name |
Tripwire Enterprise v8.8.2.2 |
HP XP7 Storage System Control Program 80-01-42-00/00 |
category |
Detection Devices and Systems |
Access Control Devices and Systems |
scheme |
CA |
JP |
status |
active |
archived |
not_valid_after |
03.09.2025 |
18.11.2021 |
not_valid_before |
03.09.2020 |
18.11.2016 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/500%20EWA%202019%20CT_no_sig_Eng%20v2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0530_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/500%20EWA%202019%20CR%20v.1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0530_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tripwire%20Enterprise%208.8.2.2%20ST%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0530_est.pdf |
manufacturer |
Tripwire, Inc. |
Hewlett Packard Enterprise Company |
manufacturer_web |
https://www.tripwire.com |
https://www.hpe.co |
security_level |
EAL2+, ALC_FLR.2 |
EAL2+, ALC_FLR.1 |
dgst |
12dae1749ca3ba5b |
b5fe51817ec40e50 |
heuristics/cert_id |
500-EWA-2019 |
JISEC-CC-CRP-C0530 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
8.8.2.2 |
42, 01, 80, 00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- certification_date: 03.09.2020
- level: EAL 2+ (ALC_FLR.2)
- product: Tripwire Enterprise Version 8.8.2.2 Tripwire Enterprise Version 8.9.1 (August 2022)
- vendor: Tripwire, Inc.
|
- cert_id: JISEC-CC-CRP-C0530
- certification_date: 01.11.2016
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0530_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software program operating on the storage system: "HP XP7 Storage System". This TOE receives a request for access to a storage device in a storage system from a host computer (hereinafter referred to as “host”) and controls data transmission between the host and the storage device. TOE Security functions The major security functions of this TOE are as follows. - Function that identifies the host and controls access, so that the host can access only the designated storage area - Function that erases data by overwriting it with dummy data in the storage device - Function that manages an encryption key to encrypt data written to the storage device - Function that identifies/authenticates fibre channel switches - Function that identifies/authenticates users and limits settings related to security to specific roles - Function that records events related to security in logs and enables persons who have a specific role to read it
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: HP XP7 Storage System Control Program
- product_type: Control Program for storage system
- report_link: https://www.ipa.go.jp/en/security/c0530_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0530_est.pdf
- toe_version: 80-01-42-00/00
- vendor: Hewlett Packard Enterprise Company
- expiration_date: 01.12.2021
- supplier: Hewlett Packard Enterprise Company
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0530_it5533.html
- toe_overseas_name: HP XP7 Storage System Control Program80-01-42-00/00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
500 EWA 2019 CT_no_sig_Eng v2.pdf |
c0530_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20190122115136-04'00'
- /Creator: Adobe Illustrator CC 22.0 (Windows)
- /ModDate: D:20201023161231-05'00'
- /Producer: Adobe PDF library 15.00
- /Title: cyber-centre-product-evaluation-certificate-e-bg
- pdf_file_size_bytes: 1640344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20170220145420+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20170220145632+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 415427
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
500 EWA 2019 CR v.1.0.pdf |
c0530_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0530-01: 1
- Certification No. C0530: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 4
- EAL2 augmented: 3
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.CONNECT_STORAGE: 1
- A.EXTERNAL_SERVER: 1
- A.MAINTENCE_PC: 1
- A.MANAGEMENT_PC: 1
- A.MANAGE_SECRET: 1
- A.NOEVIL: 1
- A.PHYSICAL_SEC: 1
- T:
- T.CHG_CONFIG: 1
- T.HDD_REUSE: 1
- T.HDD_THEFT: 1
- T.LP_LEAK: 1
- T.TSF_COMP: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author:
- /CreationDate: D:20170303140632+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20170303140859+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 484471
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 40
|
pdf_data/st_filename |
Tripwire Enterprise 8.8.2.2 ST v1.0.pdf |
c0530_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 4
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 10
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 3
- FAU_SAR.1: 7
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_SEL: 1
- FAU_SEL.1: 8
- FAU_STG: 2
- FAU_STG.1: 1
- FAU_STG.2: 12
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FAU_STG.4: 7
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 1
- FCS_COP: 18
- FCS_COP.1: 5
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 3
- FDP_ACC.2: 8
- FDP_ACC.2.1: 1
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 18
- FMT_MOF.1: 3
- FMT_MSA: 3
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 12
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT: 1
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT: 1
- FPT_STM_EXT.1: 10
- FPT_STM_EXT.1.1: 4
- FTA:
- FTA_SSL: 1
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
|
- FAU:
- FAU_GEN.1: 18
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG.1: 12
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 10
- FAU_STG.3.1: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 11
- FCS_CKM.4.1: 1
- FCS_COP.1: 2
- FDP:
- FDP_ACC.1: 16
- FDP_ACC.1.1: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 19
- FIA_ATD.1: 6
- FIA_SOS: 20
- FIA_SOS.1: 2
- FIA_UAU: 1
- FIA_UAU.1: 2
- FIA_UAU.2: 18
- FIA_UAU.2.1: 1
- FIA_UID: 1
- FIA_UID.1: 6
- FIA_UID.2: 18
- FIA_UID.2.1: 1
- FIA_USB: 19
- FIA_USB.1: 6
- FMT:
- FMT_MOF.1: 14
- FMT_MOF.1.1: 1
- FMT_MSA.1: 12
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 15
- FMT_MTD.1.1: 1
- FMT_MTD.3: 10
- FMT_MTD.3.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 18
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM: 1
- FPT_STM.1: 13
- FPT_STM.1.1: 1
- FTP:
- FTP_ITC.1: 10
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 9
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ACCESS: 3
- A.ASCOPE: 3
- A.DYNMIC: 3
- A.LOCATE: 3
- A.MANAGE: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.NOTRUST: 1
- A.PROTCT: 3
- O:
- O.ACCESS: 12
- O.AUDITS: 8
- O.DAC: 5
- O.EADMIN: 4
- O.IDANLZ: 5
- O.IDAUTH: 19
- O.IDSCAN: 7
- O.IDSENS: 9
- O.INTEGR: 7
- O.OFLOWS: 6
- O.PROTCT: 9
- O.PROTECT: 1
- O.RESPON: 5
- OE:
- OE.AUDIT_PROTECTION: 4
- OE.AUDIT_SORT: 4
- OE.CREDEN: 5
- OE.INSTAL: 5
- OE.INTROP: 5
- OE.PERSON: 5
- OE.PHYCAL: 6
- OE.TIME: 6
- T:
- T.COMDIS: 3
- T.COMINT: 3
- T.FACCNT: 3
- T.FALACT: 3
- T.FALASC: 3
- T.FALREC: 3
- T.IMPCON: 4
- T.INADVE: 3
- T.INFLUX: 3
- T.LOSSOF: 3
- T.MISACT: 3
- T.MISUSE: 3
- T.NOHALT: 3
- T.PRIVIL: 3
- T.SCNCFG: 3
- T.SCNMLC: 3
- T.SCNVUL: 3
|
- A:
- A.CONNECT_STORAGE: 3
- A.EXTERNAL_SERVER: 3
- A.MAINTENANCE_PC: 3
- A.MANAGEMENT_PC: 3
- A.MANAGE_SECRET: 3
- A.NOEVIL: 3
- A.PHYSICAL_SEC: 3
- O:
- O.ADM: 2
- O.ADM_AUTH: 7
- O.ADM_ROLE: 5
- O.AUD: 1
- O.AUD_GEN: 7
- O.HDD: 2
- O.HDD_: 2
- O.HDD_ENC: 5
- O.HDD_SHRED: 3
- O.HOST: 1
- O.HOST_ACCESS: 7
- O.SEC: 1
- O.SEC_COMM: 7
- O.SWITCH: 1
- O.SWITCH_AUTH: 6
- OE:
- OE.CONNECT: 1
- OE.CONNECT_STORAGE: 2
- OE.EXTERNAL_SERVER: 3
- OE.FC-: 1
- OE.FC-SP: 1
- OE.FC-SP_HBA: 1
- OE.HDD: 1
- OE.HDD_ENC: 2
- OE.MAINTENANCE: 1
- OE.MAINTENANCE_PC: 2
- OE.MANAGE: 1
- OE.MANAGEMENT: 1
- OE.MANAGEMENT_PC: 2
- OE.MANAGE_SECRET: 2
- OE.NOEVIL: 2
- OE.PHYSICAL_SEC: 3
- T:
- T.CHG_CONFIG: 3
- T.HDD_REUSE: 3
- T.HDD_THEFT: 3
- T.LP_LEAK: 3
- T.TSF_COMP: 3
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 8
- SHA-384: 3
- SHA-512: 4
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 45
- TLS v1.1: 3
- TLS v1.2: 1
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 4
- P-384: 4
- P-521: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 140-2: 2
- FIPS PUB 186-4: 3
- X509:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS PUB 180-2: 1
- FIPS PUB 197: 2
- FIPS PUB 46-3: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Michelle Ruppel
- /CreationDate: D:20200812121158-04'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20200812121158-04'00'
- /Producer: Microsoft® Word 2016
- /Title: DS_RCT
- pdf_file_size_bytes: 1014975
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 85
|
- /CreationDate: D:20170131164740+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20170131164827+09'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 755176
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 77
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |