL': {'__insert__': {'NSCIB-CC-12-36329-CR': 15, 'NSCIB-10-30075': 1}, '__update__': {'NSCIB-CC-12-36329': 1}}}}} data.

    The computed heuristics were updated.

    • The report_references property was updated, with the {'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-10-30075-CR']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-10-30075-CR']}} data.
  • 04.01.2024 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'annotated_references': None}.
  • 21.09.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The cert_id property was set to NSCIB-CC-12-36329-CR.
  • 26.04.2023 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'scheme_data': None}.
  • 24.03.2023 The certificate data changed.
    Certificate changed

    The Status was updated.

    • The new value is archived.
  • 11.02.2023 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.cc.CCCertificate.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2014-05-21', 'maintenance_title': 'Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/Maintenance%20Report%20NSCIB-CC-12-36329-MA1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/A01-STP-E01-11.pdf'}, {'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': '2016-06-10', 'maintenance_title': 'Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/[MA]%20NSCIB-CC-12-36329-MA2.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.InternalState.
    • The following properties were deleted: ['errors'].

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.cc.CCCertificate.PdfData.

    The computed heuristics were updated.

    • The following values were inserted: {'direct_transitive_cves': None, 'indirect_transitive_cves': None}.
    • The _type property was set to sec_certs.sample.cc.CCCertificate.Heuristics.
    • The following properties were deleted: ['direct_dependency_cves', 'indirect_dependency_cves'].
  • 05.02.2023 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 26.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/[CR]%20NSCIB-CC-12-36329-CR.pdf, code: nok'].
  • 24.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is https://www.sony.com/.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}.
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The manufacturer_web was updated.

    • The new value is None.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'SECURITY_IC_V1.0', 'pp_eal': None, 'pp_link': None, 'pp_ids': None}]}.

    The state of the certificate object was updated.

    • The errors property was set to [].
  • 23.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to True.
    • The report_convert_ok property was set to True.
    • The report_extract_ok property was set to True.
    • The errors property was updated.
    • The report_pdf_hash property was set to 745e8719532aba0f7ed5f2993a3e9ca46e5a6bfca347068f17843ea59fc41f46.
    • The report_txt_hash property was set to cbe39f50679ebbb5c1320183c63a0404c5153449c25bf0f9f141b45a928d7b25.

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 282153, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 16, '/CreationDate': "D:20130319155121+01'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)', '/Title': 'Certification Report NSCIB-CC-12-36329-CR.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:info@nl.tuv.com', 'http://www.tuv.com/nl', 'http://www.commoncriteriaportal.org', 'http://www.sogisportal.eu']}}.
    • The report_frontpage property was set to {'anssi': {}, 'bsi': {}, 'nscib': {'cert_id': 'NSCIB-CC-12-36329-CR', 'cert_item': 'FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC- SA01/2 Series, version 1.0', 'developer': 'Sony Corporation', 'cert_lab': ' Brightsight'}, 'niap': {}, 'canada': {}}.
    • The report_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-12-36329': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL6': 2, 'EAL5+': 1, 'EAL6+': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_TDS': 1, 'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_IND': 2, 'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 3, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FPR': {'FPR_UNL.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 5, 'JHAS': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 20': 1, 'AIS34': 1, 'AIS 34': 1}, 'ISO': {'ISO/IEC 18092': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The report_filename property was set to [CR] NSCIB-CC-12-36329-CR.pdf.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
    • The cert_id property was set to NSCIB-CC-12-36329.
  • 22.12.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_download_ok property was set to False.
    • The report_convert_ok property was set to False.
    • The report_extract_ok property was set to False.
    • The errors property was set to ['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/[CR]%20NSCIB-CC-12-36329-CR.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/[CR]%20NSCIB-CC-12-36329-CR.pdf, code: nok'].
    • The report_pdf_hash property was set to None.
    • The report_txt_hash property was set to None.

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The report_frontpage property was set to None.
    • The report_keywords property was set to None.
    • The report_filename property was set to None.

    The computed heuristics were updated.

    • The cert_lab property was set to None.
    • The cert_id property was set to None.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '[CR] NSCIB-CC-12-36329-CR.pdf', 'st_filename': '[ST] A01-STP-E01-10.pdf'}.
    • The report_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 2}}}}, 'cc_sar': {'__update__': {'ATE': {'__insert__': {'ATE_IND': 2}}, 'ASE': {'__update__': {'ASE_TSS.2': 3}}}}, 'randomness': {}} data.
    • The st_keywords property was updated, with the {'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_SPM.1': 8, 'ADV_ARC.1': 2, 'ADV_FSP.5': 5, 'ADV_IMP.2': 5}, '__delete__': ['ADV_FSP.4', 'ADV_IMP.1', 'ADV_TDS.3']}, 'AGD': {'__update__': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}}, 'ALC': {'__update__': {'ALC_CMC.5': 5, 'ALC_CMS.5': 5, 'ALC_DEL.1': 2, 'ALC_DVS.2': 2, 'ALC_LCD.1': 1}, '__delete__': ['ALC_CMC.4', 'ALC_CMS.4', 'ALC_TAT.1']}, 'ATE': {'__update__': {'ATE_COV.3': 5, 'ATE_IND.2': 1}, '__delete__': ['ATE_COV.2', 'ATE_DPT.2', 'ATE_FUN.1']}, 'AVA': {'__update__': {'AVA_VAN.5': 2}}, 'ASE': {'__update__': {'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1, 'ASE_TSS.1': 1}}}}, 'cc_sfr': {'__update__': {'FAU': {'__update__': {'FAU_SAS.1': 5}}, 'FCS': {'__update__': {'FCS_RNG.1': 6}}, 'FDP': {'__update__': {'FDP_ACC.1': 12, 'FDP_SDI.2': 4, 'FDP_ITT.1': 7, 'FDP_IFC.1': 9}}, 'FIA': {'__update__': {'FIA_UID.1': 6, 'FIA_UAU.1': 4, 'FIA_UAU.4': 4}}, 'FMT': {'__update__': {'FMT_SMR.1': 11, 'FMT_MSA.1': 5, 'FMT_SMF.1': 7, 'FMT_LIM.1': 5, 'FMT_LIM.2': 5}}, 'FPR': {'__update__': {'FPR_UNL.1': 5}}, 'FPT': {'__update__': {'FPT_FLS.1': 8, 'FPT_PHP.3': 8, 'FPT_ITT.1': 7}}, 'FRU': {'__update__': {'FRU_FLT.2': 7}}, 'FTP': {'__update__': {'FTP_ITC.1': 4}}}}, 'side_channel_analysis': {'__update__': {'FI': {'__update__': {'Malfunction': 10}}}}, 'certification_process': {'__update__': {'OutOfScope': {'__insert__': {'the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including': 1}, '__delete__': ['. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card', 'nables the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including']}}}} data.

    The computed heuristics were updated.

    • The cert_id property was set to NSCIB-CC-12-36329.
    • The report_references property was updated, with the {'directly_referencing': None, 'indirectly_referencing': None} data.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The report_metadata property was set to {'pdf_file_size_bytes': 282153, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 16, '/CreationDate': "D:20130319155121+01'00'", '/Creator': 'pdfFactory Pro www.pdffactory.com', '/Producer': 'pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)', '/Title': 'Certification Report NSCIB-CC-12-36329-CR.doc', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:info@nl.tuv.com', 'http://www.tuv.com/nl', 'http://www.commoncriteriaportal.org', 'http://www.sogisportal.eu']}}.

    The computed heuristics were updated.

    • The cert_lab property was set to [''].
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2016-06-10', 'maintenance_title': 'Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/[MA]%20NSCIB-CC-12-36329-MA2.pdf', 'maintenance_st_link': None}, {'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2014-05-21', 'maintenance_title': 'Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/Maintenance%20Report%20NSCIB-CC-12-36329-MA1.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/files/epfiles/A01-STP-E01-11.pdf'}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}]}.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The report_extract_ok property was set to False.
    • The errors property was set to ["Failed to read metadata of certs/reports/pdf/c83206789eea17ee.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'", "Failed to read metadata of certs/reports/pdf/c83206789eea17ee.pdf, error: unsupported operand type(s) for +: 'IndirectObject' and 'list'"].

    The PDF extraction data was updated.

    • The report_metadata property was set to None.
    • The st_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': []}} values inserted.
    • The report_keywords property was set to {'cc_cert_id': {'NL': {'NSCIB-CC-12-36329': 2}}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 2}}, 'cc_security_level': {'EAL': {'EAL4': 1, 'EAL6': 2, 'EAL5+': 1, 'EAL6+': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_TDS': 1, 'ADV_ARC.1': 1, 'ADV_FSP.5': 1, 'ADV_IMP.2': 1, 'ADV_INT.3': 1, 'ADV_SPM.1': 1, 'ADV_TDS.5': 1, 'ADV_ARC': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_CMC.5': 1, 'ALC_CMS.5': 1, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1}, 'ATE': {'ATE_COV.3': 1, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.5': 1}, 'ASE': {'ASE_TSS.2': 2, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FPR': {'FPR_UNL.1': 1}}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {'BrightSight': {'Brightsight': 3}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'other': {'JIL': 5, 'JHAS': 1}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS20': 1, 'AIS 20': 1, 'AIS34': 1, 'AIS 34': 1}, 'ISO': {'ISO/IEC 18092': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 21, 'BSI-PP- 0035': 2}}, 'cc_security_level': {'EAL': {'EAL6': 4}}, 'cc_sar': {'ADV': {'ADV_SPM.1': 3, 'ADV_ARC.1': 4, 'ADV_FSP.5': 4, 'ADV_FSP.4': 2, 'ADV_IMP.2': 4, 'ADV_IMP.1': 2, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_TDS.3': 1, 'ADV_FSP': 1, 'ADV_IMP': 1}, 'AGD': {'AGD_OPE.1': 4, 'AGD_PRE.1': 4}, 'ALC': {'ALC_CMC.5': 4, 'ALC_CMC.4': 2, 'ALC_CMS.5': 4, 'ALC_CMS.4': 2, 'ALC_DEL.1': 4, 'ALC_DVS.2': 4, 'ALC_LCD.1': 2, 'ALC_TAT.3': 1, 'ALC_TAT.1': 1, 'ALC_CMC': 1, 'ALC_CMS': 1}, 'ATE': {'ATE_COV.3': 4, 'ATE_COV.2': 2, 'ATE_DPT.3': 1, 'ATE_DPT.2': 1, 'ATE_FUN.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 4}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 2, 'ASE_ECD.1': 2, 'ASE_INT.1': 2, 'ASE_OBJ.2': 2, 'ASE_REQ.2': 2, 'ASE_SPD.1': 2, 'ASE_TSS.1': 2}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 6, 'FAU_SAS': 1, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 7, 'FCS_RNG': 1, 'FCS_RNG.1.1': 1, 'FCS_RNG.1.2': 1}, 'FDP': {'FDP_ACC.1': 13, 'FDP_ACC.1.1': 1, 'FDP_ACF.1': 6, 'FDP_ACF.1.1': 1, 'FDP_ACF.1.2': 1, 'FDP_ACF.1.3': 1, 'FDP_ACF.1.4': 1, 'FDP_SDI.2': 5, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ITT.1': 8, 'FDP_IFC.1': 10, 'FDP_IFF.1': 1}, 'FIA': {'FIA_UID.1': 7, 'FIA_UID.1.1': 1, 'FIA_UID.1.2': 1, 'FIA_UAU.1': 5, 'FIA_UAU.1.1': 1, 'FIA_UAU.1.2': 1, 'FIA_UAU.4': 5, 'FIA_UAU.4.1': 1}, 'FMT': {'FMT_SMR.1': 12, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MOF.1': 5, 'FMT_MOF.1.1': 1, 'FMT_MSA.1': 6, 'FMT_MSA.1.1': 1, 'FMT_SMF.1': 9, 'FMT_SMF.1.1': 1, 'FMT_LIM.1': 6, 'FMT_LIM.2': 6, 'FMT_MSA.3': 3}, 'FPR': {'FPR_UNL.1': 6, 'FPR_UNL.1.1': 1}, 'FPT': {'FPT_FLS.1': 9, 'FPT_PHP.3': 9, 'FPT_ITT.1': 8}, 'FRU': {'FRU_FLT.2': 8}, 'FTP': {'FTP_ITC.1': 5, 'FTP_ITC.1.1': 1, 'FTP_ITC.1.2': 1, 'FTP_ITC.1.3': 1}}, 'cc_claims': {'O': {'O.AC': 14, 'O.SC': 9, 'O.RND': 4}, 'T': {'T.RND': 3}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 8}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RND': 7, 'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 10, 'Physical Probing': 2, 'physical probing': 2, 'Side-channel': 1, 'side-channel': 1}, 'FI': {'Malfunction': 11, 'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'ISO': {'ISO/IEC 18092': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, '. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card': 1, 'nables the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including': 1}}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
    • The cert_lab property was set to None.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': '745e8719532aba0f7ed5f2993a3e9ca46e5a6bfca347068f17843ea59fc41f46', 'st_pdf_hash': '26dee7f5154c8bed99622fc28852c722255518ea311acc2d263f01aad72990bc', 'report_txt_hash': 'cbe39f50679ebbb5c1320183c63a0404c5153449c25bf0f9f141b45a928d7b25', 'st_txt_hash': '9f80ccc6009f6b84c1c760c290bf639448dd05f8cda868a03c084353fc657849'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 6, 'DES': 2}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 3}, 'rules_tee': {}, 'rules_side_channels': {}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 8}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RND': 7, 'RNG': 3}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 11, 'malfunction': 2, 'Leak-Inherent': 10, 'Physical Probing': 2, 'physical probing': 2, 'Side-channel': 1, 'side-channel': 1}} values inserted.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}]}}.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-12-36329']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['NSCIB-CC-12-36329']}}}.
    • The cert_lab property was set to [''].
    • The cert_id property was set to NSCIB-CC-12-36329-CR.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 155771, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 45, '/CreationDate': "D:20130228184005+09'00'", '/Creator': 'PScript5.dll Version 5.2.2', '/ModDate': "D:20130228184230+09'00'", '/Producer': 'Acrobat Distiller 9.5.3 (Windows)', '/Title': ''}.
    • The report_frontpage property was updated, with the {'nscib': {'cert_id': 'NSCIB-CC-12-36329-CR', 'cert_item': 'FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC- SA01/2 Series, version 1.0', 'developer': 'Sony Corporation', 'cert_lab': ' Brightsight'}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The report_keywords property was updated, with the {'rules_cert_id': {'NSCIB-CC-12-36329': 1}} data.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['1.0']}.
    • The cert_id property was set to NSCIB-CC-12-36329.
  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['SECURITY_IC_V1.0', 'PKISKPP']}}]}.
  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.0 was processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "c83206789eea17ee",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "NSCIB-CC-12-36329-CR",
    "cert_lab": [
      ""
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "1.0"
      ]
    },
    "indirect_transitive_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-10-30075-CR"
        ]
      },
      "indirectly_referenced_by": null,
      "indirectly_referencing": {
        "_type": "Set",
        "elements": [
          "NSCIB-CC-10-30075-CR"
        ]
      }
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2016-06-10",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/[MA]%20NSCIB-CC-12-36329-MA2.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01"
      },
      {
        "_type": "sec_certs.sample.cc.CCCertificate.MaintenanceReport",
        "maintenance_date": "2014-05-21",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/Maintenance%20Report%20NSCIB-CC-12-36329-MA1.pdf",
        "maintenance_st_link": "https://www.commoncriteriaportal.org/files/epfiles/A01-STP-E01-11.pdf",
        "maintenance_title": "Felica Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.01"
      }
    ]
  },
  "manufacturer": "Sony Corporation",
  "manufacturer_web": "https://www.sony.com/",
  "name": "FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC-SA01/2 Series, version 1.0",
  "not_valid_after": "2023-03-19",
  "not_valid_before": "2013-03-19",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": null,
    "cert_frontpage": null,
    "cert_keywords": null,
    "cert_metadata": null,
    "report_filename": "[CR] NSCIB-CC-12-36329-CR.pdf",
    "report_frontpage": {
      "NL": {
        "cert_id": "NSCIB-CC-12-36329-CR",
        "cert_item": "FeliCa Contactless Smartcard IC RC-SA01/1 Series and RC- SA01/2 Series, version 1.0",
        "cert_lab": " Brightsight",
        "developer": "Sony Corporation"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "NL": {
          "NSCIB-10-30075": 1,
          "NSCIB-CC-12-36329": 1,
          "NSCIB-CC-12-36329-CR": 15
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 2
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP.5": 1,
          "ADV_IMP.2": 1,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 1,
          "ADV_TDS": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.5": 1,
          "ALC_CMS.5": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS.2": 1,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 3
        },
        "ATE": {
          "ATE_COV.3": 1,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND": 2,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 1
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL4": 2,
          "EAL5+": 1,
          "EAL6": 2,
          "EAL6 augmented": 2,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FPR": {
          "FPR_UNL.1": 1
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "BrightSight": {
          "Brightsight": 3
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "other": {
          "JHAS": 1,
          "JIL": 5
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 20": 1,
          "AIS 34": 1,
          "AIS20": 1,
          "AIS34": 1
        },
        "ISO": {
          "ISO/IEC 18092": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "DES": {
            "DES": 2
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "report_metadata": {
      "/CreationDate": "D:20130319155121+01\u002700\u0027",
      "/Creator": "pdfFactory Pro www.pdffactory.com",
      "/Producer": "pdfFactory Pro 4.05 (Windows Vista Business x86 Dutch)",
      "/Title": "Certification Report NSCIB-CC-12-36329-CR.doc",
      "pdf_file_size_bytes": 282153,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.tuv.com/nl",
          "http://www.sogisportal.eu",
          "http://www.commoncriteriaportal.org",
          "mailto:info@nl.tuv.com"
        ]
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 16
    },
    "st_filename": "[ST] A01-STP-E01-10.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.AC": 14,
          "O.RND": 4,
          "O.SC": 9
        },
        "T": {
          "T.RND": 3
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP- 0035": 2,
          "BSI-PP-0035": 21
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC.1": 2,
          "ADV_FSP": 1,
          "ADV_FSP.5": 5,
          "ADV_IMP": 1,
          "ADV_IMP.2": 5,
          "ADV_INT.3": 1,
          "ADV_SPM.1": 8,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE.1": 2,
          "AGD_PRE.1": 2
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.5": 5,
          "ALC_CMS": 1,
          "ALC_CMS.5": 5,
          "ALC_DEL.1": 2,
          "ALC_DVS.2": 2,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 5,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL6": 4
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS": 1,
          "FAU_SAS.1": 5,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_RNG": 1,
          "FCS_RNG.1": 6,
          "FCS_RNG.1.1": 1,
          "FCS_RNG.1.2": 1
        },
        "FDP": {
          "FDP_ACC.1": 12,
          "FDP_ACC.1.1": 1,
          "FDP_ACF.1": 6,
          "FDP_ACF.1.1": 1,
          "FDP_ACF.1.2": 1,
          "FDP_ACF.1.3": 1,
          "FDP_ACF.1.4": 1,
          "FDP_IFC.1": 9,
          "FDP_IFF.1": 1,
          "FDP_ITT.1": 7,
          "FDP_SDI.2": 4,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FIA": {
          "FIA_UAU.1": 4,
          "FIA_UAU.1.1": 1,
          "FIA_UAU.1.2": 1,
          "FIA_UAU.4": 4,
          "FIA_UAU.4.1": 1,
          "FIA_UID.1": 6,
          "FIA_UID.1.1": 1,
          "FIA_UID.1.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 5,
          "FMT_LIM.2": 5,
          "FMT_MOF.1": 5,
          "FMT_MOF.1.1": 1,
          "FMT_MSA.1": 5,
          "FMT_MSA.1.1": 1,
          "FMT_MSA.3": 3,
          "FMT_SMF.1": 7,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 11,
          "FMT_SMR.1.1": 1,
          "FMT_SMR.1.2": 1
        },
        "FPR": {
          "FPR_UNL.1": 5,
          "FPR_UNL.1.1": 1
        },
        "FPT": {
          "FPT_FLS.1": 8,
          "FPT_ITT.1": 7,
          "FPT_PHP.3": 8
        },
        "FRU": {
          "FRU_FLT.2": 7
        },
        "FTP": {
          "FTP_ITC.1": 4,
          "FTP_ITC.1.1": 1,
          "FTP_ITC.1.2": 1,
          "FTP_ITC.1.3": 1
        }
      },
      "certification_process": {
        "OutOfScope": {
          "out of scope": 1,
          "the exchange of FeliCa commands, which are processed by the FeliCa OS. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. All components of the TOE including": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 7,
          "RNG": 3
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "malfunction": 2
        },
        "SCA": {
          "Leak-Inherent": 10,
          "Physical Probing": 2,
          "Side-channel": 1,
          "physical probing": 2,
          "side-channel": 1
        }
      },
      "standard_id": {
        "ISO": {
          "ISO/IEC 18092": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 8
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/CreationDate": "D:20130228184005+09\u002700\u0027",
      "/Creator": "PScript5.dll Version 5.2.2",
      "/ModDate": "D:20130228184230+09\u002700\u0027",
      "/Producer": "Acrobat Distiller 9.5.3 (Windows)",
      "/Title": "",
      "pdf_file_size_bytes": 155771,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": true,
      "pdf_number_of_pages": 45
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "SECURITY_IC_V1.0",
            "PKISKPP"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/[CR]%20NSCIB-CC-12-36329-CR.pdf",
  "scheme": "NL",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ASE_TSS.2"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/[ST]%20A01-STP-E01-10.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": false,
      "download_ok": false,
      "extract_ok": false,
      "pdf_hash": null,
      "txt_hash": null
    },
    "report": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "745e8719532aba0f7ed5f2993a3e9ca46e5a6bfca347068f17843ea59fc41f46",
      "txt_hash": "cbe39f50679ebbb5c1320183c63a0404c5153449c25bf0f9f141b45a928d7b25"
    },
    "st": {
      "_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "26dee7f5154c8bed99622fc28852c722255518ea311acc2d263f01aad72990bc",
      "txt_hash": "9f80ccc6009f6b84c1c760c290bf639448dd05f8cda868a03c084353fc657849"
    }
  },
  "status": "archived"
}