NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software

CSV information ?

Status archived
Valid from 05.02.2016
Valid until 05.02.2021
Scheme 🇩🇪 DE
Manufacturer NXP Semiconductors Germany GmbH Business Line Identification
Category ICs, Smart Cards and Smart Card-Related Devices and Systems
Security level ALC_FLR.1, EAL6+, ASE_TSS.2
Protection profiles
Maintenance updates NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software (17.08.2018) Certification report

Heuristics summary ?

Certificate ID: BSI-DSZ-CC-0978-2016

Certification report ?

Extracted keywords

Symmetric Algorithms
AES, DES, Triple-DES, TDES
Randomness
TRNG, RNG
Engines
SmartMX2

Vendor
NXP, NXP Semiconductors

Security level
EAL 6, EAL 5, EAL 2, EAL 1, EAL 4, EAL5, EAL 5+, EAL 3, EAL 7, EAL 6 augmented, ITSEC Evaluation
Claims
O.C, R.O
Security Assurance Requirements (SAR)
ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_SPM.1, ADV_TDS.5, ADV_ARC.1, ADV_FSP.1, ADV_FSP.2, ADV_FSP.3, ADV_FSP.4, ADV_FSP.6, ADV_IMP.1, ADV_INT.1, ADV_INT.2, ADV_TDS.1, ADV_TDS.2, ADV_TDS.3, ADV_TDS.4, ADV_TDS.6, ADV_ARC, ADV_FSP, ADV_IMP, ADV_INT, ADV_SPM, ADV_TDS, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_FLR, ALC_CMC.5, ALC_CMS.5, ALC_DVS.2, ALC_TAT.3, ALC_CMC.1, ALC_CMC.2, ALC_CMC.3, ALC_CMC.4, ALC_CMS.1, ALC_CMS.2, ALC_CMS.3, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_FLR.3, ALC_LCD.1, ALC_LCD.2, ALC_TAT.1, ALC_TAT.2, ALC_CMC, ALC_CMS, ALC_DEL, ALC_DVS, ALC_TAT, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_FUN, ATE_IND, ATE_COV.1, ATE_COV.2, ATE_DPT.1, ATE_DPT.2, ATE_DPT.4, ATE_FUN.1, ATE_IND.1, ATE_IND.2, ATE_IND.3, ATE_COV, ATE_DPT, AVA_VAN.5, AVA_VAN, AVA_VAN.1, AVA_VAN.2, AVA_VAN.3, AVA_VAN.4, APE_INT.1, APE_CCL.1, APE_SPD.1, APE_OBJ.1, APE_OBJ.2, APE_ECD.1, APE_REQ.1, APE_REQ.2, ASE_TSS.2, ASE_INT.1, ASE_CCL.1, ASE_SPD.1, ASE_OBJ.1, ASE_OBJ.2, ASE_ECD.1, ASE_REQ.1, ASE_REQ.2, ASE_TSS.1, ASE_CCL, ASE_ECD, ASE_INT, ASE_OBJ, ASE_SPD, ASE_TSS
Protection profiles
BSI-CC-PP-0035-2007
Certificates
BSI-DSZ-CC-0978-2016
Evaluation facilities
TÜV Informationstechnik, TÜViT
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9, Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP, Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP, Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card, NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE, Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE, NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP, Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors, Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP, Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller, Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification, Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry

Side-channel analysis
SPA, DPA, JIL
Certification process
being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification, Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9, Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP, Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP, Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card, NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors, Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE, Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE, NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP, Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors, Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP, Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller, Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification, Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry

Standards
AIS 34, AIS 25, AIS 26, AIS 37, AIS 31, AIS 36, AIS31, AIS 35, AIS 32, AIS 38, ISO/IEC 15408, ISO/IEC 18045, ISO/IEC 17065, ISO/IEC 14443, ISO/IEC 7816
Technical reports
BSI TR-02102, BSI 7148

File metadata

Title: Certification Report BSI-DSZ-CC-0978-2016
Subject: Common Criteria Certification
Keywords: "Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP"
Author: Bundesamt für Sicherheit in der Informationstechnik
Creation date: D:20160223160422+01'00'
Modification date: D:20160224080500+01'00'
Pages: 42
Creator: Writer
Producer: LibreOffice 4.2

Frontpage

Certificate ID: BSI-DSZ-CC-0978-2016
Certified item: NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
Certification lab: BSI
Developer: NXP Semiconductors Germany GmbH

References

Incoming
  • ANSSI-CC-2016/40 - ID-One ePass Full EAC v2 MRTD en configuration EAC avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/27 - ID-One eIDAS v1.0 en configuration SSCD-3 sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0957-V2-2016 - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
  • ANSSI-CC-2016/39 - ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/28 - ID-One eIDAS v1.0 en configuration SSCD-4 sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0809-V2-2016 - TCOS Passport Version 2.1 Release 2-BAC/ P60D144
  • BSI-DSZ-CC-0808-V2-2016 - TCOS Passport Version 2.1 Release 2/P60D144
  • ANSSI-CC-2016/52 - ID-One eIDL v1.0 en configuration BAP avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/26 - ID-One eIDAS v1.0 en configuration SSCD-2 sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0978-V2-2017 - NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software
  • ANSSI-CC-2016/50 - ID-One eIDL v1.0 en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/29 - ID-One eIDAS v1.0 en configuration SSCD-5 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/38 - ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/51 - ID-One eIDL v1.0 en configuration EAC avec BAP et AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/30 - ID-One eIDAS v1.0 en configuration SSCD-6 sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/41 - ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/49 - ID-One eIDL v1.0 en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0817-V2-2016 - TCOS Identity Card Version 1.1 Release 2/P60D144

Security target ?

Extracted keywords

Symmetric Algorithms
AES, DES, DEA, Triple-DES, TDEA, Triple-DEA
Asymmetric Algorithms
ECC
Randomness
TRNG, RND, RNG
Engines
SmartMX2, SmartMX

Vendor
NXP, NXP Semiconductors

Security level
EAL6, EAL4, EAL6+, EAL4+, EAL 6, EAL6 augmented, EAL4 augmented
Claims
O.RND, O.HW_AES, O.CUST_RECONFIG, O.EEPROM_INTEGRITY, O.FM_FW, O.MEM_ACCESS, O.SFR_ACCESS, T.RND
Security Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.5, ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ADV_SPM.1, ADV_ARC, ADV_FSP, ADV_IMP, ADV_FSP.4, ADV_SPM, AGD_OPE.1, AGD_PRE.1, AGD_OPE, AGD_PRE, ALC_FLR.1, ALC_CMC.5, ALC_CMS.5, ALC_DEL.1, ALC_DVS.2, ALC_LCD.1, ALC_TAT.3, ALC_DEL, ALC_DVS, ALC_CMS, ALC_CMC, ALC_CMS.4, ALC_CMC.4, ATE_COV.3, ATE_DPT.3, ATE_FUN.2, ATE_IND.2, ATE_COV, AVA_VAN.5, AVA_VAN, ASE_TSS.2, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
Security Functional Requirements (SFR)
FAU_SAS.1, FAU_SAS.1.1, FCS_RNG.1, FCS_RNG.1.1, FCS_RNG.1.2, FCS_COP.1, FCS_COP.1.1, FCS_CKM.1, FCS_CKM.4, FDP_ITT.1, FDP_IFC.1, FDP_ITC.1, FDP_ITC.2, FDP_SDI.2, FDP_SDI.1, FDP_SDI.2.1, FDP_SDI.2.2, FDP_ACC.1, FDP_ACC.1.1, FDP_ACF.1, FDP_ACF.1.1, FDP_ACF.1.2, FDP_ACF.1.3, FDP_ACF.1.4, FDP_FLS.1, FMT_LIM.1, FMT_LIM.2, FMT_MSA.3, FMT_MSA.3.1, FMT_MSA.3.2, FMT_MSA.1, FMT_SMR.1, FMT_MSA.1.1, FMT_SMF.1, FMT_SMF.1.1, FPT_FLS.1, FPT_PHP.3, FPT_ITT.1, FRU_FLT.2
Protection profiles
BSI-PP-0035

Side-channel analysis
Leak-Inherent, Physical Probing, physical probing, side channel, DPA, timing attacks, physical tampering, Malfunction, malfunction, fault injection

Standards
FIPS PUB 46-3, FIPS PUB 197, FIPS PUB 46, AIS31, ISO/IEC 7816, ISO/IEC 14443, ISO/IEC 18092, CCMB-2012-09-001, CCMB-2012-09-004

File metadata

Title: Security Target Lite
Subject: P60x144/080yVA/yVA(Y/B/X)/yVE
Keywords: CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE
Author: NXP Semiconductors
Creation date: D:20151210161030+01'00'
Modification date: D:20151210161132+01'00'
Pages: 87
Creator: Acrobat PDFMaker 11 für Word
Producer: Adobe PDF Library 11.0

References

Incoming
  • ANSSI-CC-2016/40 - ID-One ePass Full EAC v2 MRTD en configuration EAC avec AA masqué sur les composants P60x144PVA/PVE
  • BSI-DSZ-CC-0957-V2-2016 - TCOS Smart Meter Security Module Version 1.0 Release 1/P60C144PVA
  • ANSSI-CC-2016/39 - ID-One ePass Full EAC v2 MRTD en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/52 - ID-One eIDL v1.0 en configuration BAP avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/50 - ID-One eIDL v1.0 en configuration EAC et PACE avec AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/38 - ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/51 - ID-One eIDL v1.0 en configuration EAC avec BAP et AA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/41 - ID-One ePass Full EAC v2 MRTD en configuration BAC avec AA et CA masqué sur les composants P60x144PVA/PVE
  • ANSSI-CC-2016/49 - ID-One eIDL v1.0 en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x144PVA/PVE

Heuristics ?

Certificate ID: BSI-DSZ-CC-0978-2016

Extracted SARs

APE_INT.1, APE_ECD.1, ASE_OBJ.2, ASE_INT.1, ADV_SPM.1, APE_OBJ.2, ASE_TSS.2, ADV_ARC.1, ALC_DEL.1, ATE_FUN.2, ALC_DVS.2, ADV_FSP.5, AVA_VAN.5, ASE_REQ.2, APE_CCL.1, ALC_FLR.1, ADV_INT.3, ADV_IMP.2, ASE_CCL.1, ATE_COV.3, APE_REQ.2, ALC_TAT.3, ALC_CMC.5, ADV_TDS.5, ASE_ECD.1, AGD_OPE.1, ATE_DPT.3, APE_SPD.1, AGD_PRE.1, ASE_SPD.1, ATE_IND.2, ALC_CMS.5, ALC_LCD.1

References ?

Updates ?

  • 28.01.2022 The certificate was first processed.
    New certificate

    A new Common Criteria certificate with the product name NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software was processed.

  • 01.02.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.
  • 18.02.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The report_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.
    • The st_frontpage property was updated, with the {'nscib': {}, 'niap': {}, 'canada': {}} values inserted.

    The computed heuristics were updated.

    • The extracted_versions property was set to {'_type': 'Set', 'elements': ['-']}.
    • The directly_affected_by property was set to {'_type': 'Set', 'elements': ['ANSSI-CC-2016/49', 'ANSSI-CC-2016/26', 'BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/51', 'ANSSI-CC-2016/50', 'ANSSI-CC-2016/30', 'BSI-DSZ-CC-0808-V2-2016', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0978-V2-2017', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/27', 'ANSSI-CC-2016/28', 'ANSSI-CC-2016/29', 'ANSSI-CC-2016/52', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/41', 'ANSSI-CC-2016/38']}.
  • 08.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'st_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/49', 'ANSSI-CC-2016/51', 'ANSSI-CC-2016/50', 'BSI-DSZ-CC-0957-V2-2016', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/52', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/41', 'ANSSI-CC-2016/38']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/49', 'ANSSI-CC-2016/51', 'ANSSI-CC-2016/50', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0918-2020', 'ANSSI-CC-2016/40', 'BSI-DSZ-CC-0918-V2-2021', 'BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V2-2020', 'ANSSI-CC-2016/52', 'BSI-DSZ-CC-0918-V3-2022', 'ANSSI-CC-2016/39', 'BSI-DSZ-CC-0831-V4-2021', 'ANSSI-CC-2016/41', 'ANSSI-CC-2016/38']}, 'directly_referencing': None, 'indirectly_referencing': None}, 'report_references': {'_type': 'References', 'directly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/49', 'ANSSI-CC-2016/26', 'BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/51', 'ANSSI-CC-2016/30', 'BSI-DSZ-CC-0808-V2-2016', 'ANSSI-CC-2016/50', 'BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0957-V2-2016', 'BSI-DSZ-CC-0978-V2-2017', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/27', 'ANSSI-CC-2016/28', 'ANSSI-CC-2016/29', 'ANSSI-CC-2016/52', 'ANSSI-CC-2016/39', 'ANSSI-CC-2016/41', 'ANSSI-CC-2016/38']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['ANSSI-CC-2016/26', 'BSI-DSZ-CC-0978-V3-2019', 'BSI-DSZ-CC-0809-V3-2017', 'BSI-DSZ-CC-0978-V2-2017', 'BSI-DSZ-CC-0831-V3-2021', 'ANSSI-CC-2016/28', 'ANSSI-CC-2016/41', 'ANSSI-CC-2016/49', 'ANSSI-CC-2016/51', 'ANSSI-CC-2016/50', 'BSI-DSZ-CC-0831-V2-2020', 'ANSSI-CC-2016/29', 'BSI-DSZ-CC-1035-2017', 'ANSSI-CC-2016/39', 'BSI-DSZ-CC-0919-V2-2021', 'BSI-DSZ-CC-0831-V4-2021', 'BSI-DSZ-CC-0808-V2-2016', 'ANSSI-CC-2016/38', 'BSI-DSZ-CC-0817-V2-2016', 'ANSSI-CC-2016/30', 'BSI-DSZ-CC-0809-V2-2016', 'BSI-DSZ-CC-0957-V2-2016', 'ANSSI-CC-2016/40', 'ANSSI-CC-2016/27', 'ANSSI-CC-2016/52', 'BSI-DSZ-CC-0808-V3-2017']}, 'directly_referencing': None, 'indirectly_referencing': None}}.
    • The following properties were deleted: ['directly_affected_by', 'indirectly_affected_by', 'directly_affecting', 'indirectly_affecting'].
  • 19.03.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}}} data.
    • The report_references property was updated, with the {'indirectly_referenced_by': {'__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0918-V4-2022']}}} data.
  • 24.04.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'direct_dependency_cves': None, 'indirect_dependency_cves': None}.
  • 13.05.2022 The certificate data changed.
    Certificate changed

    The computed heuristics were updated.

    • The following values were inserted: {'extracted_sars': {'_type': 'Set', 'elements': [{'_type': 'SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'SAR', 'family': 'ALC_FLR', 'level': 1}]}}.
  • 14.06.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The following values were inserted: {'report_pdf_hash': 'be3fc3fa8851f16aa02445b6d43a0d05dcae3aded916d5ca0ddefc07200624f2', 'st_pdf_hash': '21e2fdbc441003344f6bfb846d02418402eebcf5bf09d26d33adac2a0348fcb3', 'report_txt_hash': '532d223e7b93839f1b0a634a1edcfe27691bb9bbb5e1cfa704437449643cf98a', 'st_txt_hash': 'e89fa1f8b114250cfe1c97b48bf1d36845b6f05a4f72addb81cb1aec7134b617'}.

