Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0)
ANSSI-CC-2021/63
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
BSI-DSZ-CC-0772-2014
name eTravel Essential 1.3-2.0 – PACE, EAC and AA activated (Version 1.0) - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6
category ICs, Smart Cards and Smart Card-Related Devices and Systems Data Protection
not_valid_before 2021-12-27 2014-11-07
not_valid_after 2026-12-27 2019-11-08
scheme FR DE
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_63en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf
status active archived
manufacturer THALES DIS FRANCE SA Kanguru Solutions
manufacturer_web https://www.thalesgroup.com/en/europe/france https://www.kanguru.com
security_level EAL5+, AVA_VAN.5, ALC_DVS.2 ALC_FLR.1, EAL2+
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021-63.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2021-63.pdf None
protection_profiles frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document with ICAO Application Extended Access Control with PACE, Version 1.3', 'pp_eal': 'EAL4', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0056_V2b_pdf.pdf', 'pp_ids': frozenset({'MRTD_ICAO_EAC_V1.3', 'MRTD-PP_V1.10'})}), frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE_PP)', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0068_V2b_pdf.pdf', 'pp_ids': frozenset({'EPASS_PACE_V1.0', 'MRTD_SAC_PACEV2_V1.0', 'EPASS_V1.0'})}) frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})})
maintenance_updates frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'})
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash 32e26ef126836f11d819ded89c392e95e5dc043be59388890114901e352970bf None
state/cert/txt_hash 4162aa6c1ef7663e3fd8d8d04453fd9403e65a80a804da45b0c16df1efed3545 None
state/report/convert_garbage True False
state/report/pdf_hash 801b4b6ab02ac1461780bc60a53fb5aac50b4953c92c107d69bb55a99eee6103 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57
state/report/txt_hash b4a8d425ec06ccc960b97599cab83786e8a7a16638c4a04461ce5a8ea9ef7aa8 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82
state/st/pdf_hash b6f9c0ee062c33e6b17b38f9d3d39a1de43b47d735626824c0885f274a7fc314 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d
state/st/txt_hash d0f77cb5b059e8530061dcf60cf24a981df384209297e2a8c65b1c4069095102 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147
heuristics/cert_id ANSSI-CC-2021/63 BSI-DSZ-CC-0772-2014
heuristics/cert_lab None BSI
heuristics/extracted_versions 2.0, 1.0, 1.3 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6
heuristics/report_references/directly_referencing BSI-DSZ-CC-1156-V2-2021 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-1156-2021, BSI-DSZ-CC-1156-V2-2021 None
heuristics/scheme_data
  • product: eTravel Essential 1.3-2.0 - PACE, EAC and AA activated (Version 1.0)
  • url: https://cyber.gouv.fr/produits-certifies/etravel-essential-13-20-pace-eac-and-aa-activated-version-10
  • description: Le produit évalué est « eTravel Essential 1.3-2.0 - PACE, EAC and AA activated, version 1.0 » développé par THALES DIS FRANCE SAS et INFINEON TECHNOLOGIES AG. Le produit évalué est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile interna
  • sponsor: THALES DIS FRANCE SAS
  • developer: THALES DIS FRANCE SAS
  • cert_id: 2021/63
  • level: EAL5+
  • expiration_date: 27 Décembre 2026
  • enhanced:
    • cert_id: 2021/63
    • certification_date: 27/12/2021
    • expiration_date: 27/12/2026
    • category: Cartes à puce
    • cc_version: Critères Communs version 3.1r5
    • developer: THALES DIS FRANCE SAS
    • sponsor: THALES DIS FRANCE SAS
    • evaluation_facility: CEA - LETI
    • level: EAL5+
    • protection_profile: Machine Readable Travel Document with « ICAO Application », Extended Access Control with PACE, version 1.3.2 Certifié BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.0.1 Certifié BSI-CC-PP-0068-V2-2011-MA-01
    • mutual_recognition: SOG-IS CCRA
    • augmented: ALC_DVS.2, AVA_VAN.5
    • cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-anssi-cc-2021-63.pdf
    • target_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2021_63en.pdf
    • report_link: https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2021-63.pdf
None
heuristics/st_references/directly_referencing BSI-DSZ-CC-1156-2021 None
heuristics/st_references/indirectly_referencing BSI-DSZ-CC-1156-2021 None
pdf_data/cert_filename certificat-anssi-cc-2021-63.pdf None
pdf_data/cert_keywords
  • cc_cert_id:
    • FR:
      • ANSSI-CC-2021/63: 2
  • cc_protection_profile_id:
    • BSI:
      • BSI-CC-PP-0068-V2-: 1
  • cc_security_level:
  • cc_sar:
    • AVA:
      • AVA_VANS: 1
  • cc_sfr:
  • cc_claims:
  • vendor:
  • eval_facility:
    • CEA-LETI:
      • CEA - LETI: 2
  • symmetric_crypto:
    • DES:
      • DES:
        • DEA: 1
  • asymmetric_crypto:
  • pq_crypto:
  • hash_function:
  • crypto_scheme:
  • crypto_protocol:
    • PACE:
      • PACE: 2
  • randomness:
  • cipher_mode:
  • ecc_curve:
  • crypto_engine:
  • tls_cipher_suite:
  • crypto_library:
  • vulnerability:
  • side_channel_analysis:
  • technical_report_id:
  • device_model:
  • tee_name:
  • os_name:
  • cplc_data:
  • ic_data_group:
  • standard_id:
    • ICAO:
      • ICAO: 1
  • javacard_version:
  • javacard_api_const:
  • javacard_packages:
  • certification_process:
None
pdf_data/cert_metadata
  • pdf_file_size_bytes: 385256
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
  • /Title: ANSSI-CC-2021/63
  • /Author: DUCLOS Charlene
  • /Keywords: version x.x, révision x
  • /Creator: Microsoft® Word 2019
  • /CreationDate: D:20220107145629+01'00'
  • /ModDate: D:20220107145629+01'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks:
None
pdf_data/report_filename anssi-cc-2021-63.pdf 0772a_pdf.pdf
pdf_data/report_frontpage
  • FR:
  • DE:
    • match_rules: (BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)
    • cert_id: BSI-DSZ-CC-0772-2014
    • cert_item: Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6
    • developer: Kanguru Solutions
    • cert_lab: BSI
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1156-V2-2021: 1
  • FR:
    • ANSSI-CC-2021/63: 15
  • DE:
    • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1156-V2-2021: 1
  • BSI-DSZ-CC-0772-2014: 22
pdf_data/report_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0056-V2-2012-MA-02: 1
  • BSI-CC-PP-0068-V2-2011-MA-01: 2
  • BSI-PP-0084-2014: 1
  • BSI-CC-PP-0056-V2-2012-MAO2: 1
  • BSI-PP-0025-2006: 4
pdf_data/report_keywords/cc_sar
  • AGD:
    • AGD_PRE: 1
    • AGD_OPE: 1
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
  • AVA:
    • AVA_VAN.5: 1
    • AVA_VAN: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_FLR.1: 5
    • ALC_FLR: 3
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_TAT: 1
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
    • AVA_VAN: 2
  • APE:
    • APE_INT.1: 1
    • APE_CCL.1: 1
    • APE_SPD.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_ECD.1: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
  • ASE:
    • ASE_INT.1: 1
    • ASE_CCL.1: 1
    • ASE_SPD.1: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_ECD.1: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
pdf_data/report_keywords/cc_sar/AGD
  • AGD_PRE: 1
  • AGD_OPE: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE: 1
  • AGD_PRE: 1
pdf_data/report_keywords/cc_sar/ALC
  • ALC_DVS.2: 1
  • ALC_FLR: 1
  • ALC_FLR.1: 5
  • ALC_FLR: 3
  • ALC_CMC.1: 1
  • ALC_CMC.2: 1
  • ALC_CMC.3: 1
  • ALC_CMC.4: 1
  • ALC_CMC.5: 1
  • ALC_CMS.1: 1
  • ALC_CMS.2: 1
  • ALC_CMS.3: 1
  • ALC_CMS.4: 1
  • ALC_CMS.5: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_DVS.2: 1
  • ALC_FLR.2: 1
  • ALC_FLR.3: 1
  • ALC_LCD.1: 1
  • ALC_LCD.2: 1
  • ALC_TAT.1: 1
  • ALC_TAT.2: 1
  • ALC_TAT.3: 1
  • ALC_CMC: 1
  • ALC_CMS: 1
  • ALC_DEL: 1
  • ALC_DVS: 1
  • ALC_TAT: 1
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR 1 3
pdf_data/report_keywords/cc_sar/AVA
  • AVA_VAN.5: 1
  • AVA_VAN: 1
  • AVA_VAN.1: 1
  • AVA_VAN.2: 1
  • AVA_VAN.3: 1
  • AVA_VAN.4: 1
  • AVA_VAN.5: 1
  • AVA_VAN: 2
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN 1 2
pdf_data/report_keywords/cc_security_level/EAL
  • EAL 5: 1
  • EAL2: 2
  • EAL7: 1
  • EAL 2: 8
  • EAL 1: 7
  • EAL 4: 7
  • EAL2: 2
  • EAL 3: 4
  • EAL 5: 6
  • EAL 6: 3
  • EAL 7: 4
  • EAL 2 augmented: 3
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 1 6
pdf_data/report_keywords/cc_security_level/ITSEC
  • ITSEC E6 Elevé: 1
  • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
    • FCS_CKM.1: 1
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACF.1: 2
  • FIA:
    • FIA_UID.2: 4
    • FIA_UAU.2: 4
    • FIA_UAU.6: 1
    • FIA_SOS.1: 1
  • FMT:
    • FMT_MTD: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 8, 2014-10-07, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) [9] Evaluated Product User Guide, Version 1.20, 2014-10-02 [10] Kanguru Defender Elite 200 User: 1
    • KRMC Administrator's User Manual, Version 5.0.2, 2013-11-01 [14] Configuration lists for the TOE (confidential documents): a) Configuration list for TOE executables, 2014-09-17 b) Configuration list from Phison: 1
pdf_data/report_keywords/cplc_data
  • ICFab:
    • IC Fabricator: 1
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 26
pdf_data/report_keywords/eval_facility
  • CESTI:
    • CESTI: 2
  • CEA-LETI:
    • CEA - LETI: 1
  • atsec:
    • atsec: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 13
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/standard_id
  • ICAO:
    • ICAO: 2
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • BSI:
    • AIS 20: 2
    • AIS 32: 1
  • ISO:
    • ISO/IEC 17065: 2
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES-256: 1
      • AES: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
    • BSI 7138: 2
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Microsoft:
    • Microsoft: 1
pdf_data/report_metadata
  • pdf_file_size_bytes: 2527123
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Author: [email protected]
  • /Subject: eTravel Essential 1.3-2.0- PACE, EAC and AA activated
  • /Keywords: [ANSSI Crypto]
  • /Creator: Microsoft® Word 2019
  • /CreationDate: D:20220107144402+01'00'
  • /ModDate: D:20220107144402+01'00'
  • /Producer: Microsoft® Word 2019
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/, http://www.commoncriteriaportal.org/, http://www.sogis.eu/
  • pdf_file_size_bytes: 1643286
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20141121083051+01'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
  • /ModDate: D:20141121113713+01'00'
  • /Producer: LibreOffice 4.2
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0772-2014
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/
pdf_data/report_metadata//Author [email protected] Bundesamt für Sicherheit in der Informationstechnik
pdf_data/report_metadata//CreationDate D:20220107144402+01'00' D:20141121083051+01'00'
pdf_data/report_metadata//Creator Microsoft® Word 2019 Writer
pdf_data/report_metadata//Keywords [ANSSI Crypto] "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender"
pdf_data/report_metadata//ModDate D:20220107144402+01'00' D:20141121113713+01'00'
pdf_data/report_metadata//Producer Microsoft® Word 2019 LibreOffice 4.2
pdf_data/report_metadata//Subject eTravel Essential 1.3-2.0- PACE, EAC and AA activated Common Criteria Certification
pdf_data/report_metadata/pdf_file_size_bytes 2527123 1643286
pdf_data/report_metadata/pdf_number_of_pages 14 42
pdf_data/st_filename anssi-cible-cc-2021_63en.pdf 0772b_pdf.pdf
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 6
  • ECC:
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 8
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • Diffie-Hellman: 9
      • DH: 9
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1156-2021: 1
  • NL:
    • CC-1: 5
    • CC-2: 6
    • CC-3: 5
  • DE:
    • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_cert_id/DE
  • BSI-DSZ-CC-1156-2021: 1
  • BSI-DSZ-CC-0772: 1
pdf_data/st_keywords/cc_claims
  • D:
    • D.ACODE: 8
    • D.ACODE_CIPHEREDSIGNED: 7
    • D.ACODE-ID: 3
    • D.ACODE_DEC-KEY: 4
    • D.ACODE_ENC-KEY: 2
    • D.ACODE_SGNVER-KEY: 4
    • D.ACODE_SGNGEN-KEY: 2
    • D.ACODE_: 1
    • D.ACODE_SGNVER-: 1
  • O:
    • O.SECURE_LOAD_ACODE: 10
    • O.SECURE_ACTIVATION_ACODE: 4
    • O.TOE_IDENTIFICATION: 7
    • O.CONFID-LOAD_ACODE: 4
    • O.RND: 1
  • T:
    • T.UNAUTHORIZED_ES_UPDATE: 3
    • T.FAKE-SGNVER-KEY: 3
    • T.WRONG-UPDATE-STATE: 3
    • T.INTEG-ACODE_LOAD: 2
    • T.CONFID-ACODE_LOAD: 2
    • T.INTEG-: 1
    • T.CONFID-: 1
  • A:
    • A.ACODE-EVIDENCE: 3
    • A.ACODE-KEY-MANAGEMENT: 3
  • OE:
    • OE.ENCRYPTION_ACODE: 1
    • OE.ACODE_SECURE_LOAD: 4
    • OE.ACODE-VERIFICATION: 4
    • OE.ACODE-EVIDENCE: 5
    • OE.CODE-VERIFICATION: 1
    • OE.ACODE-TRUSTED-DEVELOPER: 5
    • OE.ACODE-ENCRYPTION: 6
    • OE.ACODE-KEY-MANAGEMENT: 6
    • OE.ACODE-SECURE_LOAD: 1
    • OE.ACODE-TRUSTED-: 1
    • OE.ACODE-: 1
    • OE.BAC-PP: 1
  • OSP:
    • OSP: 3
pdf_data/st_keywords/cc_protection_profile_id/BSI
  • BSI-CC-PP-0084-2014: 1
  • BSI-CC-PP-0056: 1
  • BSI-CC-PP-0056-V2-2012: 1
  • BSI-CC-PP-0068-V2-2011-MA-01: 1
  • BSI-CC-PP-0055: 1
  • BSI-PP-0025: 6
  • BSI-PP- 0025: 13
pdf_data/st_keywords/cc_sar/ADV
  • ADV_ARC.1: 2
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_IMP.1: 1
  • ADV_ARC: 1
  • ADV_SPM.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.2: 1
  • ADV_TDS.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 2 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_PRE: 1
  • AGD_OPE: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.2: 6
  • ALC_FLR.1: 5
  • ALC_CMC.2: 1
  • ALC_CMS.2: 1
  • ALC_DEL.1: 1
pdf_data/st_keywords/cc_sar/ASE
  • ASE_ECD: 1
  • ASE_TSS.2: 1
  • ASE_INT.1: 1
  • ASE_CCL.1: 1
  • ASE_SPD.1: 1
  • ASE_OBJ.2: 1
  • ASE_ECD.1: 1
  • ASE_REQ.2: 1
  • ASE_TSS.1: 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_DPT.1: 1
  • ATE_COV.1: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_VAN.3: 2
  • AVA_VAN.5: 6
  • AVA_VAN.2: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL5+: 1
  • EAL5: 7
  • EAL6: 1
  • EAL 6+: 1
  • EAL5 augmented: 3
  • EAL6 augmented: 1
  • EAL2: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 7
    • FAU_SAS.1: 17
    • FAU_GEN: 1
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_RND: 13
    • FCS_CKM: 65
    • FCS_COP: 115
    • FCS_RND.1: 18
    • FCS_RNG.1: 1
    • FCS_CKM.1: 31
    • FCS_RND.1.1: 2
    • FCS_CKM.2: 8
    • FCS_COP.1: 12
    • FCS_CKM.4: 67
    • FCS_COP.1.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_RNG: 5
  • FDP:
    • FDP_SDC.1: 8
    • FDP_ACF: 17
    • FDP_ITC.1: 27
    • FDP_ITC.2: 27
    • FDP_ACC.1: 10
    • FDP_ACC: 15
    • FDP_ACF.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 4
    • FDP_UCT: 4
    • FDP_IFC.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 6
    • FDP_UIT: 4
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_ITT.1: 2
    • FDP_SDI.2: 2
    • FDP_SMR: 1
    • FDP_SDI: 1
  • FIA:
    • FIA_API: 20
    • FIA_AFL: 22
    • FIA_API.1: 9
    • FIA_SOS.2: 1
    • FIA_API.1.1: 1
    • FIA_UAU.4: 3
    • FIA_UAU: 62
    • FIA_UAU.1: 6
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UID: 33
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
    • FIA_UID.1: 14
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.5: 4
    • FIA_UAU.6.1: 2
    • FIA_ATD: 7
    • FIA_ATD.1: 1
    • FIA_AFL.1: 1
    • FIA_UAU.6: 1
  • FMT:
    • FMT_LIM: 9
    • FMT_LIM.1: 26
    • FMT_LIM.2: 24
    • FMT_LIM.1.1: 3
    • FMT_LIM.2.1: 3
    • FMT_MTD: 57
    • FMT_MSA.3: 6
    • FMT_SMF.1: 52
    • FMT_SMR.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR: 16
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_MTD.3: 6
    • FMT_MTD.3.1: 1
    • FMT_MSA: 7
    • FMT_MSA.1: 6
    • FMT_SMF: 11
  • FPT:
    • FPT_EMS: 15
    • FPT_TST: 14
    • FPT_EMS.1: 20
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 20
    • FPT_TST.1: 9
    • FPT_PHP.3: 16
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_PHP.3.1: 1
    • FPT_FLS: 8
    • FPT_ITT.1: 3
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC.1: 5
    • FTP_TRP.1: 4
    • FTP_ITC: 15
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_RNG.1: 15
    • FCS_CKM.1: 9
    • FCS_CKM.4: 9
    • FCS_COP.1: 9
    • FCS_RNG: 2
    • FCS_RNG.1.1: 3
    • FCS_RNG.1.2: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.4.1: 1
    • FCS_COP.1.1: 1
    • FCS_CKM.2: 1
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACF.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_UAU.1: 7
    • FIA_UAU.6: 8
    • FIA_SOS.1: 8
    • FIA_UAU.2: 9
    • FIA_UID.2: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU.2.1: 1
    • FIA_UID.2.1: 1
    • FIA_UID.1: 2
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MTD: 12
    • FMT_SMF: 20
    • FMT_SMR.1: 12
    • FMT_SMF.1: 6
    • FMT_MTD.1: 3
    • FMT_MSA.1.1: 1
    • FMT_MTD.1.1: 2
    • FMT_SMF.1.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.3: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_RCV.4: 8
    • FPT_PHP.1: 8
    • FPT_RCV.4.1: 2
    • FPT_FLS.1.1: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FAU
  • FAU_SAS: 7
  • FAU_SAS.1: 17
  • FAU_GEN: 1
  • FAU_SAS.1.1: 2
  • FAU_GEN: 1
pdf_data/st_keywords/cc_sfr/FCS
  • FCS_RND: 13
  • FCS_CKM: 65
  • FCS_COP: 115
  • FCS_RND.1: 18
  • FCS_RNG.1: 1
  • FCS_CKM.1: 31
  • FCS_RND.1.1: 2
  • FCS_CKM.2: 8
  • FCS_COP.1: 12
  • FCS_CKM.4: 67
  • FCS_COP.1.1: 13
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_RNG: 5
  • FCS_RNG.1: 15
  • FCS_CKM.1: 9
  • FCS_CKM.4: 9
  • FCS_COP.1: 9
  • FCS_RNG: 2
  • FCS_RNG.1.1: 3
  • FCS_RNG.1.2: 3
  • FCS_CKM.1.1: 1
  • FCS_CKM.4.1: 1
  • FCS_COP.1.1: 1
  • FCS_CKM.2: 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 31 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 8 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 67 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 12 9
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 13 1
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG 5 2
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 1 15
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_SDC.1: 8
  • FDP_ACF: 17
  • FDP_ITC.1: 27
  • FDP_ITC.2: 27
  • FDP_ACC.1: 10
  • FDP_ACC: 15
  • FDP_ACF.1: 19
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 2
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_RIP.1: 7
  • FDP_RIP.1.1: 1
  • FDP_UCT.1: 4
  • FDP_UCT: 4
  • FDP_IFC.1: 6
  • FDP_UCT.1.1: 1
  • FDP_UIT.1: 6
  • FDP_UIT: 4
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_ITT.1: 2
  • FDP_SDI.2: 2
  • FDP_SMR: 1
  • FDP_SDI: 1
  • FDP_ACC.1: 14
  • FDP_ACF.1: 13
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ITC.2: 2
  • FDP_IFC.1: 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 10 14
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 19 13
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 2 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 6 1
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 27 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 27 2
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_API: 20
  • FIA_AFL: 22
  • FIA_API.1: 9
  • FIA_SOS.2: 1
  • FIA_API.1.1: 1
  • FIA_UAU.4: 3
  • FIA_UAU: 62
  • FIA_UAU.1: 6
  • FIA_AFL.1.1: 2
  • FIA_AFL.1.2: 2
  • FIA_UID: 33
  • FIA_UID.1.1: 2
  • FIA_UID.1.2: 2
  • FIA_UID.1: 14
  • FIA_UAU.1.1: 2
  • FIA_UAU.1.2: 2
  • FIA_UAU.4.1: 1
  • FIA_UAU.5.1: 1
  • FIA_UAU.5.2: 1
  • FIA_UAU.5: 4
  • FIA_UAU.6.1: 2
  • FIA_ATD: 7
  • FIA_ATD.1: 1
  • FIA_AFL.1: 1
  • FIA_UAU.6: 1
  • FIA_UAU.1: 7
  • FIA_UAU.6: 8
  • FIA_SOS.1: 8
  • FIA_UAU.2: 9
  • FIA_UID.2: 10
  • FIA_UAU.1.1: 1
  • FIA_UAU.1.2: 1
  • FIA_UAU.6.1: 1
  • FIA_SOS.1.1: 1
  • FIA_UAU.2.1: 1
  • FIA_UID.2.1: 1
  • FIA_UID.1: 2
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 6 7
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1.2 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 1 8
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6.1 2 1
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 14 2
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_LIM: 9
  • FMT_LIM.1: 26
  • FMT_LIM.2: 24
  • FMT_LIM.1.1: 3
  • FMT_LIM.2.1: 3
  • FMT_MTD: 57
  • FMT_MSA.3: 6
  • FMT_SMF.1: 52
  • FMT_SMR.1: 6
  • FMT_SMF.1.1: 1
  • FMT_SMR: 16
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 1
  • FMT_MTD.1: 14
  • FMT_MTD.1.1: 1
  • FMT_MTD.3: 6
  • FMT_MTD.3.1: 1
  • FMT_MSA: 7
  • FMT_MSA.1: 6
  • FMT_SMF: 11
  • FMT_MSA.1: 8
  • FMT_MTD: 12
  • FMT_SMF: 20
  • FMT_SMR.1: 12
  • FMT_SMF.1: 6
  • FMT_MTD.1: 3
  • FMT_MSA.1.1: 1
  • FMT_MTD.1.1: 2
  • FMT_SMF.1.1: 2
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.3: 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 6 8
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 6 1
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD 57 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 14 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF 11 20
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 52 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 6 12
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 2 1
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_EMS: 15
  • FPT_TST: 14
  • FPT_EMS.1: 20
  • FPT_EMS.1.1: 3
  • FPT_EMS.1.2: 3
  • FPT_FLS.1: 20
  • FPT_TST.1: 9
  • FPT_PHP.3: 16
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 2
  • FPT_TST.1.2: 2
  • FPT_TST.1.3: 2
  • FPT_PHP.3.1: 1
  • FPT_FLS: 8
  • FPT_ITT.1: 3
  • FPT_TST.2: 1
  • FPT_FLS.1: 9
  • FPT_RCV.4: 8
  • FPT_PHP.1: 8
  • FPT_RCV.4.1: 2
  • FPT_FLS.1.1: 1
  • FPT_PHP.1.1: 1
  • FPT_PHP.1.2: 1
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 20 9
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Out of scope: 2
    • 11 1.5.4.3 Out of scope : 1
    • 11 1.5.4.3 Out of scope ........................................................................................... 12 1.5: 1
    • from the KRMC to the device. Commands are queued at the KRMC until polled form the device. 1.5.4.3 Out of scope The TOE supports additional features that are not part of the scope: ● Antivirus solution ●: 1
pdf_data/st_keywords/cipher_mode/CBC/CBC 4 1
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 239
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 8
  • KA:
    • Key Agreement: 11
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 40
pdf_data/st_keywords/hash_function/SHA
  • SHA1:
    • SHA-1: 1
  • SHA2:
    • SHA-224: 2
    • SHA-256: 1
    • SHA-384: 1
    • SHA-512: 1
  • SHA2:
    • SHA-256: 1
pdf_data/st_keywords/hash_function/SHA/SHA2
  • SHA-224: 2
  • SHA-256: 1
  • SHA-384: 1
  • SHA-512: 1
  • SHA-256: 1
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.DG1: 13
    • EF.DG2: 6
    • EF.DG3: 10
    • EF.DG4: 10
    • EF.DG5: 3
    • EF.DG16: 11
    • EF.DG14: 6
    • EF.DG15: 2
    • EF.COM: 2
    • EF.SOD: 4
pdf_data/st_keywords/randomness/RNG
  • RND: 1
  • RNG: 2
  • RNG: 14
pdf_data/st_keywords/randomness/RNG/RNG 2 14
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Leak-Inherent: 3
    • physical probing: 4
    • DPA: 2
    • SPA: 1
  • FI:
    • Physical Tampering: 4
    • Physical tampering: 2
    • Malfunction: 6
    • malfunction: 6
    • fault injection: 1
  • other:
    • reverse engineering: 1
  • FI:
    • physical tampering: 3
pdf_data/st_keywords/side_channel_analysis/FI
  • Physical Tampering: 4
  • Physical tampering: 2
  • Malfunction: 6
  • malfunction: 6
  • fault injection: 1
  • physical tampering: 3
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-2: 1
    • FIPS186-4: 2
    • FIPS46-3: 1
    • FIPS PUB 46-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS 180-2: 1
  • NIST:
    • SP 800-90: 2
    • SP 800-67: 1
  • PKCS:
    • PKCS#3: 3
    • PKCS#1: 2
  • RFC:
    • RFC 2631: 1
    • RFC 3369: 1
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • ICAO:
    • ICAO: 16
  • SCP:
    • SCP03: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
      • AES-256: 2
  • DES:
    • DES:
      • DES: 1
    • 3DES:
      • Triple-DES: 6
      • TDES: 7
      • 3DES: 2
  • constructions:
    • MAC:
      • KMAC: 3
      • CMAC: 4
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES
  • AES: 13
  • AES-256: 2
  • AES: 3
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES 13 3
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-03110: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 10
  • Thales:
    • Thales: 43
pdf_data/st_metadata
  • pdf_file_size_bytes: 2912238
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 118
  • /Title: Security Target eTravel Essential 1.2 - BAC, EAC and AA activated
  • /Author: Thales
  • /Keywords: Security Target, CC, eTravel
  • /Creator: Microsoft® Word 2016
  • /CreationDate: D:20210906102029+02'00'
  • /ModDate: D:20210906102029+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 704587
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 41
  • /Keywords: Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
  • /Subject:
  • /Title: Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
  • /Creator: Unknown
  • /Author: Andreas Siegert (generated by CCTool version 2.8)
  • /Producer: XEP 4.23
  • /application: CCTool version x.y
  • /Trapped: /False
  • /CreationDate: D:20141006150157Z
  • /ModDate: D:20141006150157Z
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata//Author Thales Andreas Siegert (generated by CCTool version 2.8)
pdf_data/st_metadata//CreationDate D:20210906102029+02'00' D:20141006150157Z
pdf_data/st_metadata//Creator Microsoft® Word 2016 Unknown
pdf_data/st_metadata//Keywords Security Target, CC, eTravel Security Target, Common Criteria, USB Storage, Encryption, Protected Storage
pdf_data/st_metadata//ModDate D:20210906102029+02'00' D:20141006150157Z
pdf_data/st_metadata//Producer Microsoft® Word 2016 XEP 4.23
pdf_data/st_metadata//Title Security Target eTravel Essential 1.2 - BAC, EAC and AA activated Kanguru Defender Security Target (version 1.10 as of 2014-10-06)
pdf_data/st_metadata/pdf_file_size_bytes 2912238 704587
pdf_data/st_metadata/pdf_hyperlinks http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf
pdf_data/st_metadata/pdf_number_of_pages 118 41
dgst 0ea65ddd47e12976 eda06ca3c208ebd0