NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software
CSV information ?
Status | archived |
---|---|
Valid from | 04.04.2014 |
Valid until | 01.09.2019 |
Scheme | 🇩🇪 DE |
Manufacturer | NXP Semiconductors Germany GmbH Business Line Identification |
Category | ICs, Smart Cards and Smart Card-Related Devices and Systems |
Security level | ALC_FLR.1, EAL6+ |
Protection profiles |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Symmetric Algorithms
AES, DES, Triple-DES, TDESRandomness
RNGEngines
SmartMX2Vendor
NXP, NXP SemiconductorsSecurity level
EAL 6, EAL 4, EAL 5, EAL1, EAL4, EAL5, EAL5+, EAL6, EAL3, EAL7, EAL2, EAL 6 augmented, ITSEC EvaluationClaims
O.C, R.OSecurity Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_FLR, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, ATE_FUN, ATE_IND, AVA_VAN.5, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, AVA_VAN, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSSProtection profiles
BSI-CC-PP-0035-2007Certificates
BSI-DSZ-CC-0810-V2-2014, BSI-DSZ-CC-0810-2012, BSI-DSZ-CC-0810Certification process
Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, 9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1, 11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the, platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL, smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual, Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev, 3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors, 3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0, May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP, Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List, composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the, List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online documentSide-channel analysis
physical probing, side channel, timing attacks, physical tampering, reverse engineering, JILCertification process
Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8, 9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1, 11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the, platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL, smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual, Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev, 3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors, 3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0, May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP, Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List, composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the, List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online documentStandards
AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS 35, AIS36, AIS 32, AIS 38, ISO/IEC 7816, ISO/IEC 14443Technical reports
BSI TR-02102, BSI 7125, BSI 7148File metadata
Title: | Certification Report BSI-DSZ-CC-0810-V2-2014 |
---|---|
Subject: | IT Security |
Keywords: | "Common Criteria, Certification, Zertifizierung, BSI, P60D024/016/012PVB/PVB(Y), Secure Smart Card Controller, EAL6, NXP" |
Author: | Bundesamt für Sicherheit in der Informationstechnik |
Creation date: | D:20140415164656+02'00' |
Modification date: | D:20140415165055+02'00' |
Pages: | 42 |
Creator: | Writer |
Producer: | LibreOffice 3.6 |
Frontpage
Certificate ID: | BSI-DSZ-CC-0810-V2-2014 |
---|---|
Certified item: | NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software |
Certification lab: | BSI |
Developer: | NXP Semiconductors Germany GmbH |
References
Outgoing- BSI-DSZ-CC-0810-2012 - NXP Secure Smart Card Controller P60D024/016/012PVB with IC Dedicated Software
Security target ?
Extracted keywords
Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA, TDESAsymmetric Algorithms
ECCRandomness
TRNG, RND, RNGEngines
SmartMX2, SmartMXVendor
NXP, NXP Semiconductors, PhilipsSecurity level
EAL6, EAL4, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL4 augmentedClaims
O.RND, O.INTEGRITY_CHK, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RNDSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ACC.1, FDP_ITT.1.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_FLS.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FPT_ITT.1.1, FRU_FLT.2, FTP_ITT.1Protection profiles
BSI-PP-0035Certificates
BSI-DSZ-CC-0810Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injectionStandards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title: | Security Target Lite |
---|---|
Subject: | P60D024PVB |
Keywords: | CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA |
Author: | NXP Semiconductors |
Creation date: | D:20131107104533+01'00' |
Modification date: | D:20131107104604+01'00' |
Pages: | 80 |
Creator: | Acrobat PDFMaker 9.1 for Word |
Producer: | Adobe PDF Library 10.0 |
References
OutgoingHeuristics ?
Extracted SARs
ASE_TSS.2, AGD_PRE.1, ADV_INT.3, APE_REQ.2, AVA_VAN.5, ADV_FSP.5, ALC_CMC.5, ALC_LCD.1, APE_INT.1, ASE_REQ.2, ATE_FUN.2, AGD_OPE.1, ASE_ECD.1, ATE_COV.3, ADV_SPM.1, APE_ECD.1, ALC_DEL.1, ATE_DPT.3, APE_OBJ.2, ALC_TAT.3, ATE_IND.2, ASE_SPD.1, ADV_IMP.2, ALC_CMS.5, ADV_TDS.5, ASE_CCL.1, APE_SPD.1, APE_CCL.1, ALC_DVS.2, ALC_FLR.1, ASE_OBJ.2, ASE_INT.1, ADV_ARC.1References ?
Updates ?
-
15.02.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'b10e1b13b1574906aa3ab8a601c451dc46d9990aa36f03d6e7ed47d8dc42613b', 'txt_hash': '46ed9220b989cac2201135b47a4ece78f9c420224830e3543c87c62ea52326d2'}, 'st': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': True, 'convert_garbage': False, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '558cd6262fe13bd5b8b1d9207bb28ba72fbd3259b33223b42499b646527dabe1', 'txt_hash': 'c4ce1043468e5bba6a6fe9a8ff598e8ecafc52e7a4588cd0a7827b2e5bba7199'}, 'cert': {'_type': 'sec_certs.sample.cc.CCCertificate.DocumentState', 'download_ok': False, 'convert_garbage': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}}
. - The following properties were deleted:
['st_download_ok', 'report_download_ok', 'st_convert_garbage', 'report_convert_garbage', 'st_convert_ok', 'report_convert_ok', 'st_extract_ok', 'report_extract_ok', 'st_pdf_hash', 'report_pdf_hash', 'st_txt_hash', 'report_txt_hash']
.
The PDF extraction data was updated.
- The following values were inserted:
{'cert_metadata': None, 'cert_frontpage': None, 'cert_keywords': None, 'cert_filename': None}
. - The report_frontpage property was set to
{'DE': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0810-V2-2014', 'cert_item': 'NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}}
. - The st_frontpage property was set to
None
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0810': 1}, '__update__': {'BSI-DSZ-CC-0810-2012': 3, 'BSI-DSZ-CC-0810-V2-2014': 22}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0810': 1}}}
data.
- The following values were inserted:
-
13.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0810-V2-2014': 44, 'BSI-DSZ-CC-0810-2012': 6}, '__delete__': ['BSI-DSZ-CC-0810']}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'__delete__': ['CA']}}
data.
- The report_keywords property was updated, with the
-
07.02.2024 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'cc_cert_id': {'__insert__': {'CA': {'1 1 1': 18, '1 2 3': 5, '5 5 6': 1, '1 1 2': 1, '2 3 3': 1, '4 5 5': 2, '5 5 5': 1, '1 2 2': 5, '2 2 2': 2, '1 1 3': 1, '2 2 3': 1}}, '__update__': {'DE': {'__insert__': {'BSI-DSZ-CC-0810': 1}, '__update__': {'BSI-DSZ-CC-0810-2012': 3, 'BSI-DSZ-CC-0810-V2-2014': 22}}}}}
data. - The st_keywords property was updated, with the
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0810': 1}, 'CA': {'255 0 2': 1, '0 6 7': 1}}}
data.
- The report_keywords property was updated, with the
-
04.01.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'annotated_references': None}
.
- The following values were inserted:
-
26.04.2023 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'scheme_data': None}
.
- The following values were inserted:
-
11.02.2023 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.cc.CCCertificate
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.InternalState
. - The following properties were deleted:
['errors']
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.cc.CCCertificate.PdfData
.
The computed heuristics were updated.
- The following values were inserted:
{'direct_transitive_cves': None, 'indirect_transitive_cves': None}
. - The _type property was set to
sec_certs.sample.cc.CCCertificate.Heuristics
. - The following properties were deleted:
['direct_dependency_cves', 'indirect_dependency_cves']
.
- The new value is
-
05.02.2023 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
[]
.
- The errors property was set to
-
26.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0810V2a_pdf.pdf, code: nok']
.
- The errors property was set to
-
24.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
True
. - The st_convert_ok property was set to
True
. - The st_extract_ok property was set to
True
. - The errors property was set to
[]
. - The st_pdf_hash property was set to
558cd6262fe13bd5b8b1d9207bb28ba72fbd3259b33223b42499b646527dabe1
. - The st_txt_hash property was set to
c4ce1043468e5bba6a6fe9a8ff598e8ecafc52e7a4588cd0a7827b2e5bba7199
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 652575, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 80, '/Alternative descriptive title': 'Security Target Lite', '/Author': 'NXP Semiconductors', '/CertificationID': 'BSI-DSZ-CC-0810', '/Company': 'NXP Semiconductors GmbH Germany', '/Copyright date': '2012', '/CreationDate': "D:20131107104533+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/Descriptive title': 'Security Target Lite', '/Division': 'NXP Semiconductors', '/Document identifier': ' ', '/Keywords': 'CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA', '/ModDate': "D:20131107104604+01'00'", '/Modification date': '04 November 2013', '/Producer': 'Adobe PDF Library 10.0', '/Product name title': '<not applicable>', '/Revision': 'Rev. 2.2', '/Security status': '<Security status>', '/SourceModified': 'D:20131107093632', '/Specification status': 'Evaluation documentation Public', '/Subject': 'P60D024PVB', '/Template date': '29 January 2010', '/Template version': '2.9.0', '/Title': 'Security Target Lite', '/docpath': 'W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D024\\ASE', '/list_of_authors': 'Thomas Rottschaefer', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1', '/relBiblioPath': '..\\Bibliography.doc', '/test_sec_row_naming': 'manufacturer area', '/text_cert_body_long': 'Bundesamt fuer Sicherheit in der Informationstechnik', '/text_cert_body_short': 'BSI', '/text_developer_long': 'NXP Semiconductors, Business Unit Identification', '/text_developer_short': 'NXP', '/text_product_cfgC080': 'P60C080PVA', '/text_product_cfgC144': 'P60C144PVA', '/text_product_cfgD012': 'P60D012PVB', '/text_product_cfgD016': 'P60D016PVB', '/text_product_cfgD024': 'P60D024PVB', '/text_product_cfgD024_nameplate': '9047A', '/text_product_cfgD080': 'P60D080PVA', '/text_product_cfgD144': 'P60D144PVA', '/text_product_cfgD144_nameplate': '9050B', '/text_product_letter': 'B', '/text_product_long': 'NXP Secure Smart Card Controller P60D024/016/012P', '/text_product_minor': 'VB', '/text_product_short': 'P60D024/016/012PVB', '/text_sponsor_long': 'NXP Semiconductors, Business Unit Identification', '/text_sponsor_short': 'NXP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:salesaddresses@nxp.com', 'http://www.nxp.com/']}}
. - The st_frontpage property was set to
{'anssi': {}, 'bsi': {}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 36, 'EAL4': 3, 'EAL6+': 1, 'EAL4+': 1, 'EAL 6': 2, 'EAL6 augmented': 3, 'EAL4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 11, 'ADV_IMP.2': 4, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 4, 'ADV_IMP': 1, 'ADV_FSP.4': 3, 'ADV_SPM': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_CMC.5': 4, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 4, 'ALC_CMC': 4, 'ALC_CMS.4': 3, 'ALC_CMC.4': 3}, 'ATE': {'ATE_COV.3': 4, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 7, 'FAU_SAS.1.1': 1}, 'FCS': {'FCS_RNG.1': 9, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_COP.1.1': 2, 'FCS_CKM.1': 5, 'FCS_CKM.4': 3}, 'FDP': {'FDP_ITT.1': 14, 'FDP_IFC.1': 11, 'FDP_ACC.1': 36, 'FDP_ITT.1.1': 1, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_SDI.2': 7, 'FDP_SDI.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1': 32, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2, 'FDP_FLS.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 4, 'FMT_MSA.3': 20, 'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1': 25, 'FMT_SMR.1': 7, 'FMT_MSA.1.1': 2, 'FMT_SMF.1': 19, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 7, 'FPT_ITT.1': 13, 'FPT_ITT.1.1': 1}, 'FRU': {'FRU_FLT.2': 7}, 'FTP': {'FTP_ITT.1': 1}}, 'cc_claims': {'O': {'O.RND': 3, 'O.INTEGRITY_CHK': 7, 'O.HW_AES': 7, 'O.CUST_RECONFIG': 5, 'O.EEPROM_INTEGRITY': 5, 'O.FM_FW': 9, 'O.MEM_ACCESS': 9, 'O.SFR_ACCESS': 9}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 111, 'NXP Semiconductors': 30}, 'Philips': {'Philips': 1}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 31}}, 'DES': {'DES': {'DES': 16, 'DEA': 2}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1, 'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 14}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 15, 'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 13, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'DPA': 2, 'timing attacks': 2}, 'FI': {'physical tampering': 1, 'Malfunction': 13, 'malfunction': 2, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 1}, 'ISO': {'ISO/IEC 7816': 18, 'ISO/IEC 14443': 10, 'ISO/IEC 18092': 2}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_filename property was set to
0810V2b_pdf.pdf
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}
values added.
- The st_download_ok property was set to
-
23.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_download_ok property was set to
False
. - The st_convert_ok property was set to
False
. - The st_extract_ok property was set to
False
. - The errors property was set to
['failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0810V2b_pdf.pdf, code: nok']
. - The st_pdf_hash property was set to
None
. - The st_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The st_metadata property was set to
None
. - The st_frontpage property was set to
None
. - The st_keywords property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 6}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 6}]}
values added.
- The st_download_ok property was set to
-
22.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
True
. - The report_convert_ok property was set to
True
. - The report_extract_ok property was set to
True
. - The errors property was set to
[]
. - The report_pdf_hash property was set to
b10e1b13b1574906aa3ab8a601c451dc46d9990aa36f03d6e7ed47d8dc42613b
. - The report_txt_hash property was set to
46ed9220b989cac2201135b47a4ece78f9c420224830e3543c87c62ea52326d2
.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 1121979, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 42, '/Author': 'Bundesamt für Sicherheit in der Informationstechnik', '/CreationDate': "D:20140415164656+02'00'", '/Creator': 'Writer', '/Keywords': '"Common Criteria, Certification, Zertifizierung, BSI, P60D024/016/012PVB/PVB(Y), Secure Smart Card Controller, EAL6, NXP"', '/ModDate': "D:20140415165055+02'00'", '/Producer': 'LibreOffice 3.6', '/Subject': 'IT Security', '/Title': 'Certification Report BSI-DSZ-CC-0810-V2-2014', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/']}}
. - The report_frontpage property was set to
{'anssi': {}, 'bsi': {'match_rules': ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)'], 'cert_id': 'BSI-DSZ-CC-0810-V2-2014', 'cert_item': 'NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software', 'developer': 'NXP Semiconductors Germany GmbH', 'cert_lab': 'BSI'}, 'nscib': {}, 'niap': {}, 'canada': {}}
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0810-2012': 6, 'BSI-DSZ-CC-0810-V2-2014': 44}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 4, 'EAL 4': 2, 'EAL 5': 3, 'EAL1': 7, 'EAL4': 7, 'EAL5': 7, 'EAL5+': 1, 'EAL6': 4, 'EAL3': 4, 'EAL7': 4, 'EAL2': 3, 'EAL 6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 6, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 5}, 'R': {'R.O': 5}}, 'vendor': {'NXP': {'NXP': 24, 'NXP Semiconductors': 31}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 6}}, 'DES': {'DES': {'DES': 3}, '3DES': {'Triple-DES': 3, 'TDES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 13}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 1}, 'other': {'reverse engineering': 1, 'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI TR-02102': 1, 'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 1, 'AIS 31': 2, 'AIS 36': 2, 'AIS 35': 2, 'AIS36': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 7816': 4, 'ISO/IEC 14443': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8': 1, '9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1': 1, '11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the': 1, 'platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL': 1, 'smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors': 1, 'Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual': 1, 'Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev': 1, '3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors': 1, '3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0': 1, 'May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP': 1, 'Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List': 1, 'composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the': 1, 'List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document': 1}}}
. - The report_filename property was set to
0810V2a_pdf.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['BSI']
. - The cert_id property was set to
BSI-DSZ-CC-0810-V2-2014
. - The report_references property was updated, with the
{'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0810-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0810-2012']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}]}
values added.
- The report_download_ok property was set to
-
21.12.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report_download_ok property was set to
False
. - The report_convert_ok property was set to
False
. - The report_extract_ok property was set to
False
. - The errors property was set to
['failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0810V2a_pdf.pdf, code: nok', 'failed to download ST from https://www.commoncriteriaportal.org/files/epfiles/0810V2b_pdf.pdf, code: nok', 'failed to download report from https://www.commoncriteriaportal.org/files/epfiles/0810V2a_pdf.pdf, code: nok']
. - The report_pdf_hash property was set to
None
. - The report_txt_hash property was set to
None
.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The report_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referencing': None, 'indirectly_referencing': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}]}
values discarded.
- The report_download_ok property was set to
-
16.11.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The st_metadata property was updated, with the
{'/Alternative descriptive title': 'Security Target Lite', '/Copyright date': '2012', '/Descriptive title': 'Security Target Lite', '/Document identifier': ' ', '/Modification date': '04 November 2013', '/Product name title': '<not applicable>', '/Security status': '<Security status>', '/Specification status': 'Evaluation documentation Public', '/Template date': '29 January 2010', '/Template version': '2.9.0'}
values inserted.
- The st_metadata property was updated, with the
-
05.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}
.
The state of the certificate object was updated.
- The following values were inserted:
{'st_convert_garbage': False, 'report_convert_garbage': False}
.
- The new value is
-
04.10.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_link': None, 'pp_ids': None}]}
.
- The new value is
-
24.09.2022 The certificate data changed.
Certificate changed
The PDF extraction data was updated.
- The following values were inserted:
{'report_filename': '0810V2a_pdf.pdf', 'st_filename': '0810V2b_pdf.pdf'}
. - The report_keywords property was updated, with the
{'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0810-2012': 6, 'BSI-DSZ-CC-0810-V2-2014': 44}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL4': 7, 'EAL6': 4, 'EAL2': 3}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 6}, '__delete__': ['ALC_LCD']}}}, 'cc_claims': {'__update__': {'R': {'R.O': 5}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 6}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 3}}}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'certification_process': {'__update__': {'ConfidentialDocument': {'__insert__': {'Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8': 1, '9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1': 1, '11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the': 1, 'platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL': 1, 'Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual': 1, 'Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev': 1, '3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors': 1, '3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0': 1, 'May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP': 1, 'Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List': 1, 'composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the': 1, 'List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document': 1}, '__delete__': ['B(Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8', 't) [9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version', '1.7, 11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the', 'hardware platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL', 'Business Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual', 'NXP Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors', 'Rev. 3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors', 'Rev. 3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0', '11 May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP', 'Semiconductors, Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List', 'for composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the', 'Configuration List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document']}}}}
data. - The st_keywords property was updated, with the
{'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4 augmented': 1}, '__update__': {'EAL6': 36, 'EAL 6': 2, 'EAL6 augmented': 3}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 11, 'ADV_IMP.2': 4, 'ADV_FSP.4': 3}}, 'ALC': {'__update__': {'ALC_FLR.1': 5, 'ALC_CMC.5': 4, 'ALC_CMS.4': 3, 'ALC_CMC.4': 3}}, 'ATE': {'__update__': {'ATE_COV.3': 4}}}}, 'cc_sfr': {'__insert__': {'FTP': {'FTP_ITT.1': 1}}, '__update__': {'FAU': {'__insert__': {'FAU_SAS.1.1': 1}, '__update__': {'FAU_SAS.1': 7}}, 'FCS': {'__insert__': {'FCS_COP.1.1': 2}, '__update__': {'FCS_RNG.1': 9, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_CKM.4': 3}}, 'FDP': {'__insert__': {'FDP_ITT.1.1': 1, 'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, '__update__': {'FDP_ITT.1': 14, 'FDP_ACC.1': 36, 'FDP_SDI.2': 7, 'FDP_ACF.1': 32}}, 'FMT': {'__insert__': {'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1.1': 2, 'FMT_SMF.1.1': 1}, '__update__': {'FMT_MSA.3': 20, 'FMT_MSA.1': 25, 'FMT_SMR.1': 7, 'FMT_SMF.1': 19}}, 'FPT': {'__insert__': {'FPT_ITT.1.1': 1}, '__update__': {'FPT_ITT.1': 13}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.CUST_RECONFIG': 5, 'O.MEM_ACCESS': 9}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 111, 'NXP Semiconductors': 30}}}}, 'eval_facility': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 31}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 16, 'DEA': 2}}}}}}, 'crypto_engine': {'__update__': {'SmartMX': {'__update__': {'SmartMX2': 15}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'Leak-Inherent': 13, 'DPA': 2}, '__delete__': ['SPA']}, 'FI': {'__insert__': {'physical tampering': 1}, '__update__': {'Malfunction': 13}}}}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS31': 1}}, 'ISO': {'__insert__': {'ISO/IEC 18092': 2}, '__update__': {'ISO/IEC 14443': 10}}}}}
data.
- The following values were inserted:
-
28.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 652575, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 80, '/Alternative#20descriptive#20title': 'Security Target Lite', '/Author': 'NXP Semiconductors', '/CertificationID': 'BSI-DSZ-CC-0810', '/Company': 'NXP Semiconductors GmbH Germany', '/Copyright#20date': '2012', '/CreationDate': "D:20131107104533+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/Descriptive#20title': 'Security Target Lite', '/Division': 'NXP Semiconductors', '/Document#20identifier': ' ', '/Keywords': 'CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA', '/ModDate': "D:20131107104604+01'00'", '/Modification#20date': '04 November 2013', '/Producer': 'Adobe PDF Library 10.0', '/Product#20name#20title': '<not applicable>', '/Revision': 'Rev. 2.2', '/Security#20status': '<Security status>', '/SourceModified': 'D:20131107093632', '/Specification#20status': 'Evaluation documentation Public', '/Subject': 'P60D024PVB', '/Template#20date': '29 January 2010', '/Template#20version': '2.9.0', '/Title': 'Security Target Lite', '/docpath': 'W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D024\\ASE', '/list_of_authors': 'Thomas Rottschaefer', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1', '/relBiblioPath': '..\\Bibliography.doc', '/test_sec_row_naming': 'manufacturer area', '/text_cert_body_long': 'Bundesamt fuer Sicherheit in der Informationstechnik', '/text_cert_body_short': 'BSI', '/text_developer_long': 'NXP Semiconductors, Business Unit Identification', '/text_developer_short': 'NXP', '/text_product_cfgC080': 'P60C080PVA', '/text_product_cfgC144': 'P60C144PVA', '/text_product_cfgD012': 'P60D012PVB', '/text_product_cfgD016': 'P60D016PVB', '/text_product_cfgD024': 'P60D024PVB', '/text_product_cfgD024_nameplate': '9047A', '/text_product_cfgD080': 'P60D080PVA', '/text_product_cfgD144': 'P60D144PVA', '/text_product_cfgD144_nameplate': '9050B', '/text_product_letter': 'B', '/text_product_long': 'NXP Secure Smart Card Controller P60D024/016/012P', '/text_product_minor': 'VB', '/text_product_short': 'P60D024/016/012PVB', '/text_sponsor_long': 'NXP Semiconductors, Business Unit Identification', '/text_sponsor_short': 'NXP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:salesaddresses@nxp.com', 'http://www.nxp.com/']}}
.
- The st_extract_ok property was set to
-
18.07.2022 The certificate data changed.
Certificate changed
The _type was updated.
- The new value is
sec_certs.sample.common_criteria.CommonCriteriaCert
.
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}
.
The state of the certificate object was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState
.
The PDF extraction data was updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData
.
The computed heuristics were updated.
- The _type property was set to
sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics
. - The st_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The report_references property was updated, with the
{'_type': 'sec_certs.sample.certificate.References'}
data. - The extracted_sars property was set to
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}]}
.
- The new value is
-
17.07.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
False
. - The errors property was set to
['Failed to read metadata of certs/targets/pdf/dd81eae9478576f3.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/dd81eae9478576f3.pdf, error: can only concatenate list (not "IndirectObject") to list']
.
The PDF extraction data was updated.
- The report_metadata property was updated, with the
{'pdf_hyperlinks': {'_type': 'Set', 'elements': ['http://www.commoncriteriaportal.org/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/']}}
values inserted. - The st_metadata property was set to
None
. - The report_keywords property was set to
{'cc_cert_id': {'DE': {'BSI-DSZ-CC-0810-2012': 4, 'BSI-DSZ-CC-0810-V2-2014': 84}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 4, 'EAL 4': 2, 'EAL 5': 3, 'EAL1': 7, 'EAL4': 8, 'EAL5': 7, 'EAL5+': 1, 'EAL6': 5, 'EAL2': 4, 'EAL3': 4, 'EAL7': 4, 'EAL 6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_FLR': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1, 'ATE_FUN': 1, 'ATE_IND': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1, 'AVA_VAN': 2}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 5}, 'R': {'R.O.C': 5}}, 'vendor': {'NXP': {'NXP': 24, 'NXP Semiconductors': 31}}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 10}, '3DES': {'Triple-DES': 3, 'TDES': 2}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'RNG': {'RNG': 3}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 13}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'physical probing': 1, 'side channel': 2, 'timing attacks': 1}, 'FI': {'physical tampering': 1}, 'other': {'reverse engineering': 1, 'JIL': 4}}, 'technical_report_id': {'BSI': {'BSI 7125': 2, 'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 1, 'AIS 31': 2, 'AIS 36': 2, 'AIS 35': 2, 'AIS36': 1, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 7816': 4, 'ISO/IEC 14443': 4}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'B(Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8': 1, 't) [9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version': 1, '1.7, 11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the': 1, 'hardware platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically • AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL': 1, 'smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors': 1, 'Business Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual': 1, 'NXP Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors': 1, 'Rev. 3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors': 1, 'Rev. 3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0': 1, '11 May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP': 1, 'Semiconductors, Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List': 1, 'for composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the': 1, 'Configuration List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 37, 'EAL4': 3, 'EAL6+': 1, 'EAL4+': 1, 'EAL 6': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 7, 'ADV_IMP.2': 5, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 4, 'ADV_IMP': 1, 'ADV_FSP.4': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 5, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 4, 'ALC_CMC': 4, 'ALC_CMS.4': 2, 'ALC_CMC.4': 2}, 'ATE': {'ATE_COV.3': 5, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RNG.1': 5, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 1, 'FCS_COP.1': 3, 'FCS_CKM.1': 5, 'FCS_CKM.4': 5}, 'FDP': {'FDP_ITT.1': 4, 'FDP_IFC.1': 11, 'FDP_ACC.1': 12, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_SDI.2': 1, 'FDP_SDI.1': 1, 'FDP_ACF.1': 10, 'FDP_FLS.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 4, 'FMT_MSA.3': 6, 'FMT_MSA.1': 11, 'FMT_SMR.1': 9, 'FMT_SMF.1': 6}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 7, 'FPT_ITT.1': 4}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.INTEGRITY_CHK': 7, 'O.HW_AES': 7, 'O.CUST_RECONFIG': 6, 'O.EEPROM_INTEGRITY': 5, 'O.FM_FW': 9, 'O.MEM_ACCESS': 10, 'O.SFR_ACCESS': 9}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 113, 'NXP Semiconductors': 108}, 'Philips': {'Philips': 1}}, 'eval_facility': {'KSEL': {'KSEL': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 55}}, 'DES': {'DES': {'DES': 43, 'DEA': 6}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1, 'TDES': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 14}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 16, 'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'SPA': 2, 'DPA': 4, 'timing attacks': 2}, 'FI': {'Malfunction': 14, 'malfunction': 2, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816': 18, 'ISO/IEC 14443': 8}, 'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 2, 'CCMB-2009-07-003': 2, 'CCMB-2009-07-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
.
The computed heuristics were updated.
- The _type property was set to
Heuristics
.
- The st_extract_ok property was set to
-
14.06.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The following values were inserted:
{'report_pdf_hash': 'b10e1b13b1574906aa3ab8a601c451dc46d9990aa36f03d6e7ed47d8dc42613b', 'st_pdf_hash': '558cd6262fe13bd5b8b1d9207bb28ba72fbd3259b33223b42499b646527dabe1', 'report_txt_hash': '46ed9220b989cac2201135b47a4ece78f9c420224830e3543c87c62ea52326d2', 'st_txt_hash': 'c4ce1043468e5bba6a6fe9a8ff598e8ecafc52e7a4588cd0a7827b2e5bba7199'}
.
The PDF extraction data was updated.
- The report_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 7, 'DES': 8, 'TDES': 2}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'RNG': 3}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'physical probing': 1, 'physical tampering': 1, 'side channel': 2, 'timing attacks': 1, 'reverse engineering': 1}}
values inserted. - The st_keywords property was updated, with the
{'rules_symmetric_crypto': {'AES': 55, 'DES': 42, 'TDEA': 3, 'DEA': 3, 'TDES': 1}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'RND': 5, 'RNG': 14}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 14, 'malfunction': 2, 'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'DPA': 4, 'fault injection': 3, 'timing attacks': 2}}
values inserted.
- The following values were inserted:
-
13.05.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}]}}
.
- The following values were inserted:
-
24.04.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'direct_dependency_cves': None, 'indirect_dependency_cves': None}
.
- The following values were inserted:
-
08.03.2022 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'st_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': None, 'indirectly_referenced_by': None, 'directly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0810-2012']}, 'indirectly_referencing': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0810-2012']}}}
. - The following properties were deleted:
['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting']
.
- The following values were inserted:
-
18.02.2022 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The st_extract_ok property was set to
True
. - The errors property was set to
[]
.
The PDF extraction data was updated.
- The st_metadata property was set to
{'pdf_file_size_bytes': 652575, 'pdf_is_encrypted': True, 'pdf_number_of_pages': 80, '/Alternative#20descriptive#20title': 'Security Target Lite', '/Author': 'NXP Semiconductors', '/CertificationID': 'BSI-DSZ-CC-0810', '/Company': 'NXP Semiconductors GmbH Germany', '/Copyright#20date': '2012', '/CreationDate': "D:20131107104533+01'00'", '/Creator': 'Acrobat PDFMaker 9.1 for Word', '/Descriptive#20title': 'Security Target Lite', '/Division': 'NXP Semiconductors', '/Document#20identifier': ' ', '/Keywords': 'CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA', '/ModDate': "D:20131107104604+01'00'", '/Modification#20date': '04 November 2013', '/Producer': 'Adobe PDF Library 10.0', '/Product#20name#20title': '<not applicable>', '/Revision': 'Rev. 2.2', '/Security#20status': '<Security status>', '/SourceModified': 'D:20131107093632', '/Specification#20status': 'Evaluation documentation Public', '/Subject': 'P60D024PVB', '/Template#20date': '29 January 2010', '/Template#20version': '2.9.0', '/Title': 'Security Target Lite', '/docpath': 'W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D024\\ASE', '/list_of_authors': 'Thomas Rottschaefer', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1', '/relBiblioPath': '..\\Bibliography.doc', '/test_sec_row_naming': 'manufacturer area', '/text_cert_body_long': 'Bundesamt fuer Sicherheit in der Informationstechnik', '/text_cert_body_short': 'BSI', '/text_developer_long': 'NXP Semiconductors, Business Unit Identification', '/text_developer_short': 'NXP', '/text_product_cfgC080': 'P60C080PVA', '/text_product_cfgC144': 'P60C144PVA', '/text_product_cfgD012': 'P60D012PVB', '/text_product_cfgD016': 'P60D016PVB', '/text_product_cfgD024': 'P60D024PVB', '/text_product_cfgD024_nameplate': '9047A', '/text_product_cfgD080': 'P60D080PVA', '/text_product_cfgD144': 'P60D144PVA', '/text_product_cfgD144_nameplate': '9050B', '/text_product_letter': 'B', '/text_product_long': 'NXP Secure Smart Card Controller P60D024/016/012P', '/text_product_minor': 'VB', '/text_product_short': 'P60D024/016/012PVB', '/text_sponsor_long': 'NXP Semiconductors, Business Unit Identification', '/text_sponsor_short': 'NXP'}
. - The report_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted. - The st_frontpage property was updated, with the
{'nscib': {}, 'niap': {}, 'canada': {}}
values inserted.
The computed heuristics were updated.
- The extracted_versions property was set to
{'_type': 'Set', 'elements': ['016']}
.
- The st_extract_ok property was set to
-
01.02.2022 The certificate data changed.
Certificate changed
The Protection profiles of the certificate were updated.
- The new value is
{'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}
.
- The new value is
-
28.01.2022 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
"cert_link": null,
"dgst": "dd81eae9478576f3",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "BSI-DSZ-CC-0810-V2-2014",
"cert_lab": [
"BSI"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_INT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_OBJ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_SPD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_SPM",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_CCL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_TSS",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_REQ",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "APE_INT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_ECD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 5
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ASE_SPD",
"level": 1
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"016"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0810-2012"
]
},
"indirectly_referenced_by": null,
"indirectly_referencing": {
"_type": "Set",
"elements": [
"BSI-DSZ-CC-0810-2012"
]
}
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
"manufacturer_web": "https://www.nxp.com",
"name": "NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software",
"not_valid_after": "2019-09-01",
"not_valid_before": "2014-04-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "0810V2a_pdf.pdf",
"report_frontpage": {
"DE": {
"cert_id": "BSI-DSZ-CC-0810-V2-2014",
"cert_item": "NXP Secure Smart Card Controller P60D024/016/012PVB/PVB(Y) with IC Dedicated Software",
"cert_lab": "BSI",
"developer": "NXP Semiconductors Germany GmbH",
"match_rules": [
"(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
]
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0810": 1,
"BSI-DSZ-CC-0810-2012": 3,
"BSI-DSZ-CC-0810-V2-2014": 22
}
},
"cc_claims": {
"O": {
"O.C": 5
},
"R": {
"R.O": 5
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-CC-PP-0035-2007": 4
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 1,
"ADV_FSP.1": 1,
"ADV_FSP.2": 1,
"ADV_FSP.3": 1,
"ADV_FSP.4": 1,
"ADV_FSP.5": 2,
"ADV_FSP.6": 1,
"ADV_IMP": 1,
"ADV_IMP.1": 1,
"ADV_IMP.2": 2,
"ADV_INT": 1,
"ADV_INT.1": 1,
"ADV_INT.2": 1,
"ADV_INT.3": 2,
"ADV_SPM": 1,
"ADV_SPM.1": 2,
"ADV_TDS": 1,
"ADV_TDS.1": 1,
"ADV_TDS.2": 1,
"ADV_TDS.3": 1,
"ADV_TDS.4": 1,
"ADV_TDS.5": 2,
"ADV_TDS.6": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 1,
"ALC_CMC.1": 1,
"ALC_CMC.2": 1,
"ALC_CMC.3": 1,
"ALC_CMC.4": 1,
"ALC_CMC.5": 3,
"ALC_CMS": 1,
"ALC_CMS.1": 1,
"ALC_CMS.2": 1,
"ALC_CMS.3": 1,
"ALC_CMS.4": 1,
"ALC_CMS.5": 3,
"ALC_DEL": 1,
"ALC_DEL.1": 2,
"ALC_DVS": 1,
"ALC_DVS.1": 1,
"ALC_DVS.2": 3,
"ALC_FLR": 1,
"ALC_FLR.1": 6,
"ALC_FLR.2": 1,
"ALC_FLR.3": 1,
"ALC_LCD.1": 2,
"ALC_LCD.2": 1,
"ALC_TAT": 1,
"ALC_TAT.1": 1,
"ALC_TAT.2": 1,
"ALC_TAT.3": 3
},
"APE": {
"APE_CCL.1": 1,
"APE_ECD.1": 1,
"APE_INT.1": 1,
"APE_OBJ.1": 1,
"APE_OBJ.2": 1,
"APE_REQ.1": 1,
"APE_REQ.2": 1,
"APE_SPD.1": 1
},
"ASE": {
"ASE_CCL": 1,
"ASE_CCL.1": 1,
"ASE_ECD": 1,
"ASE_ECD.1": 1,
"ASE_INT": 1,
"ASE_INT.1": 1,
"ASE_OBJ": 1,
"ASE_OBJ.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.1": 1,
"ASE_REQ.2": 1,
"ASE_SPD": 1,
"ASE_SPD.1": 1,
"ASE_TSS": 1,
"ASE_TSS.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.1": 1,
"ATE_COV.2": 1,
"ATE_COV.3": 2,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 1,
"ATE_DPT.3": 2,
"ATE_DPT.4": 1,
"ATE_FUN": 1,
"ATE_FUN.1": 1,
"ATE_FUN.2": 2,
"ATE_IND": 1,
"ATE_IND.1": 1,
"ATE_IND.2": 1,
"ATE_IND.3": 1
},
"AVA": {
"AVA_VAN": 2,
"AVA_VAN.1": 1,
"AVA_VAN.2": 1,
"AVA_VAN.3": 1,
"AVA_VAN.4": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 2,
"EAL 5": 3,
"EAL 6": 4,
"EAL 6 augmented": 3,
"EAL1": 7,
"EAL2": 3,
"EAL3": 4,
"EAL4": 7,
"EAL5": 7,
"EAL5+": 1,
"EAL6": 4,
"EAL7": 4
},
"ITSEC": {
"ITSEC Evaluation": 1
}
},
"cc_sfr": {},
"certification_process": {
"ConfidentialDocument": {
"11 March 2014 (confidential document) [11] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Configuration List for the": 1,
"3.0, 06 February 2012 (confidential document) [16] Product Data Sheet Addendum, SmartMX2 family Post Delivery Configuration, NXP Semiconductors": 1,
"3.2, 04 February 2013 (confidential document) [17] Product Data Sheet Addendum, SmartMX2 family Chip Health Mode, NXP Semiconductors, Rev. 3.0": 1,
"9] Evaluation Technical Report BSI-DSZ-CC-0810, Version 1.7, 20 March 2014, T-Systems GEI GmbH (confidential document) [10] ETR for composition according to AIS36, NXP P60D024/016/012PVB, T-Systems GEI GmbH, Version 1": 1,
"List, NXP Semiconductors, Rev. 2.10, 30 August 2013 (confidential document) [21] Order Entry Form P60D024, NXP Semiconductors, Business Unit Identification, online document": 1,
"May 2012 (confidential document) [18] NXP Secure Smart Card Controller P60D024/016/012PVB Configuration List for the firmware, NXP": 1,
"Rev. 1.2, 16 July 2012 (confidential document) [19] NXP Secure Smart Card Controller P60D024/016/012eVB/PVB(Y) Appendix of the Configuration List": 1,
"Semiconductors, Rev. 1.4, 13 November 2012 (confidential document) [15] SmartMX2 P60D024/P60D016/P60D012 VB Wafer and delivery specification, NXP Semiconductors, Rev": 1,
"Unit Identification, Rev. 3.1, 2 February 2012 (confidential document) [14] NXP Secure Smart Card Controller P60D024/P60D016/P60D012 VB Guidance and Operation Manual": 1,
"Y) Security Target, NXP Semiconductors, Business Unit Identification, Rev. 2.2, 04 November 2013 (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [8": 1,
"composite evaluation, NXP Semiconductors, Rev. 2.20, 04 November 2013 (confidential document) [20] NXP Secure Smart Card Controller P60D024/016/012eVB Customer specific Appendix of the": 1,
"platform, NXP Semiconductors, Rev. 2,20, 04 November 2013 (confidential document) 8 specifically \u2022 AIS 25, Version 8, Anwendung der CC auf Integrierte Schaltungen including JIL": 1,
"smart card controller, NXP Semiconductors, Business Unit Identification, Rev. 4.2, 30 August 2013 (confidential document) [13] Instruction set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX2": 13
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RNG": 3
}
},
"side_channel_analysis": {
"FI": {
"physical tampering": 1
},
"SCA": {
"physical probing": 1,
"side channel": 2,
"timing attacks": 1
},
"other": {
"JIL": 4,
"reverse engineering": 1
}
},
"standard_id": {
"BSI": {
"AIS 25": 2,
"AIS 26": 2,
"AIS 31": 2,
"AIS 32": 1,
"AIS 34": 2,
"AIS 35": 2,
"AIS 36": 2,
"AIS 37": 1,
"AIS 38": 1,
"AIS36": 1
},
"ISO": {
"ISO/IEC 14443": 4,
"ISO/IEC 7816": 4
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 6
}
},
"DES": {
"3DES": {
"TDES": 2,
"Triple-DES": 3
},
"DES": {
"DES": 3
}
}
},
"technical_report_id": {
"BSI": {
"BSI 7125": 2,
"BSI 7148": 1,
"BSI TR-02102": 1
}
},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 24,
"NXP Semiconductors": 31
}
},
"vulnerability": {}
},
"report_metadata": {
"/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"/CreationDate": "D:20140415164656+02\u002700\u0027",
"/Creator": "Writer",
"/Keywords": "\"Common Criteria, Certification, Zertifizierung, BSI, P60D024/016/012PVB/PVB(Y), Secure Smart Card Controller, EAL6, NXP\"",
"/ModDate": "D:20140415165055+02\u002700\u0027",
"/Producer": "LibreOffice 3.6",
"/Subject": "IT Security",
"/Title": "Certification Report BSI-DSZ-CC-0810-V2-2014",
"pdf_file_size_bytes": 1121979,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"https://www.bsi.bund.de/zertifizierung",
"http://www.commoncriteriaportal.org/",
"https://www.bsi.bund.de/"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 42
},
"st_filename": "0810V2b_pdf.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {
"ECC": {
"ECC": {
"ECC": 1
}
}
},
"cc_cert_id": {
"DE": {
"BSI-DSZ-CC-0810": 1
}
},
"cc_claims": {
"O": {
"O.CUST_RECONFIG": 5,
"O.EEPROM_INTEGRITY": 5,
"O.FM_FW": 9,
"O.HW_AES": 7,
"O.INTEGRITY_CHK": 7,
"O.MEM_ACCESS": 9,
"O.RND": 3,
"O.SFR_ACCESS": 9
},
"T": {
"T.RND": 2
}
},
"cc_protection_profile_id": {
"BSI": {
"BSI-PP-0035": 1
}
},
"cc_sar": {
"ADV": {
"ADV_ARC": 1,
"ADV_ARC.1": 1,
"ADV_FSP": 4,
"ADV_FSP.4": 3,
"ADV_FSP.5": 11,
"ADV_IMP": 1,
"ADV_IMP.2": 4,
"ADV_INT.3": 1,
"ADV_SPM": 2,
"ADV_SPM.1": 1,
"ADV_TDS.5": 1
},
"AGD": {
"AGD_OPE": 1,
"AGD_OPE.1": 1,
"AGD_PRE": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC": 4,
"ALC_CMC.4": 3,
"ALC_CMC.5": 4,
"ALC_CMS": 4,
"ALC_CMS.4": 3,
"ALC_CMS.5": 5,
"ALC_DEL": 1,
"ALC_DEL.1": 1,
"ALC_DVS": 1,
"ALC_DVS.2": 1,
"ALC_FLR.1": 5,
"ALC_LCD.1": 1,
"ALC_TAT.3": 1
},
"ASE": {
"ASE_CCL.1": 1,
"ASE_ECD.1": 1,
"ASE_INT.1": 1,
"ASE_OBJ.2": 1,
"ASE_REQ.2": 1,
"ASE_SPD.1": 1,
"ASE_TSS.2": 6
},
"ATE": {
"ATE_COV": 1,
"ATE_COV.3": 4,
"ATE_DPT.3": 1,
"ATE_FUN.2": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN": 1,
"AVA_VAN.5": 2
}
},
"cc_security_level": {
"EAL": {
"EAL 6": 2,
"EAL4": 3,
"EAL4 augmented": 1,
"EAL4+": 1,
"EAL6": 36,
"EAL6 augmented": 3,
"EAL6+": 1
}
},
"cc_sfr": {
"FAU": {
"FAU_SAS.1": 7,
"FAU_SAS.1.1": 1
},
"FCS": {
"FCS_CKM.1": 5,
"FCS_CKM.4": 3,
"FCS_COP.1": 23,
"FCS_COP.1.1": 2,
"FCS_RNG.1": 9,
"FCS_RNG.1.1": 3,
"FCS_RNG.1.2": 2
},
"FDP": {
"FDP_ACC.1": 36,
"FDP_ACC.1.1": 2,
"FDP_ACF.1": 32,
"FDP_ACF.1.1": 2,
"FDP_ACF.1.2": 2,
"FDP_ACF.1.3": 2,
"FDP_ACF.1.4": 2,
"FDP_FLS.1": 1,
"FDP_IFC.1": 11,
"FDP_ITC.1": 5,
"FDP_ITC.2": 5,
"FDP_ITT.1": 14,
"FDP_ITT.1.1": 1,
"FDP_SDI.1": 1,
"FDP_SDI.2": 7,
"FDP_SDI.2.1": 1,
"FDP_SDI.2.2": 1
},
"FMT": {
"FMT_LIM.1": 3,
"FMT_LIM.2": 4,
"FMT_MSA.1": 25,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 20,
"FMT_MSA.3.1": 2,
"FMT_MSA.3.2": 2,
"FMT_SMF.1": 19,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 7
},
"FPT": {
"FPT_FLS.1": 7,
"FPT_ITT.1": 13,
"FPT_ITT.1.1": 1,
"FPT_PHP.3": 7
},
"FRU": {
"FRU_FLT.2": 7
},
"FTP": {
"FTP_ITT.1": 1
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {
"SmartMX": {
"SmartMX": 1,
"SmartMX2": 15
}
},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {
"RNG": {
"RND": 5,
"RNG": 14
},
"TRNG": {
"TRNG": 1
}
},
"side_channel_analysis": {
"FI": {
"Malfunction": 13,
"fault injection": 3,
"malfunction": 2,
"physical tampering": 1
},
"SCA": {
"DPA": 2,
"Leak-Inherent": 13,
"Physical Probing": 2,
"physical probing": 1,
"side channel": 1,
"timing attacks": 2
}
},
"standard_id": {
"BSI": {
"AIS31": 1
},
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 2,
"CCMB-2009-07-003": 2,
"CCMB-2009-07-004": 2
},
"FIPS": {
"FIPS PUB 197": 3,
"FIPS PUB 46": 1,
"FIPS PUB 46-3": 3
},
"ISO": {
"ISO/IEC 14443": 10,
"ISO/IEC 18092": 2,
"ISO/IEC 7816": 18
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 31
}
},
"DES": {
"3DES": {
"TDEA": 3,
"TDES": 1,
"Triple-DEA": 1,
"Triple-DES": 9
},
"DES": {
"DEA": 2,
"DES": 16
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {
"NXP": {
"NXP": 111,
"NXP Semiconductors": 30
},
"Philips": {
"Philips": 1
}
},
"vulnerability": {}
},
"st_metadata": {
"/Alternative descriptive title": "Security Target Lite",
"/Author": "NXP Semiconductors",
"/CertificationID": "BSI-DSZ-CC-0810",
"/Company": "NXP Semiconductors GmbH Germany",
"/Copyright date": "2012",
"/CreationDate": "D:20131107104533+01\u002700\u0027",
"/Creator": "Acrobat PDFMaker 9.1 for Word",
"/Descriptive title": "Security Target Lite",
"/Division": "NXP Semiconductors",
"/Document identifier": " ",
"/Keywords": "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144PVA, P60D080PVA",
"/ModDate": "D:20131107104604+01\u002700\u0027",
"/Modification date": "04 November 2013",
"/Producer": "Adobe PDF Library 10.0",
"/Product name title": "\u003cnot applicable\u003e",
"/Revision": "Rev. 2.2",
"/Security status": "\u003cSecurity status\u003e",
"/SourceModified": "D:20131107093632",
"/Specification status": "Evaluation documentation Public",
"/Subject": "P60D024PVB",
"/Template date": "29 January 2010",
"/Template version": "2.9.0",
"/Title": "Security Target Lite",
"/docpath": "W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D024\\ASE",
"/list_of_authors": "Thomas Rottschaefer",
"/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1",
"/relBiblioPath": "..\\Bibliography.doc",
"/test_sec_row_naming": "manufacturer area",
"/text_cert_body_long": "Bundesamt fuer Sicherheit in der Informationstechnik",
"/text_cert_body_short": "BSI",
"/text_developer_long": "NXP Semiconductors, Business Unit Identification",
"/text_developer_short": "NXP",
"/text_product_cfgC080": "P60C080PVA",
"/text_product_cfgC144": "P60C144PVA",
"/text_product_cfgD012": "P60D012PVB",
"/text_product_cfgD016": "P60D016PVB",
"/text_product_cfgD024": "P60D024PVB",
"/text_product_cfgD024_nameplate": "9047A",
"/text_product_cfgD080": "P60D080PVA",
"/text_product_cfgD144": "P60D144PVA",
"/text_product_cfgD144_nameplate": "9050B",
"/text_product_letter": "B",
"/text_product_long": "NXP Secure Smart Card Controller P60D024/016/012P",
"/text_product_minor": "VB",
"/text_product_short": "P60D024/016/012PVB",
"/text_sponsor_long": "NXP Semiconductors, Business Unit Identification",
"/text_sponsor_short": "NXP",
"pdf_file_size_bytes": 652575,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.nxp.com/",
"mailto:salesaddresses@nxp.com"
]
},
"pdf_is_encrypted": true,
"pdf_number_of_pages": 80
}
},
"protection_profiles": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.protection_profile.ProtectionProfile",
"pp_eal": "EAL4+",
"pp_ids": {
"_type": "Set",
"elements": [
"SECURITY_IC_V1.0",
"PKISKPP"
]
},
"pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
"pp_name": "Security IC Platform Protection Profile, Version 1.0"
}
]
},
"report_link": "https://www.commoncriteriaportal.org/files/epfiles/0810V2a_pdf.pdf",
"scheme": "DE",
"security_level": {
"_type": "Set",
"elements": [
"EAL6+",
"ALC_FLR.1"
]
},
"st_link": "https://www.commoncriteriaportal.org/files/epfiles/0810V2b_pdf.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "b10e1b13b1574906aa3ab8a601c451dc46d9990aa36f03d6e7ed47d8dc42613b",
"txt_hash": "46ed9220b989cac2201135b47a4ece78f9c420224830e3543c87c62ea52326d2"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "558cd6262fe13bd5b8b1d9207bb28ba72fbd3259b33223b42499b646527dabe1",
"txt_hash": "c4ce1043468e5bba6a6fe9a8ff598e8ecafc52e7a4588cd0a7827b2e5bba7199"
}
},
"status": "archived"
}