    The PDF extraction data was updated.

    • The report_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 7, 'DES': 10, 'TDES': 3}, 'rules_asymmetric_crypto': {}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'RNG': 4}, 'rules_tee': {'SE': 1}, 'rules_side_channels': {'SPA': 1, 'DPA': 1}} values inserted.
    • The st_keywords property was updated, with the {'rules_symmetric_crypto': {'AES': 55, 'DES': 41, 'TDEA': 3, 'DEA': 3}, 'rules_asymmetric_crypto': {'ECC': 1}, 'rules_pq_crypto': {}, 'rules_hashes': {}, 'rules_crypto_schemes': {}, 'rules_randomness': {'TRNG': 1, 'RND': 5, 'RNG': 14}, 'rules_tee': {}, 'rules_side_channels': {'Malfunction': 11, 'malfunction': 2, 'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'DPA': 4, 'fault injection': 3, 'timing attacks': 2}} values inserted.
  • 17.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to False.
    • The errors property was set to ['Failed to read metadata of certs/targets/pdf/f2c2231b0ffae4d7.pdf, error: can only concatenate list (not "IndirectObject") to list', 'Failed to read metadata of certs/targets/pdf/f2c2231b0ffae4d7.pdf, error: can only concatenate list (not "IndirectObject") to list'].

    The PDF extraction data was updated.

    • The report_metadata property was updated, with the {'pdf_hyperlinks': {'_type': 'Set', 'elements': ['https://www.bsi.bund.de/zertifizierungsreporte', 'https://www.bsi.bund.de/AIS', 'http://www.commoncriteriaportal.org/', 'http://www.sogisportal.eu/', 'https://www.bsi.bund.de/zertifizierung', 'https://www.bsi.bund.de/']}} values inserted.
    • The st_metadata property was set to None.
    • The report_keywords property was set to {'cc_cert_id': {'DE': {'BSI-DSZ-CC-0978-2016': 84}}, 'cc_protection_profile_id': {'BSI': {'BSI-CC-PP-0035-2007': 4}}, 'cc_security_level': {'EAL': {'EAL 6': 9, 'EAL 5': 9, 'EAL 2': 8, 'EAL 1': 7, 'EAL 4': 7, 'EAL5': 1, 'EAL 5+': 1, 'EAL 3': 4, 'EAL 7': 4, 'EAL 6 augmented': 3}, 'ITSEC': {'ITSEC Evaluation': 1}}, 'cc_sar': {'ADV': {'ADV_FSP.5': 2, 'ADV_IMP.2': 2, 'ADV_INT.3': 2, 'ADV_SPM.1': 2, 'ADV_TDS.5': 2, 'ADV_ARC.1': 1, 'ADV_FSP.1': 1, 'ADV_FSP.2': 1, 'ADV_FSP.3': 1, 'ADV_FSP.4': 1, 'ADV_FSP.6': 1, 'ADV_IMP.1': 1, 'ADV_INT.1': 1, 'ADV_INT.2': 1, 'ADV_TDS.1': 1, 'ADV_TDS.2': 1, 'ADV_TDS.3': 1, 'ADV_TDS.4': 1, 'ADV_TDS.6': 1, 'ADV_ARC': 1, 'ADV_FSP': 1, 'ADV_IMP': 1, 'ADV_INT': 1, 'ADV_SPM': 1, 'ADV_TDS': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 5, 'ALC_FLR': 3, 'ALC_CMC.5': 3, 'ALC_CMS.5': 3, 'ALC_DVS.2': 3, 'ALC_TAT.3': 3, 'ALC_CMC.1': 1, 'ALC_CMC.2': 1, 'ALC_CMC.3': 1, 'ALC_CMC.4': 1, 'ALC_CMS.1': 1, 'ALC_CMS.2': 1, 'ALC_CMS.3': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 2, 'ALC_DVS.1': 1, 'ALC_FLR.2': 1, 'ALC_FLR.3': 1, 'ALC_LCD.1': 2, 'ALC_LCD.2': 1, 'ALC_TAT.1': 1, 'ALC_TAT.2': 1, 'ALC_CMC': 1, 'ALC_CMS': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_LCD': 1, 'ALC_TAT': 1}, 'ATE': {'ATE_COV.3': 2, 'ATE_DPT.3': 2, 'ATE_FUN.2': 2, 'ATE_FUN': 3, 'ATE_IND': 2, 'ATE_COV.1': 1, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_DPT.2': 1, 'ATE_DPT.4': 1, 'ATE_FUN.1': 1, 'ATE_IND.1': 1, 'ATE_IND.2': 1, 'ATE_IND.3': 1, 'ATE_COV': 1, 'ATE_DPT': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 3, 'AVA_VAN.1': 1, 'AVA_VAN.2': 1, 'AVA_VAN.3': 1, 'AVA_VAN.4': 1}, 'APE': {'APE_INT.1': 1, 'APE_CCL.1': 1, 'APE_SPD.1': 1, 'APE_OBJ.1': 1, 'APE_OBJ.2': 1, 'APE_ECD.1': 1, 'APE_REQ.1': 1, 'APE_REQ.2': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_INT.1': 1, 'ASE_CCL.1': 1, 'ASE_SPD.1': 1, 'ASE_OBJ.1': 1, 'ASE_OBJ.2': 1, 'ASE_ECD.1': 1, 'ASE_REQ.1': 1, 'ASE_REQ.2': 1, 'ASE_TSS.1': 1, 'ASE_CCL': 1, 'ASE_ECD': 1, 'ASE_INT': 1, 'ASE_OBJ': 1, 'ASE_SPD': 1, 'ASE_TSS': 1}}, 'cc_sfr': {}, 'cc_claims': {'O': {'O.C': 7}, 'R': {'R.O.C': 7}}, 'vendor': {'NXP': {'NXP': 35, 'NXP Semiconductors': 54}}, 'eval_facility': {'TUV': {'TÜV Informationstechnik': 4, 'TÜViT': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 7}}, 'DES': {'DES': {'DES': 13}, '3DES': {'Triple-DES': 5, 'TDES': 3}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RNG': 4}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 16}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'SPA': 1, 'DPA': 1}, 'other': {'JIL': 