name |
Websense V10000 G2 Web Gateway Appliance v7.6 |
NXP JAVA OS1 ChipDoc v1.0 ICAO EAC-SAC with optional AA on P60D080JVC |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
CA |
FR |
status |
archived |
archived |
not_valid_after |
15.05.2017 |
07.12.2020 |
not_valid_before |
18.01.2012 |
07.12.2015 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-cert-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_75.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-sec-eng.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2015_75_LITE.pdf |
manufacturer |
Websense, Inc. |
Athena Smartcard Solutions / NXP Semiconductors |
manufacturer_web |
https://www.websense.com |
https://www.athena-scs.com/ |
security_level |
EAL2+, ALC_FLR.2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
2fa07c60f571d282 |
737c4b72842b2c68 |
heuristics/cert_id |
383-4-179 |
ANSSI-CC-2015/75 |
heuristics/cert_lab |
CANADA |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
7.6 |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0897-V2-2014, NSCIB-CC-12-36243-CR2 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0897-2013, BSI-DSZ-CC-0837-V2-2014, NSCIB-CC-12-36243-CR2, BSI-DSZ-CC-0897-V2-2014, BSI-DSZ-CC-0837-2013, NSCIB-CC-12-36243-CR |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0897-V2-2014, NSCIB-CC-12-36243-CR2 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
NSCIB-CC-12-36243-CR, BSI-DSZ-CC-0897-V2-2014, NSCIB-CC-12-36243-CR2 |
heuristics/protection_profiles |
{} |
a33327d40f253f46, b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
websense-v76-cert-eng.pdf |
ANSSI-CC-2015_75.pdf |
pdf_data/report_frontpage |
- FR:
- CA:
- cert_id: 383-4-179-CR
- cert_lab: CANADA
|
- FR:
- cc_security_level: EAL 5 augmenté AVA_VAN.5, ALC_DVS.2
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2015/75
- cert_item: NXP JAVA OS1 ChipDoc v1.0 ICAO EAC-SAC with optional AA on P60D080JVC
- cert_item_version: V1.0
- cert_lab: SERMA TECHNOLOGIES 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: ATHENA SMARTCARD SOLUTIONS 16615 Lark Ave, Suite 202, Los Gatos 95032 CA, USA NXP SEMICONDUCTORS GERMANY GMBH Stresemannallee 101, 22529 Hamburg, Allemagne Commanditaire ATHENA SMARTCARD SOLUTIONS 16615 Lark Ave, Suite 202, Los Gatos 95032 CA, USA
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à des profils de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE (EAC PP) Version 1.3.2, BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP) Version 1.0, BSI-CC-PP-0068-V2-2011
- CA:
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0897-V2-: 1
- BSI-DSZ-CC-0897-V2-2014: 1
- FR:
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 2
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 2 augmented: 2
- EAL 2+: 2
- EAL2: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 2
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Shawn Pinet
- /CCEF: CGI IT Security Evaluation & Test Facility
- /CR date: 23 December 2011
- /CR version: 0.1
- /Certificate date: dd month yyyy
- /Company:
- /CreationDate: D:20120202110905-05'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer name: Websense, Inc.
- /Document number: 383-4-179-CR
- /ETR title, version, date: ETR title, version, date
- /Evaluation completion date: dd month yyyy
- /Keywords: Internet Proxy, Web Gateway, Triton, Websense
- /Manager:
- /ModDate: D:20120202110951-05'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ST Title: Websense, Inc. V10000 G2 Web Gateway Appliance v7.6 Security Target
- /ST date: 22 December 2011
- /ST version: 1.0
- /SourceModified: D:20120202160256
- /Sponsor: Websense, Inc.
- /Subject:
- /TOE Version: 7.6
- /TOE name and version: Websense V10000 G2 Web Gateway Appliance v7.6
- /TOE short name: Websense V10000 G2 7.6
- /Title: EAL 2 Evaluation of V10000 G2 v7.6
- pdf_file_size_bytes: 85151
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2015_75
- pdf_file_size_bytes: 215715
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
websense-v76-sec-eng.pdf |
anssi_cible_2015_75_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0897-V2-2014: 2
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 2
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2012: 1
- BSI-CC-PP0055: 1
- BSI-CC-PP0056-V2-2012: 1
- BSI-CC-PP0068-V2-2011: 1
- BSI-PP-0035-2007: 3
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL2: 4
- EAL2 augmented: 1
- EAL2+: 3
|
- EAL:
- EAL 4: 4
- EAL 4 augmented: 4
- EAL 4+: 3
- EAL 5: 1
- EAL 5 augmented: 1
- EAL 5+: 1
- EAL 6+: 1
- EAL4+: 1
- EAL5: 7
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.2: 5
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.2: 1
- ADV_FSP.5: 6
- ADV_IMP.1: 5
- ADV_INT.2: 2
- ADV_TDS.3: 1
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.5: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.2: 4
- ASE:
- ASE_CCL.1: 2
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT.1: 4
- ASE_OBJ.2: 3
- ASE_REQ.2: 4
- ASE_SPD.1: 1
- ASE_TSS.1: 2
- ATE:
- ATE_COV.2: 4
- ATE_DPT.2: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 4
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 8
- FAU_GEN.1: 16
- FAU_SAR: 6
- FAU_SAR.1: 11
- FAU_SAR.2: 6
- FAU_SAR.2.1: 1
- FAU_SEL.1: 6
- FAU_SEL.1.1: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_ROL: 1
- FDP_ROL.2: 1
- FIA:
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 6
- FMT_MOF.1.1: 1
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_SAE.1: 6
- FMT_SAE.1.1: 1
- FMT_SAE.1.2: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 14
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_STM.1: 12
- FPT_STM.1.1: 1
- FRU:
- FRU_FLT.1: 1
- FRU_FLT.2: 6
- FRU_FLT.2.1: 1
- FRU_RSA: 8
- FRU_RSA.1: 6
- FTA:
- FTA_MCS.1: 1
- FTA_MCS.2: 6
- FTA_MCS.2.1: 1
- FTA_MCS.2.2: 1
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 29
- FCS_CKM.1: 8
- FCS_CKM.2: 1
- FCS_CKM.4: 19
- FCS_CKM.4.1: 1
- FCS_COP: 41
- FCS_COP.1: 8
- FCS_RND: 8
- FCS_RND.1: 17
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC: 9
- FDP_ACC.1: 3
- FDP_ACF: 8
- FDP_ACF.1: 17
- FDP_ITC: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
- FDP_UCT: 5
- FDP_UCT.1: 3
- FDP_UIT: 5
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 3
- FIA_API: 14
- FIA_API.1: 11
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 47
- FIA_UAU.1: 4
- FIA_UAU.4: 6
- FIA_UAU.4.1: 1
- FIA_UAU.5: 7
- FIA_UAU.6: 5
- FIA_UID: 11
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 4
- FMT_MTD: 53
- FMT_MTD.1: 14
- FMT_MTD.3: 8
- FMT_MTD.3.1: 1
- FMT_SMF.1: 19
- FMT_SMF.1.1: 1
- FMT_SMR: 18
- FMT_SMR.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_FLS.1: 5
- FPT_FLS.1.1: 1
- FPT_PHP.3: 6
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 6
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.EXCLUSIVE: 2
- A.INSTALL: 2
- A.LOCATE: 3
- A.MANAGE: 3
- A.NETWORK: 2
- A.NOEVIL: 2
- O:
- O.AUDIT: 12
- O.AUTHENTICATE: 11
- O.DB_RESILIENCY: 7
- O.HARMFUL_CONTENT: 8
- O.MANAGE: 10
- O.PROTECT: 9
- O.QUOTA: 6
- O.RESOURCE_CONTROL: 8
- O.TIMESTAMP: 5
- OE:
- T:
- T.DB_FAILURE: 2
- T.EXTERNAL_CONTENT: 2
- T.MASQUERADE: 2
- T.NACCESS: 2
- T.RESOURCE: 2
- T.UNAUTHORIZED_ACCESS: 2
|
|
pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 26
- NXP Semiconductors: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 3
- malfunction: 6
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
- BSI:
- BSI 2006: 1
- BSI TR-03110: 1
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 12
- EF.DG13: 2
- EF.DG14: 7
- EF.DG15: 4
- EF.DG16: 11
- EF.DG2: 6
- EF.DG3: 16
- EF.DG4: 15
- EF.DG5: 5
- EF.SOD: 4
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 46-3: 2
- FIPS PUB 180-2: 1
- FIPS PUB 197-2001: 1
- FIPS PUB 46-3: 3
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 7816: 2
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Stephanie Motre
- /CreationDate: D:20151106135353-08'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20151127144314+01'00'
- /Producer: Microsoft® Word 2010
- /Title: Aries Security Target
- pdf_file_size_bytes: 1890225
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 74
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |