Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Enveil ZeroReveal® Compute Fabricc Client v4.6.3
CCEVS-VR-VID-11424-2024
EPSON LM-C6000/LM-C5000/LM-C4000/AM-C6000/AM-C5000/AM-C4000 with FAX1.00
JISEC-CC-CRP-C0803-01-2023
name Enveil ZeroReveal® Compute Fabricc Client v4.6.3 EPSON LM-C6000/LM-C5000/LM-C4000/AM-C6000/AM-C5000/AM-C4000 with FAX1.00
category Other Devices and Systems Multi-Function Devices
scheme US JP
not_valid_after 11.04.2026 14.12.2028
not_valid_before 11.04.2024 14.12.2023
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11424-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_eimg.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11424-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_erpt.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11424-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0803_est.pdf
manufacturer Enveil SEIKO EPSON CORPORATION
manufacturer_web https://www.enveil.com https://www.epson.com/
security_level {} EAL2, ALC_FLR.2
dgst 2ebf7c9b55f345e7 f6aad6ac7a2f5f2d
heuristics/cert_id CCEVS-VR-VID-11424-2024 JISEC-CC-CRP-C0803-01-2023
heuristics/cert_lab US []
heuristics/extracted_sars ALC_CMS.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, AGD_PRE.1, AVA_VAN.1, ASE_ECD.1, ALC_TSU_EXT.1, ASE_SPD.1, ASE_OBJ.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1
heuristics/extracted_versions 4.6.3 1.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0803
  • certification_date: 01.12.2023
  • claim: PP(U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
  • enhanced:
    • assurance_level: EAL2 Augmented by ALC_FLR.2
    • cc_version: 3.1 Release5
    • cert_id: JISEC-CC-CRP-C0803
    • cert_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE This TOE is a multifunction peripheral (MFP) that has the functions, such as copy, print, scan, FAX, document storage and retrieval. This TOE provides Security Functions required for "U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)", which is a protection profile for MFPs. TOE security functionality The security functions of this TOE are as follows: Identification and Authentication Function Function to identify and authenticate users. Access Control Function for TOE Function Function to restrict available functions for each authorized user. Document Access Control Function Function to allow only the authorized users and the administrator to access to stored documents. Residual Data Overwrite Function Function to overwrite and delete unnecessary document data in the HDD and the Flash ROM. Network Protection Function Function to protect communication data using encryption communication protocols. Security Management Function Function to allow only the administrator to manage security functions. Self-Test Function Function to verify the integrity of executable codes at startup. Audit Log Function Function to record audit logs related to security events and allow only the administrator to view that log.
    • evaluation_facility: Information Technology Security Center, Evaluation Department
    • product: EPSON LM-C6000/LM-C5000/LM-C4000/ AM-C6000/AM-C5000/AM-C4000 with FAX
    • product_type: Multifunction Peripheral
    • protection_profile: U.S. Government Approved Protection Profile - U.S. Government Protection Profile for Hardcopy Devices Version 1.0 (IEEE Std. 2600.2™-2009)
    • report_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/k4kumo0000001dch-att/c0803_est.pdf
    • toe_version: 1.00
    • vendor: SEIKO EPSON CORPORATION
  • expiration_date:
  • supplier: SEIKO EPSON CORPORATION
  • toe_japan_name: EPSON LM-C6000 / LM-C5000 / LM-C4000 / AM-C6000 / AM-C5000 / AM-C4000 with FAX 1.00
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0803_it2837.html
  • toe_overseas_name: EPSON LM-C6000 / LM-C5000 / LM-C4000 / AM-C6000 / AM-C5000 / AM-C4000 with FAX 1.00
heuristics/protection_profiles 90c116e62a19bc4d, c40ae795865a0dba 43ce79b420f23a00
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_V1.4.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_eal2_v1.0-1.pdf
pdf_data/cert_filename st_vid11424-ci.pdf c0803_eimg.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11424-2024: 1
  • JP:
    • JISEC-CC-CRP-C0803-01-2023: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_metadata
  • /CreationDate: D:20240604102059-04'00'
  • /ModDate: D:20240604102059-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 187474
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author:
  • /CreationDate: D:20240118104935+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /Keywords:
  • /ModDate: D:20240118105338+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240118014904
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 234774
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid11424-vr.pdf c0803_erpt.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11424-2024
    • cert_item: for the Enveil ZeroReveal® Compute Fabric Client v4.6.3, Version 1.0
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11424-2024: 1
  • JP:
    • JISEC-CC-CRP-C0803-01-2023: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.2: 1
    • FCS_COP: 4
    • FCS_RBG_EXT.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESD: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 13
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 5
  • ITSC:
    • Information Technology Security Center: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 2
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 33
      • TLS 1.2: 1
      • TLS v1.0: 1
  • IPsec:
    • IPsec: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/report_keywords/ecc_curve
  • NIST:
    • Curve P-384: 1
    • P-256: 4
    • P-384: 3
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-90A: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The TOE is a software application, and as such many of the functions of the application itself are out of scope of a Common Criteria Evaluation. The following functionality is explicitly excluded from the scope: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author:
  • /CreationDate: D:20240117103337+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 17
  • /ModDate: D:20240117103448+09'00'
  • /Producer: Adobe PDF Library 17.11.238
  • /SourceModified: D:20240117012203
  • pdf_file_size_bytes: 395424
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 33
pdf_data/st_filename st_vid11424-st.pdf c0803_est.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 9
    • FCS_CKM.1: 3
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT: 2
    • FCS_CKM_EXT.1: 4
    • FCS_COP: 21
    • FCS_COP.1: 4
    • FCS_RBG_EXT.1: 5
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.2: 5
    • FCS_RBG_EXT.2.1: 1
    • FCS_RBG_EXT.2.2: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 5
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 5
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.3: 5
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.5: 5
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 6
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.2: 6
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLSS_EXT.3: 5
    • FCS_TLSS_EXT.3.1: 1
    • FCS_TLS_EXT.1: 5
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT.1: 4
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 4
    • FDP_DEC_EXT.1.1: 1
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 4
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 5
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 5
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 1
    • FPT_AEX_EXT.1.4: 1
    • FPT_AEX_EXT.1.5: 2
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 5
    • FPT_TUD_EXT.2.2: 2
    • FPT_TUD_EXT.2.3: 1
  • FTP:
    • FTP_DIT_EXT.1: 5
    • FTP_DIT_EXT.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 10
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 4
    • FDP_IFF: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 24
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 7
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 26
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 24
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 33
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 3
    • FPT_FDI_EXP.1: 12
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A: 1
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
  • A:
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 11
    • D.DOC: 42
    • D.FUNC: 26
    • D.PROT: 8
  • O:
    • O.AUDIT: 5
    • O.AUDIT_ACCESS: 4
    • O.AUDIT_STORAGE: 4
    • O.CONF: 10
    • O.DOC: 10
    • O.FUNC: 5
    • O.INTERFACE: 5
    • O.PROT: 5
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 2
    • OE.AUDIT_STORAGE: 2
    • OE.INTERFACE: 3
    • OE.PHISICAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 7
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
      • AES-256: 1
  • constructions:
    • MAC:
      • HMAC: 3
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 1
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 1
    • DSA:
      • DSA: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA256: 2
      • SHA384: 4
      • SHA512: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • PGP:
    • PGP: 1
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 2
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 99
      • TLS 1.0: 1
      • TLS 1.1: 2
      • TLS 1.2: 5
      • TLS1.1: 1
      • TLSv1.2: 3
  • VPN:
    • VPN: 1
  • IPsec:
    • IPsec: 19
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • CTR:
    • CTR: 1
  • GCM:
    • GCM: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 12
    • secp256r1: 1
    • secp384r1: 7
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
pdf_data/st_keywords/crypto_library
  • BoringSSL:
    • BoringSSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 186-4: 8
  • NIST:
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 2818: 4
    • RFC 4346: 1
    • RFC 5246: 5
    • RFC 5280: 3
    • RFC 5289: 8
    • RFC 6125: 3
    • RFC 8603: 2
  • X509:
    • X.509: 4
pdf_data/st_keywords/javacard_packages
  • java:
    • java.awt.geom: 1
    • java.beans: 1
    • java.io: 36
    • java.lang.annotation: 7
    • java.lang.ref: 1
    • java.lang.reflect: 7
    • java.math: 2
    • java.net: 10
    • java.nio: 2
    • java.nio.charset: 2
    • java.nio.file: 10
    • java.nio.file.attribute: 2
    • java.security: 25
    • java.security.cert: 13
    • java.security.interfaces: 5
    • java.security.spec: 5
    • java.sql: 9
    • java.text: 5
    • java.time: 6
    • java.time.format: 1
    • java.time.temporal: 1
    • java.util: 40
    • java.util.concurrent: 19
    • java.util.concurrent.atomic: 4
    • java.util.concurrent.locks: 3
    • java.util.function: 8
    • java.util.logging: 4
    • java.util.regex: 2
    • java.util.stream: 4
    • java.util.zip: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The TOE is a software application, and as such many of the functions of the application itself are out of scope of a Common Criteria Evaluation. The following functionality is explicitly excluded from the scope: 1
    • out of scope: 1
pdf_data/st_metadata
  • /CreationDate: D:20240111155300+09'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20240111155300+09'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 1539224
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 71
state/cert/convert_garbage True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different