3}}, 'technical_report_id': {'BSI': {'BSI 7148': 1}}, 'device_model': {}, 'tee_name': {'IBM': {'SE': 1}}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'BSI': {'AIS 34': 2, 'AIS 25': 2, 'AIS 26': 2, 'AIS 37': 1, 'AIS 31': 2, 'AIS 36': 3, 'AIS31': 1, 'AIS 35': 2, 'AIS 32': 1, 'AIS 38': 1}, 'ISO': {'ISO/IEC 15408': 2, 'ISO/IEC 17065': 2, 'ISO/IEC 14443': 4, 'ISO/IEC 7816': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'ConfidentialDocument': {'identiality being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 't Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE': 1, 'with IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9': 1, '0978-2016 Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP': 1, 'Semiconductors, Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP': 1, 'Semiconductors, Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card': 1, 'roller, NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors': 1, 'Document Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE': 1, 'NXP Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE': 1, 'fication, NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP': 1, 'Semiconductors, Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors': 1, 'Document Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP': 1, 'Semiconductors, Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller': 1, 'NXP Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification': 1, 'NXP Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry': 1}}}.
    • The st_keywords property was set to {'cc_cert_id': {}, 'cc_protection_profile_id': {'BSI': {'BSI-PP-0035': 1}}, 'cc_security_level': {'EAL': {'EAL6': 37, 'EAL4': 3, 'EAL6+': 1, 'EAL4+': 1, 'EAL 6': 1, 'EAL6 augmented': 2}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.5': 7, 'ADV_IMP.2': 5, 'ADV_INT.3': 1, 'ADV_TDS.5': 1, 'ADV_SPM.1': 1, 'ADV_ARC': 1, 'ADV_FSP': 4, 'ADV_IMP': 1, 'ADV_FSP.4': 2, 'ADV_SPM': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1, 'AGD_OPE': 1, 'AGD_PRE': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.5': 5, 'ALC_CMS.5': 5, 'ALC_DEL.1': 1, 'ALC_DVS.2': 1, 'ALC_LCD.1': 1, 'ALC_TAT.3': 1, 'ALC_DEL': 1, 'ALC_DVS': 1, 'ALC_CMS': 4, 'ALC_CMC': 4, 'ALC_CMS.4': 2, 'ALC_CMC.4': 2}, 'ATE': {'ATE_COV.3': 5, 'ATE_DPT.3': 1, 'ATE_FUN.2': 1, 'ATE_IND.2': 1, 'ATE_COV': 1}, 'AVA': {'AVA_VAN.5': 2, 'AVA_VAN': 1}, 'ASE': {'ASE_TSS.2': 6, 'ASE_CCL.1': 1, 'ASE_ECD.1': 1, 'ASE_INT.1': 1, 'ASE_OBJ.2': 1, 'ASE_REQ.2': 1, 'ASE_SPD.1': 1}}, 'cc_sfr': {'FAU': {'FAU_SAS.1': 4}, 'FCS': {'FCS_RNG.1': 5, 'FCS_RNG.1.1': 2, 'FCS_RNG.1.2': 1, 'FCS_COP.1': 2, 'FCS_CKM.1': 5, 'FCS_CKM.4': 5}, 'FDP': {'FDP_ITT.1': 1, 'FDP_IFC.1': 10, 'FDP_ITC.1': 5, 'FDP_ITC.2': 5, 'FDP_SDI.2': 1, 'FDP_SDI.1': 1, 'FDP_ACC.1': 11, 'FDP_ACF.1': 10, 'FDP_FLS.1': 1}, 'FMT': {'FMT_LIM.1': 3, 'FMT_LIM.2': 4, 'FMT_MSA.3': 6, 'FMT_MSA.1': 11, 'FMT_SMR.1': 9, 'FMT_SMF.1': 6}, 'FPT': {'FPT_FLS.1': 7, 'FPT_PHP.3': 7, 'FPT_ITT.1': 1}, 'FRU': {'FRU_FLT.2': 7}}, 'cc_claims': {'O': {'O.RND': 3, 'O.HW_AES': 7, 'O.CUST_RECONFIG': 6, 'O.EEPROM_INTEGRITY': 5, 'O.FM_FW': 9, 'O.MEM_ACCESS': 10, 'O.SFR_ACCESS': 9}, 'T': {'T.RND': 2}}, 'vendor': {'NXP': {'NXP': 140, 'NXP Semiconductors': 134}}, 'eval_facility': {'KSEL': {'KSEL': 1}}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 55}}, 'DES': {'DES': {'DES': 41, 'DEA': 6}, '3DES': {'Triple-DES': 9, 'TDEA': 3, 'Triple-DEA': 1}}}, 'asymmetric_crypto': {'ECC': {'ECC': {'ECC': 1}}}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {'TRNG': {'TRNG': 1}, 'RNG': {'RND': 5, 'RNG': 14}}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {'SmartMX': {'SmartMX2': 21, 'SmartMX': 1}}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'SCA': {'Leak-Inherent': 11, 'Physical Probing': 2, 'physical probing': 1, 'side channel': 1, 'SPA': 2, 'DPA': 4, 'timing attacks': 2}, 'FI': {'Malfunction': 11, 'malfunction': 2, 'fault injection': 3}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'FIPS': {'FIPS PUB 46-3': 3, 'FIPS PUB 197': 3, 'FIPS PUB 46': 1}, 'BSI': {'AIS31': 2}, 'ISO': {'ISO/IEC 7816': 22, 'ISO/IEC 14443': 14}, 'CC': {'CCMB-2012-09-001': 1, 'CCMB-2012-09-004': 2}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}.

    The computed heuristics were updated.

    • The _type property was set to Heuristics.
  • 18.07.2022 The certificate data changed.
    Certificate changed

    The _type was updated.

    • The new value is sec_certs.sample.common_criteria.CommonCriteriaCert.

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.

    The Maintenance Updates of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport', 'maintenance_date': '2018-08-17', 'maintenance_title': 'NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/files/epfiles/0978V2ma1a_pdf.pdf', 'maintenance_st_link': None}]}.

    The state of the certificate object was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState.

    The PDF extraction data was updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData.

    The computed heuristics were updated.

    • The _type property was set to sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics.
    • The st_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The report_references property was updated, with the {'_type': 'sec_certs.sample.certificate.References'} data.
    • The extracted_sars property was set to {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_INT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_SPM', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_OBJ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_TSS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_FLR', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_INT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_CCL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_REQ', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_ECD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'APE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ASE_SPD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 5}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}]}.
  • 28.07.2022 The certificate data changed.
    Certificate changed

    The state of the certificate object was updated.

    • The st_extract_ok property was set to True.
    • The errors property was set to [].

    The PDF extraction data was updated.

    • The st_metadata property was set to {'pdf_file_size_bytes': 878457, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 87, '/Alternative#20descriptive#20title': 'Security Target Lite', '/Author': 'NXP Semiconductors', '/CertificationID': 'BSI-DSZ-CC-0978', '/Company': 'NXP Semiconductors GmbH Germany', '/Copyright#20date': '2015', '/CreationDate': "D:20151210161030+01'00'", '/Creator': 'Acrobat PDFMaker 11 für Word', '/Descriptive#20title': 'Security Target Lite', '/Division': 'NXP Semiconductors', '/Document#20identifier': ' ', '/Keywords': 'CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE', '/ModDate': "D:20151210161132+01'00'", '/Modification#20date': '14 October 2015', '/Producer': 'Adobe PDF Library 11.0', '/Product#20name#20title': '<not applicable>', '/Revision': 'Rev. 2.61', '/Security#20status': '<Security status>', '/SourceModified': 'D:20151210150346', '/Specification#20status': 'Evaluation documentation PUBLIC', '/Subject': 'P60x144/080yVA/yVA(Y/B/X)/yVE', '/Template#20date': '29 January 2010', '/Template#20version': '2.9.0', '/Title': 'Security Target Lite', '/docpath': 'W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D144\\ASE', '/list_of_authors': ' ', '/philips_smx_cl_docpath': 'I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1', '/relBiblioPath': '..\\Bibliography.doc', '/test_sec_row_naming': 'manufacturer area', '/text_cert_body_long': 'Bundesamt fuer Sicherheit in der Informationstechnik', '/text_cert_body_short': 'BSI', '/text_developer_long': 'NXP Semiconductors, Business Unit Security & Connectivity', '/text_developer_short': 'NXP Semiconductors', '/text_product_cfgC080': 'P60C080P', '/text_product_cfgC144': 'P60C144P', '/text_product_cfgD080': 'P60D080y', '/text_product_cfgD144': 'P60D144y', '/text_product_cfgD144_nameplate': '9050C', '/text_product_letter': 'A', '/text_product_long': 'NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE', '/text_product_minor': 'VA/VE', '/text_product_short': 'NXP Secure Smart Card Controller P60x144/080y', '/text_product_short_pa': 'P60x144/080yVA/VE', '/text_product_short_pa_b': 'P60x144/080yVA(B)', '/text_product_short_pa_y': 'P60x144/080yVA(Y)', '/text_product_short_pe': 'P60x144/080yVE', '/text_sponsor_long': 'NXP Semiconductors, Business Unit Security & Connectivity', '/text_sponsor_short': 'NXP', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:salesaddresses@nxp.com', 'http://www.nxp.com/']}}.
  • 24.09.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The following values were inserted: {'report_filename': '0978a_pdf.pdf', 'st_filename': '0978b_pdf.pdf'}.
    • The report_keywords property was updated, with the {'cc_cert_id': {'__update__': {'DE': {'__update__': {'BSI-DSZ-CC-0978-2016': 44}}}}, 'cc_security_level': {'__update__': {'EAL': {'__update__': {'EAL 6': 8, 'EAL 2': 7, 'EAL 4': 6}}}}, 'cc_sar': {'__update__': {'ALC': {'__update__': {'ALC_FLR.1': 6}, '__delete__': ['ALC_LCD']}}}, 'cc_claims': {'__update__': {'R': {'R.O': 7}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 36, 'NXP Semiconductors': 53}}}}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 6}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 4}}}}}}, 'randomness': {'__update__': {'RNG': {'__update__': {'RNG': 3}}}}, 'technical_report_id': {'__update__': {'BSI': {'__insert__': {'BSI TR-02102': 1}}}}, 'tee_name': {}, 'standard_id': {'__update__': {'ISO': {'__insert__': {'ISO/IEC 18045': 4}, '__update__': {'ISO/IEC 15408': 4}}}}, 'certification_process': {'__update__': {'ConfidentialDocument': {'being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification': 1, 'Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE': 1, 'IC Dedicated Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9': 1, 'Certification Report Software, TÜV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP': 1, 'Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP': 1, 'Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card': 1, 'NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors': 1, 'Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE': 1, 'Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE': 1, 'NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP': 1, 'Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors': 1, 'Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP': 1, 'Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller': 1, 'Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification': 1, 'Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry': 1}}}} data.
    • The st_keywords property was updated, with the {'cc_security_level': {'__update__': {'EAL': {'__insert__': {'EAL4 augmented': 1}, '__update__': {'EAL6': 36, 'EAL 6': 2, 'EAL6 augmented': 3}}}}, 'cc_sar': {'__update__': {'ADV': {'__update__': {'ADV_FSP.5': 11, 'ADV_IMP.2': 4, 'ADV_FSP.4': 3}}, 'ALC': {'__update__': {'ALC_FLR.1': 5, 'ALC_CMC.5': 4, 'ALC_CMS.4': 3, 'ALC_CMC.4': 3}}, 'ATE': {'__update__': {'ATE_COV.3': 4}}}}, 'cc_sfr': {'__update__': {'FAU': {'__insert__': {'FAU_SAS.1.1': 1}, '__update__': {'FAU_SAS.1': 7}}, 'FCS': {'__insert__': {'FCS_COP.1.1': 2}, '__update__': {'FCS_RNG.1': 9, 'FCS_RNG.1.1': 3, 'FCS_RNG.1.2': 2, 'FCS_COP.1': 23, 'FCS_CKM.4': 3}}, 'FDP': {'__insert__': {'FDP_SDI.2.1': 1, 'FDP_SDI.2.2': 1, 'FDP_ACC.1.1': 2, 'FDP_ACF.1.1': 2, 'FDP_ACF.1.2': 2, 'FDP_ACF.1.3': 2, 'FDP_ACF.1.4': 2}, '__update__': {'FDP_ITT.1': 6, 'FDP_SDI.2': 7, 'FDP_ACC.1': 35, 'FDP_ACF.1': 32}}, 'FMT': {'__insert__': {'FMT_MSA.3.1': 2, 'FMT_MSA.3.2': 2, 'FMT_MSA.1.1': 2, 'FMT_SMF.1.1': 1}, '__update__': {'FMT_MSA.3': 20, 'FMT_MSA.1': 25, 'FMT_SMR.1': 7, 'FMT_SMF.1': 19}}, 'FPT': {'__update__': {'FPT_ITT.1': 6}}}}, 'cc_claims': {'__update__': {'O': {'__update__': {'O.CUST_RECONFIG': 5, 'O.MEM_ACCESS': 9}}}}, 'vendor': {'__update__': {'NXP': {'__update__': {'NXP': 138, 'NXP Semiconductors': 49}}}}, 'eval_facility': {}, 'symmetric_crypto': {'__update__': {'AES_competition': {'__update__': {'AES': {'__update__': {'AES': 32}}}}, 'DES': {'__update__': {'DES': {'__update__': {'DES': 16, 'DEA': 2}}}}}}, 'side_channel_analysis': {'__update__': {'SCA': {'__update__': {'Leak-Inherent': 13, 'DPA': 2}, '__delete__': ['SPA']}, 'FI': {'__insert__': {'physical tampering': 1}, '__update__': {'Malfunction': 10}}}}, 'standard_id': {'__update__': {'BSI': {'__update__': {'AIS31': 1}}, 'ISO': {'__insert__': {'ISO/IEC 18092': 2}, '__update__': {'ISO/IEC 14443': 16}}}}} data.

    The computed heuristics were updated.

    • The st_references property was updated, with the {'indirectly_referenced_by': {'__discard__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0831-V3-2021', 'BSI-DSZ-CC-0831-V2-2020', 'BSI-DSZ-CC-0831-V4-2021']}, '__add__': {'_type': 'Set', 'elements': ['BSI-DSZ-CC-0919-V2-2021']}}} data.
  • 04.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'http://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_link': None, 'pp_ids': None}]}.
  • 05.10.2022 The certificate data changed.
    Certificate changed

    The Protection profiles of the certificate were updated.

    • The new value is {'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile, Version 1.0', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf', 'pp_ids': {'_type': 'Set', 'elements': ['PKISKPP', 'SECURITY_IC_V1.0']}}]}.

    The state of the certificate object was updated.

    • The following values were inserted: {'st_convert_garbage': False, 'report_convert_garbage': False}.
  • 16.11.2022 The certificate data changed.
    Certificate changed

    The PDF extraction data was updated.

    • The st_metadata property was updated, with the {'/Alternative descriptive title': 'Security Target Lite', '/Copyright date': '2015', '/Descriptive title': 'Security Target Lite', '/Document identifier': ' ', '/Modification date': '14 October 2015', '/Product name title': '<not applicable>', '/Security status': '<Security status>', '/Specification status': 'Evaluation documentation PUBLIC', '/Template date': '29 January 2010', '/Template version': '2.9.0'} values inserted.

Raw data

{
  "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert",
  "category": "ICs, Smart Cards and Smart Card-Related Devices and Systems",
  "cert_link": null,
  "dgst": "f2c2231b0ffae4d7",
  "heuristics": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.Heuristics",
    "cert_id": "BSI-DSZ-CC-0978-2016",
    "cert_lab": [
      "BSI"
    ],
    "cpe_matches": null,
    "direct_dependency_cves": null,
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_COV",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_INT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_IMP",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DVS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_SPM",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_DEL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_LCD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_TDS",
          "level": 5
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_FUN",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_DPT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "APE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_ARC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_TAT",
          "level": 3
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_FLR",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "-"
      ]
    },
    "indirect_dependency_cves": null,
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/52",
          "BSI-DSZ-CC-0809-V2-2016",
          "ANSSI-CC-2016/49",
          "ANSSI-CC-2016/26",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/50",
          "ANSSI-CC-2016/30",
          "ANSSI-CC-2016/38",
          "BSI-DSZ-CC-0978-V2-2017",
          "ANSSI-CC-2016/27",
          "ANSSI-CC-2016/41",
          "ANSSI-CC-2016/51",
          "ANSSI-CC-2016/39",
          "ANSSI-CC-2016/29",
          "BSI-DSZ-CC-0817-V2-2016",
          "BSI-DSZ-CC-0808-V2-2016",
          "ANSSI-CC-2016/28"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "BSI-DSZ-CC-0808-V3-2017",
          "ANSSI-CC-2016/30",
          "ANSSI-CC-2016/50",
          "BSI-DSZ-CC-0808-V2-2016",
          "ANSSI-CC-2016/26",
          "BSI-DSZ-CC-0809-V3-2017",
          "BSI-DSZ-CC-0831-V2-2020",
          "ANSSI-CC-2016/38",
          "BSI-DSZ-CC-0831-V4-2021",
          "ANSSI-CC-2016/27",
          "BSI-DSZ-CC-0919-V2-2021",
          "ANSSI-CC-2016/39",
          "ANSSI-CC-2016/28",
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/52",
          "BSI-DSZ-CC-0809-V2-2016",
          "ANSSI-CC-2016/49",
          "ANSSI-CC-2016/51",
          "BSI-DSZ-CC-0817-V2-2016",
          "BSI-DSZ-CC-0957-V2-2016",
          "BSI-DSZ-CC-0831-V3-2021",
          "BSI-DSZ-CC-0978-V2-2017",
          "ANSSI-CC-2016/41",
          "ANSSI-CC-2016/29",
          "BSI-DSZ-CC-1035-2017",
          "BSI-DSZ-CC-0978-V3-2019",
          "BSI-DSZ-CC-0918-V4-2022"
        ]
      },
      "indirectly_referencing": null
    },
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/52",
          "ANSSI-CC-2016/49",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/50",
          "ANSSI-CC-2016/38",
          "ANSSI-CC-2016/41",
          "ANSSI-CC-2016/51",
          "ANSSI-CC-2016/39"
        ]
      },
      "directly_referencing": null,
      "indirectly_referenced_by": {
        "_type": "Set",
        "elements": [
          "ANSSI-CC-2016/40",
          "ANSSI-CC-2016/52",
          "ANSSI-CC-2016/49",
          "BSI-DSZ-CC-0957-V2-2016",
          "ANSSI-CC-2016/50",
          "ANSSI-CC-2016/38",
          "ANSSI-CC-2016/41",
          "ANSSI-CC-2016/51",
          "ANSSI-CC-2016/39",
          "BSI-DSZ-CC-0919-V2-2021",
          "BSI-DSZ-CC-0918-V4-2022",
          "BSI-DSZ-CC-0918-V2-2021",
          "BSI-DSZ-CC-0918-2020",
          "BSI-DSZ-CC-0918-V3-2022"
        ]
      },
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.MaintenanceReport",
        "maintenance_date": "2018-08-17",
        "maintenance_report_link": "https://www.commoncriteriaportal.org/files/epfiles/0978V2ma1a_pdf.pdf",
        "maintenance_st_link": null,
        "maintenance_title": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software"
      }
    ]
  },
  "manufacturer": "NXP Semiconductors Germany GmbH Business Line Identification",
  "manufacturer_web": "https://www.nxp.com",
  "name": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software",
  "not_valid_after": "2021-02-05",
  "not_valid_before": "2016-02-05",
  "pdf_data": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.PdfData",
    "report_filename": "0978a_pdf.pdf",
    "report_frontpage": {
      "anssi": {},
      "bsi": {
        "cc_security_level": "Common Criteria Part 3 conformant EAL 6 augmented by ASE_TSS.2, ALC_FLR.1 SOGIS Recognition Agreement",
        "cc_version": "PP conformant plus product specific extensions Common Criteria Part 2 extended",
        "cert_id": "BSI-DSZ-CC-0978-2016",
        "cert_item": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE with IC Dedicated Software",
        "cert_lab": "BSI",
        "developer": "NXP Semiconductors Germany GmbH",
        "match_rules": [
          "(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)"
        ],
        "ref_protection_profiles": "Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007"
      },
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "DE": {
          "BSI-DSZ-CC-0978-2016": 44
        }
      },
      "cc_claims": {
        "O": {
          "O.C": 7
        },
        "R": {
          "R.O": 7
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-CC-PP-0035-2007": 4
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 1,
          "ADV_FSP.1": 1,
          "ADV_FSP.2": 1,
          "ADV_FSP.3": 1,
          "ADV_FSP.4": 1,
          "ADV_FSP.5": 2,
          "ADV_FSP.6": 1,
          "ADV_IMP": 1,
          "ADV_IMP.1": 1,
          "ADV_IMP.2": 2,
          "ADV_INT": 1,
          "ADV_INT.1": 1,
          "ADV_INT.2": 1,
          "ADV_INT.3": 2,
          "ADV_SPM": 1,
          "ADV_SPM.1": 2,
          "ADV_TDS": 1,
          "ADV_TDS.1": 1,
          "ADV_TDS.2": 1,
          "ADV_TDS.3": 1,
          "ADV_TDS.4": 1,
          "ADV_TDS.5": 2,
          "ADV_TDS.6": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 1,
          "ALC_CMC.1": 1,
          "ALC_CMC.2": 1,
          "ALC_CMC.3": 1,
          "ALC_CMC.4": 1,
          "ALC_CMC.5": 3,
          "ALC_CMS": 1,
          "ALC_CMS.1": 1,
          "ALC_CMS.2": 1,
          "ALC_CMS.3": 1,
          "ALC_CMS.4": 1,
          "ALC_CMS.5": 3,
          "ALC_DEL": 1,
          "ALC_DEL.1": 2,
          "ALC_DVS": 1,
          "ALC_DVS.1": 1,
          "ALC_DVS.2": 3,
          "ALC_FLR": 3,
          "ALC_FLR.1": 6,
          "ALC_FLR.2": 1,
          "ALC_FLR.3": 1,
          "ALC_LCD.1": 2,
          "ALC_LCD.2": 1,
          "ALC_TAT": 1,
          "ALC_TAT.1": 1,
          "ALC_TAT.2": 1,
          "ALC_TAT.3": 3
        },
        "APE": {
          "APE_CCL.1": 1,
          "APE_ECD.1": 1,
          "APE_INT.1": 1,
          "APE_OBJ.1": 1,
          "APE_OBJ.2": 1,
          "APE_REQ.1": 1,
          "APE_REQ.2": 1,
          "APE_SPD.1": 1
        },
        "ASE": {
          "ASE_CCL": 1,
          "ASE_CCL.1": 1,
          "ASE_ECD": 1,
          "ASE_ECD.1": 1,
          "ASE_INT": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ": 1,
          "ASE_OBJ.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.1": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS": 1,
          "ASE_TSS.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.1": 1,
          "ATE_COV.2": 1,
          "ATE_COV.3": 2,
          "ATE_DPT": 1,
          "ATE_DPT.1": 1,
          "ATE_DPT.2": 1,
          "ATE_DPT.3": 2,
          "ATE_DPT.4": 1,
          "ATE_FUN": 3,
          "ATE_FUN.1": 1,
          "ATE_FUN.2": 2,
          "ATE_IND": 2,
          "ATE_IND.1": 1,
          "ATE_IND.2": 1,
          "ATE_IND.3": 1
        },
        "AVA": {
          "AVA_VAN": 3,
          "AVA_VAN.1": 1,
          "AVA_VAN.2": 1,
          "AVA_VAN.3": 1,
          "AVA_VAN.4": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 1": 7,
          "EAL 2": 7,
          "EAL 3": 4,
          "EAL 4": 6,
          "EAL 5": 9,
          "EAL 5+": 1,
          "EAL 6": 8,
          "EAL 6 augmented": 3,
          "EAL 7": 4,
          "EAL5": 1
        },
        "ITSEC": {
          "ITSEC Evaluation": 1
        }
      },
      "cc_sfr": {},
      "certification_process": {
        "ConfidentialDocument": {
          "Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE, NXP Semiconductors, Version 2.61, 14 October 2015 (confidential document) [7] Evaluation Technical Report, NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE": 1,
          "Certification Report Software, T\u00dcV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [11] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Configuration List,NXP": 1,
          "Document Number 2250** ,NXP Semiconductors, Version 3.2, 04 February 2013 (confidential document) [18] Product data sheet addendum: SmartMX2 family Chip Health Mode (CHM), NXP Semiconductors": 1,
          "Document Number 2333**, NXP Semiconductors, Version 4.2, 24 June 2015 (confidential document) [20] Product data sheet SmartMX2 family P60N144 VA, Secure high-performance smart card controller": 1,
          "IC Dedicated Software, T\u00dcV Informationstechnik GmbH, Version 2, 17 December 2015 (confidential document) [8] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007 [9": 1,
          "NXP Semiconductors Document Number 1658**, NXP Semiconductors, Version 5.4, 14 August 2015 (confidential document) [14] Instruction Set for the SmartMX2 family, Secure smart card controller, NXP Semiconductors": 1,
          "NXP Semiconductors, Document Number 1569**, NXP Semiconductors, Version 3.7, 21 May 2014 (confidential document) [17] Product data sheet addendum: SmartMX2 family Post Delivery Configuration (PDC), NXP": 1,
          "Number 1478**, NXP Semiconductors, Version 3.1, 02 February 2012 (confidential document) [15] Information on Guidance and Operation, NXP Secure Smart Card Controller P60x080/144P VA/VE": 1,
          "Number 2244**, NXP Semiconductors, Version 3.1, 01 October 2014 (confidential document) [19] Product data sheet addendum: SmartMX2 family Firmware Interface Specification (FIS), NXP": 1,
          "Semiconductors, Document Number 2408**, NXP Semiconductors, Version 3.2, 14 August 2014 (confidential document) [21] Product data sheet addendum: SmartMX2 family P60N144 VA/VE, Wafer and delivery specification": 1,
          "Semiconductors, Document Number 2414**, NXP Semiconductors, Version 3.2, 06 June 2015 (confidential document) [22] Order Entry Form, P60C144, NXP Semiconductors, Version 3.2, 06 October 2015 [23] Order Entry": 1,
          "Semiconductors, NXP Semiconductors, Version 2.7, 12 November 2015 (confidential document) [16] Product data sheet addendum: SmartMX2 family P60D080/144 VA/VE and P60C080/144 VA/VE": 1,
          "Version 1.4, 11 September 2015 (confidential document) [13] Product data sheet SmartMX2 family P60x080/144 VA/VE, Secure high-performance smart card": 1,
          "Version 2.7, 25 September 2015 (confidential document) [12] NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE Evaluation Reference List, NXP": 1,
          "being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification": 1
        }
      },
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX2": 16
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "TUV": {
          "T\u00dcV Informationstechnik": 4,
          "T\u00dcViT": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RNG": 3
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "SCA": {
          "DPA": 1,
          "SPA": 1
        },
        "other": {
          "JIL": 3
        }
      },
      "standard_id": {
        "BSI": {
          "AIS 25": 2,
          "AIS 26": 2,
          "AIS 31": 2,
          "AIS 32": 1,
          "AIS 34": 2,
          "AIS 35": 2,
          "AIS 36": 3,
          "AIS 37": 1,
          "AIS 38": 1,
          "AIS31": 1
        },
        "ISO": {
          "ISO/IEC 14443": 4,
          "ISO/IEC 15408": 4,
          "ISO/IEC 17065": 2,
          "ISO/IEC 18045": 4,
          "ISO/IEC 7816": 2
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 6
          }
        },
        "DES": {
          "3DES": {
            "TDES": 3,
            "Triple-DES": 5
          },
          "DES": {
            "DES": 4
          }
        }
      },
      "technical_report_id": {
        "BSI": {
          "BSI 7148": 1,
          "BSI TR-02102": 1
        }
      },
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 36,
          "NXP Semiconductors": 53
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "/CreationDate": "D:20160223160422+01\u002700\u0027",
      "/Creator": "Writer",
      "/Keywords": "\"Common Criteria, Certification, Zertifizierung, BSI, P60x144/080yVA/yVA(Y/B/X)y/VE, Secure Smart Card Controller, EAL6, NXP\"",
      "/ModDate": "D:20160224080500+01\u002700\u0027",
      "/Producer": "LibreOffice 4.2",
      "/Subject": "Common Criteria Certification",
      "/Title": "Certification Report BSI-DSZ-CC-0978-2016",
      "pdf_file_size_bytes": 1316475,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.commoncriteriaportal.org/",
          "https://www.bsi.bund.de/AIS",
          "https://www.bsi.bund.de/zertifizierung",
          "https://www.bsi.bund.de/",
          "http://www.sogisportal.eu/",
          "https://www.bsi.bund.de/zertifizierungsreporte"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 42
    },
    "st_filename": "0978b_pdf.pdf",
    "st_frontpage": {
      "anssi": {},
      "bsi": {},
      "canada": {},
      "niap": {},
      "nscib": {}
    },
    "st_keywords": {
      "asymmetric_crypto": {
        "ECC": {
          "ECC": {
            "ECC": 1
          }
        }
      },
      "cc_cert_id": {},
      "cc_claims": {
        "O": {
          "O.CUST_RECONFIG": 5,
          "O.EEPROM_INTEGRITY": 5,
          "O.FM_FW": 9,
          "O.HW_AES": 7,
          "O.MEM_ACCESS": 9,
          "O.RND": 3,
          "O.SFR_ACCESS": 9
        },
        "T": {
          "T.RND": 2
        }
      },
      "cc_protection_profile_id": {
        "BSI": {
          "BSI-PP-0035": 1
        }
      },
      "cc_sar": {
        "ADV": {
          "ADV_ARC": 1,
          "ADV_ARC.1": 1,
          "ADV_FSP": 4,
          "ADV_FSP.4": 3,
          "ADV_FSP.5": 11,
          "ADV_IMP": 1,
          "ADV_IMP.2": 4,
          "ADV_INT.3": 1,
          "ADV_SPM": 2,
          "ADV_SPM.1": 1,
          "ADV_TDS.5": 1
        },
        "AGD": {
          "AGD_OPE": 1,
          "AGD_OPE.1": 1,
          "AGD_PRE": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC": 4,
          "ALC_CMC.4": 3,
          "ALC_CMC.5": 4,
          "ALC_CMS": 4,
          "ALC_CMS.4": 3,
          "ALC_CMS.5": 5,
          "ALC_DEL": 1,
          "ALC_DEL.1": 1,
          "ALC_DVS": 1,
          "ALC_DVS.2": 1,
          "ALC_FLR.1": 5,
          "ALC_LCD.1": 1,
          "ALC_TAT.3": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.2": 6
        },
        "ATE": {
          "ATE_COV": 1,
          "ATE_COV.3": 4,
          "ATE_DPT.3": 1,
          "ATE_FUN.2": 1,
          "ATE_IND.2": 1
        },
        "AVA": {
          "AVA_VAN": 1,
          "AVA_VAN.5": 2
        }
      },
      "cc_security_level": {
        "EAL": {
          "EAL 6": 2,
          "EAL4": 3,
          "EAL4 augmented": 1,
          "EAL4+": 1,
          "EAL6": 36,
          "EAL6 augmented": 3,
          "EAL6+": 1
        }
      },
      "cc_sfr": {
        "FAU": {
          "FAU_SAS.1": 7,
          "FAU_SAS.1.1": 1
        },
        "FCS": {
          "FCS_CKM.1": 5,
          "FCS_CKM.4": 3,
          "FCS_COP.1": 23,
          "FCS_COP.1.1": 2,
          "FCS_RNG.1": 9,
          "FCS_RNG.1.1": 3,
          "FCS_RNG.1.2": 2
        },
        "FDP": {
          "FDP_ACC.1": 35,
          "FDP_ACC.1.1": 2,
          "FDP_ACF.1": 32,
          "FDP_ACF.1.1": 2,
          "FDP_ACF.1.2": 2,
          "FDP_ACF.1.3": 2,
          "FDP_ACF.1.4": 2,
          "FDP_FLS.1": 1,
          "FDP_IFC.1": 10,
          "FDP_ITC.1": 5,
          "FDP_ITC.2": 5,
          "FDP_ITT.1": 6,
          "FDP_SDI.1": 1,
          "FDP_SDI.2": 7,
          "FDP_SDI.2.1": 1,
          "FDP_SDI.2.2": 1
        },
        "FMT": {
          "FMT_LIM.1": 3,
          "FMT_LIM.2": 4,
          "FMT_MSA.1": 25,
          "FMT_MSA.1.1": 2,
          "FMT_MSA.3": 20,
          "FMT_MSA.3.1": 2,
          "FMT_MSA.3.2": 2,
          "FMT_SMF.1": 19,
          "FMT_SMF.1.1": 1,
          "FMT_SMR.1": 7
        },
        "FPT": {
          "FPT_FLS.1": 7,
          "FPT_ITT.1": 6,
          "FPT_PHP.3": 7
        },
        "FRU": {
          "FRU_FLT.2": 7
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {
        "SmartMX": {
          "SmartMX": 1,
          "SmartMX2": 21
        }
      },
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {},
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {
        "RNG": {
          "RND": 5,
          "RNG": 14
        },
        "TRNG": {
          "TRNG": 1
        }
      },
      "side_channel_analysis": {
        "FI": {
          "Malfunction": 10,
          "fault injection": 3,
          "malfunction": 2,
          "physical tampering": 1
        },
        "SCA": {
          "DPA": 2,
          "Leak-Inherent": 13,
          "Physical Probing": 2,
          "physical probing": 1,
          "side channel": 1,
          "timing attacks": 2
        }
      },
      "standard_id": {
        "BSI": {
          "AIS31": 1
        },
        "CC": {
          "CCMB-2012-09-001": 1,
          "CCMB-2012-09-004": 2
        },
        "FIPS": {
          "FIPS PUB 197": 3,
          "FIPS PUB 46": 1,
          "FIPS PUB 46-3": 3
        },
        "ISO": {
          "ISO/IEC 14443": 16,
          "ISO/IEC 18092": 2,
          "ISO/IEC 7816": 22
        }
      },
      "symmetric_crypto": {
        "AES_competition": {
          "AES": {
            "AES": 32
          }
        },
        "DES": {
          "3DES": {
            "TDEA": 3,
            "Triple-DEA": 1,
            "Triple-DES": 9
          },
          "DES": {
            "DEA": 2,
            "DES": 16
          }
        }
      },
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "NXP": {
          "NXP": 138,
          "NXP Semiconductors": 49
        }
      },
      "vulnerability": {}
    },
    "st_metadata": {
      "/Alternative descriptive title": "Security Target Lite",
      "/Author": "NXP Semiconductors",
      "/CertificationID": "BSI-DSZ-CC-0978",
      "/Company": "NXP Semiconductors GmbH Germany",
      "/Copyright date": "2015",
      "/CreationDate": "D:20151210161030+01\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 11 f\u00fcr Word",
      "/Descriptive title": "Security Target Lite",
      "/Division": "NXP Semiconductors",
      "/Document identifier": " ",
      "/Keywords": "CC Security Evaluation, Security Target, Functional Requirements, Security Functionality, Assurance Level EAL6+, P60D144yVA, P60D080yVA, P60D144yVE, P60D080yVE",
      "/ModDate": "D:20151210161132+01\u002700\u0027",
      "/Modification date": "14 October 2015",
      "/Producer": "Adobe PDF Library 11.0",
      "/Product name title": "\u003cnot applicable\u003e",
      "/Revision": "Rev. 2.61",
      "/Security status": "\u003cSecurity status\u003e",
      "/SourceModified": "D:20151210150346",
      "/Specification status": "Evaluation documentation                                    PUBLIC",
      "/Subject": "P60x144/080yVA/yVA(Y/B/X)/yVE",
      "/Template date": "29 January 2010",
      "/Template version": "2.9.0",
      "/Title": "Security Target Lite",
      "/docpath": "W:\\WORKAREA_01\\data\\id_smx21_lib\\id_smx21\\DOCUMENTS\\project_docu\\Evaluation\\Procedure_P60D144\\ASE",
      "/list_of_authors": " ",
      "/philips_smx_cl_docpath": "I:\\P5_CryptoLib\\SmxCl\\docs\\99_prj_mgmt\\Templates\\V2.9.0_R1",
      "/relBiblioPath": "..\\Bibliography.doc",
      "/test_sec_row_naming": "manufacturer area",
      "/text_cert_body_long": "Bundesamt fuer Sicherheit in der Informationstechnik",
      "/text_cert_body_short": "BSI",
      "/text_developer_long": "NXP Semiconductors, Business Unit Security \u0026 Connectivity",
      "/text_developer_short": "NXP Semiconductors",
      "/text_product_cfgC080": "P60C080P",
      "/text_product_cfgC144": "P60C144P",
      "/text_product_cfgD080": "P60D080y",
      "/text_product_cfgD144": "P60D144y",
      "/text_product_cfgD144_nameplate": "9050C",
      "/text_product_letter": "A",
      "/text_product_long": "NXP Secure Smart Card Controller P60x144/080yVA/yVA(Y/B/X)/yVE",
      "/text_product_minor": "VA/VE",
      "/text_product_short": "NXP Secure Smart Card Controller P60x144/080y",
      "/text_product_short_pa": "P60x144/080yVA/VE",
      "/text_product_short_pa_b": "P60x144/080yVA(B)",
      "/text_product_short_pa_y": "P60x144/080yVA(Y)",
      "/text_product_short_pe": "P60x144/080yVE",
      "/text_sponsor_long": "NXP Semiconductors, Business Unit Security \u0026 Connectivity",
      "/text_sponsor_short": "NXP",
      "pdf_file_size_bytes": 878457,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "mailto:salesaddresses@nxp.com",
          "http://www.nxp.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 87
    }
  },
  "protection_profiles": {
    "_type": "Set",
    "elements": [
      {
        "_type": "sec_certs.sample.protection_profile.ProtectionProfile",
        "pp_eal": "EAL4+",
        "pp_ids": {
          "_type": "Set",
          "elements": [
            "PKISKPP",
            "SECURITY_IC_V1.0"
          ]
        },
        "pp_link": "https://www.commoncriteriaportal.org/files/ppfiles/pp0035b.pdf",
        "pp_name": "Security IC Platform Protection Profile, Version 1.0"
      }
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/files/epfiles/0978a_pdf.pdf",
  "scheme": "DE",
  "security_level": {
    "_type": "Set",
    "elements": [
      "EAL6+",
      "ASE_TSS.2",
      "ALC_FLR.1"
    ]
  },
  "st_link": "https://www.commoncriteriaportal.org/files/epfiles/0978b_pdf.pdf",
  "state": {
    "_type": "sec_certs.sample.common_criteria.CommonCriteriaCert.InternalState",
    "errors": [],
    "report_convert_garbage": false,
    "report_convert_ok": true,
    "report_download_ok": true,
    "report_extract_ok": true,
    "report_pdf_hash": "be3fc3fa8851f16aa02445b6d43a0d05dcae3aded916d5ca0ddefc07200624f2",
    "report_txt_hash": "532d223e7b93839f1b0a634a1edcfe27691bb9bbb5e1cfa704437449643cf98a",
    "st_convert_garbage": false,
    "st_convert_ok": true,
    "st_download_ok": true,
    "st_extract_ok": true,
    "st_pdf_hash": "21e2fdbc441003344f6bfb846d02418402eebcf5bf09d26d33adac2a0348fcb3",
    "st_txt_hash": "e89fa1f8b114250cfe1c97b48bf1d36845b6f05a4f72addb81cb1aec7134b617"
  },
  "status": "archived"
}