name |
N-PosCore v1.1 |
TrustedX v3.0.10S1R1_T |
category |
Other Devices and Systems |
Key Management Systems |
scheme |
TR |
ES |
status |
archived |
archived |
not_valid_after |
17.04.2018 |
01.09.2019 |
not_valid_before |
17.04.2015 |
01.10.2010 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ENPOS%20N-PosCorev1.1%20Certification%20Report.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2009-03-INF-512.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NPC-ST-v.1.3.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2009-03-DS.pdf |
manufacturer |
EnPOS Bilişim Sanayi ve Ticaret A.Ş. |
Safelayer Secure Communications, S.A. |
manufacturer_web |
https://enpos.com.tr/index2.html |
https://www.safelayer.com/ |
security_level |
EAL2 |
EAL4+, ALC_FLR.2 |
dgst |
2b3d0f5ba408f311 |
0414e4a3122559bc |
heuristics/cert_id |
|
2009-3-INF-512 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_OPE.1 |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
1.1 |
3.0.10 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
3c9fd158eada1bf4 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/NGCRFAS_PP_v1.8.pdf |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
|
2009-03-INF-512.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 8
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UAU.6: 1
- FIA_UID.1: 1
- FMT:
- FMT_MSA.1: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 3
- A.PHYSICAL: 2
- T:
- T.AUDIT_COMPROMISE: 1
- T.CHANGE_TIME: 1
- T.CRYPTO_COMPROMISE: 1
- T.DATA_TO_BE_SIGNED: 1
- T.DATA_USED_FOR_VERIFYING_THE_SIGNATURE: 1
- T.DISCLOSURE_: 1
- T.DOS_CRL: 1
- T.DOS_OCSP: 1
- T.ILEGITIMATE_USE_OF_PRIVATE_KEYS: 1
- T.INVALID_CERTIFICATE: 1
- T.MASQUERADE: 1
- T.POOR_TEST: 1
- T.PSEUDONYM_NOT_SUPPORTED: 1
- T.RESIDUAL_DATA: 1
- T.RESULT_OF_THE_SIGNATURE_VALIDATION: 1
- T.SECURITY_AUDIT_EVENTS: 1
- T.SIGNATURE_FALSIFIED: 1
- T.SIGNATURE_NOT_RELIABLY_VERIFIED: 1
- T.SIGNED_DATA_FALSIFIED: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNIDENTIFIED_ACTIONS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Usuario1
- /CreationDate: D:20101026173958+02'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20101026173958+02'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: Microsoft Word - INF-512.DOC
- pdf_file_size_bytes: 529403
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
NPC-ST-v.1.3.pdf |
2009-03-DS.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 8
- EAL4 augmented: 1
- EAL4+: 17
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 13
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 12
- ADV_IMP.1: 10
- ADV_TDS.1: 2
- ADV_TDS.3: 18
- AGD:
- AGD_OPE.1: 13
- AGD_PRE.1: 8
- ALC:
- ALC_CMC.4: 16
- ALC_CMS.1: 1
- ALC_CMS.4: 7
- ALC_DEL.1: 6
- ALC_DVS.1: 6
- ALC_FLR.2: 19
- ALC_LCD.1: 8
- ALC_TAT.1: 9
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 19
- ASE_INT.1: 13
- ASE_OBJ.2: 12
- ASE_REQ.1: 1
- ASE_REQ.2: 14
- ASE_SPD.1: 9
- ASE_TSS.1: 5
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 6
- ATE_DPT.2: 7
- ATE_FUN.1: 12
- ATE_IND.2: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_STG: 1
- FAU_STG.1: 6
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 5
- FAU_STG.4.1: 1
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 5
- FCO_NRO.2.1: 1
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 1
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 15
- FCS_CKM.1.1: 5
- FCS_CKM.2: 10
- FCS_CKM.4: 37
- FCS_CKM.4.1: 1
- FCS_COP: 30
- FCS_COP.1: 10
- FCS_COP.1.1: 6
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 35
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ETC: 12
- FDP_ETC.2: 8
- FDP_ETC.2.1: 3
- FDP_ETC.2.2: 3
- FDP_ETC.2.3: 3
- FDP_ETC.2.4: 3
- FDP_IFC: 25
- FDP_IFC.1: 34
- FDP_IFC.1.1: 3
- FDP_IFF: 16
- FDP_IFF.1: 6
- FDP_IFF.1.1: 3
- FDP_IFF.1.2: 3
- FDP_IFF.1.3: 2
- FDP_IFF.1.4: 3
- FDP_IFF.1.5: 3
- FDP_ITC: 18
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITC.2.1: 3
- FDP_ITC.2.2: 3
- FDP_ITC.2.3: 3
- FDP_ITC.2.4: 3
- FDP_ITC.2.5: 3
- FDP_SDI: 11
- FDP_SDI.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 11
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_UAU: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 5
- FIA_UAU.4.1: 1
- FIA_UID: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 7
- FMT_MOF.1.1: 1
- FMT_MSA: 66
- FMT_MSA.1: 6
- FMT_MSA.1.1: 8
- FMT_MSA.3: 8
- FMT_MSA.3.1: 3
- FMT_MSA.3.2: 3
- FMT_MTD: 12
- FMT_MTD.1.1: 2
- FMT_SMF: 1
- FMT_SMF.1: 22
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 27
- FMT_SMR.2: 7
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP: 1
- FPT_PHP.1: 1
- FPT_PHP.2: 6
- FPT_PHP.2.1: 1
- FPT_PHP.2.2: 1
- FPT_PHP.2.3: 1
- FPT_RCV: 1
- FPT_RCV.1: 5
- FPT_RCV.1.1: 1
- FPT_RCV.4: 5
- FPT_RCV.4.1: 1
- FPT_STM: 1
- FPT_STM.1: 7
- FPT_STM.1.1: 1
- FPT_TDC: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TEE: 11
- FPT_TEE.1.1: 2
- FPT_TEE.1.2: 2
- FPT_TST: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 14
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 6
|
- FAU:
- FAU_GEN: 28
- FAU_GEN.1: 3
- FAU_GEN.2: 1
- FCS:
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_UAU.1: 18
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 8
- FIA_UAU.4.1: 1
- FIA_UAU.6: 10
- FIA_UAU.6.1: 1
- FIA_UID.1: 19
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 10
- FMT_MSA.1.1: 2
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 2
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 5
- FPT_TEE.1: 24
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FTP:
- FTP_TRP.1: 17
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.NO_EVIL: 8
- A.PHYSICAL: 11
- OE:
- OE.AUDIT_GENERATION: 8
- OE.AUDIT_PROTECT: 1
- OE.AUDIT_PROTECTION: 5
- OE.AUDIT_REVIEW: 6
- OE.CORRECT_TSF_OPERATION: 6
- OE.CRYPTOGRAPHY: 9
- OE.DISPLAY_BANNER: 6
- OE.MANAGE: 5
- OE.MEDIATE: 6
- OE.NO_EVIL: 6
- OE.PHYSICAL: 28
- OE.RESIDUAL_INFORMATION: 11
- OE.SELF_PROTECTION: 8
- OE.TIME_STAMPS: 10
- OE.TIME_TOE: 8
- OE.TOE_ACCESS: 12
- OE.TOE_PROTECTION: 8
- T:
- T.AUDIT_COMPROMISE: 8
- T.CHANGE_TIME: 5
- T.CRYPTO_COMPROMISE: 6
- T.DATA_TO_BE_SIGNED: 7
- T.DATA_USED_FOR_VERIFYING_THE_SIGNATURE: 8
- T.DISCLOSURE_: 2
- T.DISCLOSURE_OR_NOT_UNIQUE_PRIVATE: 2
- T.DISCLOSURE_OR_NOT_UNIQUE_PRIVATE_KEYS: 2
- T.DOS_CRL: 7
- T.DOS_OCSP: 7
- T.ILEGITIMATE_USE_OF_PRIVATE_KEYS: 6
- T.INVALID_CERTIFICATE: 6
- T.MASQUERADE: 5
- T.POOR_TEST: 5
- T.PSEUDONYM_NOT_SUPPORTED: 5
- T.RESIDUAL_DATA: 4
- T.RESULT_OF_THE_SIGNATURE_VALIDATION: 7
- T.SECURITY_AUDIT_EVENTS: 5
- T.SIGNATURE_FALSIFIED: 6
- T.SIGNATURE_NOT_RELIABLY_VERIFIED: 5
- T.SIGNED_DATA_FALSIFIED: 8
- T.TSF_COMPROMISE: 6
- T.UNATTENDED_SESSION: 4
- T.UNAUTHORIZED_ACCESS: 5
- T.UNIDENTIFIED_ACTIONS: 7
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 2
- Malfunction: 3
- malfunction: 2
- physical tampering: 8
- SCA:
- DPA: 3
- SPA: 3
- side channel: 3
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 198-1: 2
- FIPS PUB 180-2: 3
- NIST:
- NIST SP 800-38A: 1
- NIST SP 800-56A: 1
- RFC:
- X509:
|
- FIPS:
- PKCS:
- PKCS #7: 8
- PKCS#11: 10
- PKCS#7: 7
- RFC:
- RFC 2560: 2
- RFC 4511: 1
- RFC2311: 4
- RFC2560: 5
- RFC2633: 4
- RFC3161: 3
- RFC5280: 11
- X509:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: EnPOS Bilişim
- /CreationDate: D:20161130130905+03'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20161130130905+03'00'
- /Producer: Microsoft® Word 2013
- /Subject: Security Target
- /Title: N-PosCore v.1.1.0.0
- pdf_file_size_bytes: 1174258
- pdf_hyperlinks: http://en.wikipedia.org/wiki/Receipt
- pdf_is_encrypted: False
- pdf_number_of_pages: 86
|
- /Approvers: montse
- /Author: montse
- /Company: Safelayer Secure Communications, S.A.
- /CreationDate: D:20100715100224+02'00'
- /Creator: Acrobat PDFMaker 7.0.7 for Word
- /Department: Security Target
- /DocumentID: 0775BA94
- /Editors: montse,QUALITY,jordan,jbt
- /FrontCoverHeading: TrustedX
- /FrontCoverHeading2:
- /Keywords: TrustedX, Security Target, EAL4+, CC, Certification, Digital Signature, Authentication, Web Services
- /Language: EN
- /ModDate: D:20101026175745+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /ProductFamily: N/A
- /Readers: montse,ALL
- /Reviewers: montse
- /SourceModified: D:20100715080042
- /State: Issued
- /Title: TrustedX Security Target
- /TranslatedFrom: Original
- /Version: 1.7
- pdf_file_size_bytes: 1410916
- pdf_hyperlinks: http://www.fesa.eu/public-documents/PublicStatement-ServerBasedSignatureServices-20051027.pdf
- pdf_is_encrypted: True
- pdf_number_of_pages: 195
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
False |
True |
state/report/download_ok |
False |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |