| name |
Remote Communication Gate Application Software 3.34 |
Motorola AP-7131N Wireless Access Point |
| category |
Network and Network-Related Devices and Systems |
Network and Network-Related Devices and Systems |
| scheme |
JP |
US |
| status |
archived |
archived |
| not_valid_after |
07.10.2013 |
27.03.2016 |
| not_valid_before |
28.06.2006 |
27.03.2014 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0048_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10473-vr.pdf |
| st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10473-st.pdf |
| manufacturer |
Ricoh Company, Ltd. |
Motorola Solutions, Inc. |
| manufacturer_web |
|
https://www.motorolasolutions.com |
| security_level |
EAL3 |
EAL2+, ALC_FLR.2 |
| dgst |
16c85272260e72be |
8d76654534c0ee9a |
| heuristics/cert_id |
JISEC-CC-CRP-C0048 |
CCEVS-VR-VID-10473-2014 |
| heuristics/cert_lab |
[] |
US |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
{} |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ATE_COV.2, ADV_FSP.2, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1 |
| heuristics/extracted_versions |
3.34 |
- |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0048
- certification_date: 01.06.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 2.1
- cert_link: https://www.ipa.go.jp/en/security/c0048_eimg.pdf
- description: PRODUCT DESCRIPTION Remote Communication Gate Type N/L/BN1/BM1 (hereafter "RC Gate") is a communication device, which connects image I/O devices to a remote server. RC Gate is used primarily in business offices and offers the maintenance services such as machine trouble notification, automatic counter checking, ordering supplies like toner and firmware upgrading for the image I/O device. The TOE is application software embedded in the RC Gate. The security features of RC Gate are identification and authentication of operators, access control facilities for operators, identification and authentication of the server based on a digital certificate, and encrypted communication to protect information from Internet or telephone line threats.
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Remote Communication Gate Application Software
- product_type: IT Product (Software for remote service appliance)
- report_link: https://www.ipa.go.jp/en/security/c0048_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0048_est.pdf
- toe_version: 3.34
- vendor: RICOH COMPANY, LTD.
- expiration_date: 01.10.2013
- revalidations: [frozendict({'date': '2008-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0048_it5049_02.html'})]
- supplier: Ricoh Company, Ltd.
- toe_japan_name: Remote Communication Gate Application Software 3.34
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0048_it5049.html
- toe_overseas_name: Remote Communication Gate Application Software 3.57
|
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10473/
- categories: ['Wireless LAN']
- category: Wireless LAN
- certification_date: 27.03.2014
- evaluation_facility: UL Verification Services
- expiration_date: 27.03.2016
- id: CCEVS-VR-VID10473
- product: Motorola AP-7131N Wireless Access Point
- scheme: US
- url: https://www.niap-ccevs.org/products/10473
- vendor: Motorola Mobility LLC
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
c0048_ecvr.pdf |
st_vid10473-vr.pdf |
| pdf_data/report_frontpage |
|
- US:
- cert_id: CCEVS-VR-VID10473-2014
- cert_item: Motorola Solutions, Inc. AP-7131N Wireless Access Point
- cert_lab: US NIAP
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0048: 1
|
- US:
- CCEVS-VR-VID10473-2014: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ACCESS_POINT: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20060628102008+09'00'
- /ModDate: D:20060628102008+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12877
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20140331085228-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140331085235-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140331125129
- /Subject:
- /Title: D
- pdf_file_size_bytes: 163303
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
| pdf_data/st_filename |
|
st_vid10473-st.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 2: 3
- EAL1: 2
- EAL2: 4
- EAL2 augmented: 2
- EAL2+: 1
- EAL3: 2
- EAL5: 2
- EAL6: 1
- EAL7: 2
|
| pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 13
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 2
- ADV_SPM.1: 2
- ADV_TDS: 1
- ADV_TDS.1: 10
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 9
- AGD_PRE: 1
- AGD_PRE.1: 8
- ALC:
- ALC_CMC: 1
- ALC_CMC.2: 4
- ALC_CMS: 1
- ALC_CMS.2: 4
- ALC_DEL: 1
- ALC_DEL.1: 4
- ALC_DVS: 1
- ALC_FLR: 1
- ALC_FLR.2: 9
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 1
- ASE_REQ: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 7
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_FUN.1: 6
- ATE_IND: 1
- ATE_IND.2: 3
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 18
- FAU_GEN.1: 11
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SEL.1: 8
- FAU_SEL.1.1: 1
- FAU_UAU.1: 1
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 34
- FCS_CKM.1.1: 4
- FCS_CKM.2: 9
- FCS_CKM.2.1: 5
- FCS_CKM.4: 26
- FCS_CKM.4.1: 1
- FCS_CKM_EXT.2: 1
- FCS_COP: 4
- FCS_COP.1: 43
- FCS_COP.1.1: 19
- FCS_PEAP_EXT: 3
- FCS_PEAP_EXT.1: 14
- FCS_PEAP_EXT.1.1: 1
- FCS_PEAP_EXT.1.2: 2
- FCS_PEAP_EXT.1.3: 2
- FCS_PEAP_EXT.1.4: 2
- FCS_RAD_EXT: 3
- FCS_RAD_EXT.1: 14
- FCS_RAD_EXT.1.1: 2
- FCS_RAD_EXT.1.2: 2
- FCS_RAD_EXT.1.3: 2
- FCS_SFTP_EXT: 2
- FCS_SFTP_EXT.1: 15
- FCS_SFTP_EXT.1.1: 1
- FCS_SFTP_EXT.1.2: 2
- FCS_SSH_EXT: 2
- FCS_SSH_EXT.1: 19
- FCS_SSH_EXT.1.1: 2
- FCS_SSH_EXT.1.2: 2
- FCS_SSH_EXT.1.3: 2
- FCS_SSH_EXT.1.4: 2
- FCS_SSH_EXT.1.5: 2
- FCS_SSH_EXT.1.6: 2
- FCS_SSH_EXT.1.7: 2
- FCS_SSH_EXT.1.8: 2
- FCS_SSH_EXT.1.9: 2
- FCS_TLS_EXT: 2
- FCS_TLS_EXT.1: 30
- FCS_TLS_EXT.1.1: 2
- FCS_TTLS_EXT.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 2
- FDP_IFC.1: 18
- FDP_IFC.1.1: 2
- FDP_IFF: 16
- FDP_IFF.1: 17
- FDP_ITC.1: 9
- FDP_ITC.2: 7
- FDP_PUD: 2
- FDP_RIP: 2
- FDP_RIP.1: 9
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 8
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 2
- FIA_ATD.1: 14
- FIA_ATD.1.1: 3
- FIA_UAU: 6
- FIA_UAU.1: 19
- FIA_UAU.1.1: 3
- FIA_UAU.1.2: 2
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UID: 2
- FIA_UID.1: 4
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB: 2
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 53
- FMT_MOF.1.1: 7
- FMT_MSA: 3
- FMT_MSA.1: 3
- FMT_MSA.2: 29
- FMT_MSA.2.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 17
- FMT_MTD.1.1: 2
- FMT_REV.1: 1
- FMT_SMF: 2
- FMT_SMF.1: 59
- FMT_SMF.1.1: 7
- FMT_SMR: 2
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITC_EXT.1: 1
- FPT_ITC_EXT.1.1: 1
- FPT_ITC_EXT.1.2: 1
- FPT_ITC_EXT.1.3: 1
- FPT_STM: 2
- FPT_STM.1: 1
- FPT_STM_EXT.1: 2
- FPT_STM_EXT.1.1: 2
- FPT_TST: 2
- FPT_TST.1: 16
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FPT_TST_EXT: 4
- FPT_TST_EXT.1: 11
- FPT_TST_EXT.1.1: 2
- FPT_TST_EXT.1.2: 2
- FTA:
- FTA_SSL: 2
- FTA_SSL.3: 7
- FTA_SSL.3.1: 2
- FTA_TAB: 2
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
- FTA_TSE: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 1
- FTP_ITC_EXT: 2
- FTP_ITC_EXT.1: 11
- FTP_ITC_EXT.1.1: 1
- FTP_ITC_EXT.1.2: 1
- FTP_ITC_EXT.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 3
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 2
- A.TOE_NO_BYPASS: 2
- O:
- O.ADMIN_GUIDANCE: 7
- O.AUDIT_GENERATION: 4
- O.CONFIGURATION_DENTIFICATION: 3
- O.CONFIGURATION_IDENTIFICATION: 4
- O.CORRECT_TSF_OPERATION: 4
- O.CRYPTOGRAPHY: 7
- O.CRYPTOGRAPHY_VALIDATED: 4
- O.DISPLAY_BANNER: 7
- O.DOCUMENTED_DESIGN: 5
- O.MANAGE: 10
- O.MEDIATE: 6
- O.PARTIAL_FUNCTIONAL_TESTING: 8
- O.RESIDUAL_INFORMATION: 5
- O.ROGUE_AP_DETECTION: 7
- O.SELF_PROTECTION: 10
- O.TIME_STAMPS: 4
- O.TOE_ACCESS: 7
- O.VULNERABILITY_ANALYSIS: 4
- OE:
- OE.AUDIT_PROTECTION: 3
- OE.AUDIT_REVIEW: 3
- OE.MANAGE: 5
- OE.NO_EVIL: 4
- OE.NO_GENERAL_PURPOSE: 3
- OE.PHYSICAL: 3
- OE.PROTECT_MGMT_COMMS: 3
- OE.RESIDUAL_INFORMATION: 3
- OE.SELF_PROTECTION: 5
- OE.TIME_STAMPS: 3
- OE.TOE_ACCESS: 4
- OE.TOE_NO_BYPASS: 3
- OSP:
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 7
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 4
- T.MASQUERADE: 6
- T.POOR_DESIGN: 3
- T.POOR_IMPLEMENTATION: 3
- T.POOR_TEST: 2
- T.RESIDUAL_DATA: 4
- T.TSF_COMPROMISE: 7
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_ACCESS: 5
- T.UNAUTH_ACCESS_POINT: 2
- T.UNAUTH_ADMIN_ACCESS: 7
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 8
- AES-: 1
- AES-128: 3
- AES-192: 3
- AES-256: 3
- AES128: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 1
- HMAC: 1
- HMAC-SHA-256: 1
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 1
- Key agreement: 1
- KEX:
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
- IKE:
- IKE: 9
- IKEv1: 14
- IKEv2: 3
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 49
- TLS 1.0: 6
- TLS 1.1: 1
- TLS 1.2: 1
- TLS v1.1: 3
- TLS v1.2: 3
- TLS1.0: 1
- TLSv1.0: 5
- VPN:
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 7
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 7
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 1
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 1
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 7
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 7
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- FIPS 140-2: 7
- FIPS 186-2: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS 81: 1
- FIPS PUB 140-2: 2
- FIPS PUB 186-2: 1
- NIST:
- RFC:
- RFC 2346: 2
- RFC 2409: 1
- RFC 2818: 2
- RFC 3146: 1
- RFC 3280: 1
- RFC 4106: 2
- RFC 4109: 3
- RFC 4252: 4
- RFC 4253: 5
- RFC 4303: 2
- RFC 4346: 1
- RFC 4868: 1
- RFC 4869: 1
- RFC 5216: 3
- RFC 5246: 1
- RFC 5281: 4
- RFC 792: 1
- RFC3164: 1
- RFC3280: 2
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author:
- /CreationDate: D:20140324131804-07'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140331085548-04'00'
- /Producer: Acrobat Distiller 9.5.5 (Windows)
- /Title:
- pdf_file_size_bytes: 1196066
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 132
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
False |
True |
| state/st/download_ok |
False |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |