| name |
Huawei FusionSphere 6.5.RC1.T7 |
Application IAS V4.2 sur la plateformeJavaCard ouverte MultiApp V3.1 masquée surle composant P60D080PVC(version du patch : 1.4) |
| category |
Operating Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
ES |
FR |
| status |
active |
archived |
| not_valid_after |
03.02.2026 |
10.03.2020 |
| not_valid_before |
04.02.2021 |
10.03.2015 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20CCRA.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20INF-3355.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015-08.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-58%20ST.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-Lite_CC_2015-08.pdf |
| manufacturer |
Huawei Technologies Co. Ltd. |
Gemalto / NXP Semiconductors |
| manufacturer_web |
https://www.huawei.com |
https://www.gemalto.com/ |
| security_level |
EAL2+, ALC_FLR.2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
1978c3be06f0e1a7 |
9f94b8aac92e4dc6 |
| heuristics/cert_id |
2018-58-INF-3355 |
ANSSI-CC-2015/08 |
| heuristics/cert_lab |
[] |
SERMA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_IND.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ASE_INT.1, AVA_VAN.2, ALC_DEL.1, ASE_TSS.1, ASE_REQ.2, ADV_TDS.1, ADV_ARC.1 |
AVA_VAN.5, ALC_DVS.2 |
| heuristics/extracted_versions |
6.5 |
1.4, 4.2, 3.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/38, ANSSI-CC-2015/37 |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0837-V2-2014, ANSSI-CC-2014/86, ANSSI-CC-2014/14 |
| heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2016/03, ANSSI-CC-2015/38, ANSSI-CC-2015/37, ANSSI-CC-2016/04 |
| heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2014/06, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0837-2013, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/14, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/86 |
| heuristics/scheme_data |
- category: Operating systems
- certification_date: 04.02.2021
- enhanced:
- category: Operating systems
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1084
- certification_date: 04.02.2021
- description: The Target of Evaluation (TOE) Huawei FusionSphere 6.5.RC1.T7 is a cloud operating system (OS) solution. The TOE provides the following key security features: VM Network Separation: The TOE supports virtual switches and virtual networks. VMs can be separated by creating different networks. Administrators can configure network isolation policies. VM isolation: The hypervisor isolates VMs running on the same physical server to prevent data theft and malicious attacks. VM users can only access resources (hardware and software resources and data) that belong to their own VMs. User and Privilege Management: The TOE supports role-based access control, used for the system maintenance personnel to access the virtualization platform and VMs. The table below shows list of roles defined in the TOE and the description of each role. TOE Access: The TOE offers functionality for terminating active sessions automatically after an inactivity period of time. Communications security: The TOE can be remotely accessed using a SSH connection, creating a trusted path between the TOE and the authorized users. Security audit: Operation logs record the security-relevant events performed by users on the system and the result of the operation and is used for tracing and auditing. Access control: Huawei FusionSphere software implements rolebased access control, limiting access to different management functions to different roles as defined in administrator-defined access control associations. Authentication: Operators who access the TOE locally or remotely in order to execute device management functions are identified by individual user names and authenticated by passwords.
- evaluation_facility: DEKRA Testing and Certification S.A.U.
- level: EAL2 + (ALC_FLR.2)
- manufacturer: Huawei Technologies Co., Ltd.
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1083
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1082
- type: Product
- manufacturer: Huawei Technologies Co., Ltd.
- product: Huawei FusionSphere 6.5.RC1.T7
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/399-huawei-fusionsphere-6-5-rc1-t7
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0837-2013 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0837-2013 |
| heuristics/protection_profiles |
{} |
40002c3611fc465f, 9863a376f3bb4175 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
| pdf_data/cert_filename |
2018-58 CCRA.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL2: 1
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
- Huawei:
- Huawei: 2
- Huawei Technologies Co: 2
|
|
| pdf_data/cert_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 1
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 738373
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
| pdf_data/report_filename |
2018-58 INF-3355.pdf |
ANSSI-CC-2015-08.pdf |
| pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/08
- cert_item: Application IAS V4.2 sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D080PVC
- cert_item_version: Version de l’application IAS : 4.2.0.B Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.1 Version du patch : 1.4
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection Profile – Secure Signature-Creation Device Type 2, version 1.04, certifié sous la référence [PP-0005]. Protection Profile – Secure Signature-Creation Device Type 3, version 1.05, certifié sous la référence [PP-0006
|
| pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0837-V2-2014: 2
- FR:
- ANSSI-CC-2014/14: 1
- ANSSI-CC-2014/86: 4
- ANSSI-CC-2015/08: 2
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0005-2002T: 1
- BSI-PP-0006-: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 9
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ALC_FLR: 4
- ALC_FLR.2: 6
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 1
- FAU_SAR.1: 1
- FAU_STG.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC: 2
- FDP_IFF: 2
- FDP_RIP.1: 1
- FIA:
- FIA_AFL.1: 1
- FIA_ATD.1: 1
- FIA_UAU.2: 1
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.1: 1
- FMT_SMR.1: 1
- FTA:
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
- Huawei:
- Huawei: 21
- Huawei Technologies Co: 3
|
- Gemalto:
- NXP:
- NXP: 4
- NXP Semiconductors: 4
|
| pdf_data/report_keywords/eval_facility |
- DEKRA:
- DEKRA Testing and Certification: 5
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2015-08
- pdf_file_size_bytes: 245882
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
| pdf_data/st_filename |
2018-58 ST.pdf |
Cible-Lite_CC_2015-08.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0837-2013: 2
- BSI-DSZ-CC-0845-2012: 2
- NL:
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD: 1
- PP-SSCD-KG: 20
- PP-SSCD-KI: 15
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5+: 1
- EAL5: 3
- EAL5 augmented: 1
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.2: 1
- FAU_GEN.2: 5
- FAU_SAR.1: 6
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_STG.1: 6
- FAU_STG.1.2: 1
- FAU_STG.3: 4
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 8
- FDP_ACF.1: 6
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 12
- FDP_IFC.1: 3
- FDP_IFC.1.1: 2
- FDP_IFF: 10
- FDP_IFF.1: 2
- FDP_IFF.1.1: 2
- FDP_IFF.1.2: 2
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 2
- FDP_IFF.1.5: 2
- FDP_RIP.1: 5
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_SOS.1: 4
- FIA_UAU.2: 5
- FIA_UID.1: 2
- FIA_UID.2: 6
- FMT:
- FMT_MOF.1: 5
- FMT_MSA.1: 7
- FMT_MSA.3: 14
- FMT_MSA.3.2: 1
- FMT_SMF.1: 9
- FMT_SMR.1: 9
- FMT_SMR.1.2: 1
- FPT:
- FTA:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM: 54
- FCS_CKM.1: 14
- FCS_CKM.1.1: 2
- FCS_CKM.2: 4
- FCS_CKM.4: 17
- FCS_CKM.4.1: 2
- FCS_COP: 34
- FCS_COP.1: 6
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC: 46
- FDP_ACC.1: 32
- FDP_ACC.1.1: 5
- FDP_ACF: 32
- FDP_ACF.1: 9
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_ETC: 1
- FDP_ETC.1: 7
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 23
- FDP_ITC: 18
- FDP_ITC.1: 12
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_ITC.2: 11
- FDP_RIP: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDI: 17
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 7
- FDP_UCT.1: 2
- FDP_UCT.1.1: 1
- FDP_UIT: 12
- FDP_UIT.1: 2
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL: 14
- FIA_AFL.1: 3
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_UAU: 15
- FIA_UAU.1: 7
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 14
- FIA_UID.1: 13
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 66
- FMT_MSA.1: 7
- FMT_MSA.1.1: 3
- FMT_MSA.2: 8
- FMT_MSA.2.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4: 2
- FMT_MSA.4.1: 2
- FMT_MTD: 11
- FMT_MTD.1: 2
- FMT_MTD.1.1: 2
- FMT_SMF.1: 24
- FMT_SMF.1.1: 1
- FMT_SMR.1: 37
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 14
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_PHP.1: 8
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_TRP: 1
- FPT_TST: 2
- FPT_TST.1: 11
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 30
- FTP_ITC.1: 7
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_TRP: 8
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_NOEVIL: 1
- A.ADMIN_NO_EVIL: 2
- A.OS_TRUSTED: 2
- A.PHY_PROPECT: 1
- A.PHY_PROTECT: 2
- A.SEP_PHY_NETWORK: 2
- A.TIME_SRC: 2
- O:
- OE:
- OE.OS_TRUSTED: 2
- OE.PHY_PROTECTION: 2
- OE.SEP_PHY_NETWORK: 2
- OE.TIME_SRC: 2
- OE.TRUST_WORTHY_USER: 2
- T:
- T.HOST_BYPASS: 3
- T.NOAUTH: 3
- T.NOIDENTIFY: 2
- T.VM_BYPASS: 2
- T.VNETWORK_BYPASS: 2
|
- A:
- D:
- D.DTBS: 1
- D.RAD: 1
- D.SCD: 1
- D.SIG: 1
- D.SSCD: 1
- D.SVD: 1
- D.VAD: 1
- O:
- OE:
- OE.HI_VAD: 5
- OE.SVD_AUTH_CGA: 1
|
| pdf_data/st_keywords/vendor |
- Huawei:
- Huawei: 16
- Huawei Technologies Co: 51
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 4
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- ICAO:
- PKCS:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20141107143835+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20141107143835+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 1072984
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
True |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
False |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |