name |
Nubo Software Thin Client v2.0 |
jTOP e-Passport - Composant SLE66CLX641P masqué par l'application jTOP e-Passport version 8.05 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
US |
FR |
status |
archived |
archived |
not_valid_after |
23.07.2020 |
01.09.2019 |
not_valid_before |
23.07.2018 |
19.12.2005 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10886-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10886-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2005_52.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10886-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2005_52.pdf |
manufacturer |
Nubo Software Inc. |
Trusted Logic / Infineon |
manufacturer_web |
https://nubosoftware.com |
https://www.trusted-logic.com/ |
security_level |
{} |
ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst |
3ae33cfddd92a583 |
555c86ba06074810 |
heuristics/cert_id |
CCEVS-VR-10886-2018 |
ANSSI-CC-2005/52 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1 |
ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ALC_DVS.2, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, AVA_SOF.1, ADV_FSP.2, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ADV_IMP.2, ATE_DPT.1, AVA_VLA.4, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1, AVA_MSU.3 |
heuristics/extracted_versions |
2.0 |
8.05 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0338-2005 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0338-2005, BSI-DSZ-CC-0169-2002, BSI-DSZ-CC-0223-2003 |
heuristics/scheme_data |
- category: Application Software
- certification_date: 23.07.2018
- evaluation_facility: Acumen Security
- expiration_date: 23.07.2020
- id: CCEVS-VR-VID10886
- product: Nubo Software Thin Client v2.0
- scheme: US
- url: https://www.niap-ccevs.org/product/10886
- vendor: Nubo Software LTD
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
1aeebf1c5963b606 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_v1.2.pdf |
{} |
pdf_data/cert_filename |
st_vid10886-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10886-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180726124154-04'00'
- /ModDate: D:20180726124154-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 180754
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10886-vr.pdf |
2005_52.pdf |
pdf_data/report_frontpage |
- FR:
- US:
- cert_id: CCEVS-VR-10886-2018
- cert_item: for the Nubo Software Thin Client v2.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- Rapport de certification 2005/52: 13
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL1: 1
- EAL3: 1
- EAL4: 3
- EAL4+: 1
- EAL41: 1
- EAL5: 2
- EAL7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ACM:
- ACM_AUT: 1
- ACM_AUT.1: 2
- ACM_CAP: 1
- ACM_CAP.4: 2
- ACM_SCP: 1
- ACM_SCP.2: 1
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADV:
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_HLD: 1
- ADV_HLD.2: 1
- ADV_IMP: 1
- ADV_IMP.2: 5
- ADV_INT: 1
- ADV_LLD: 1
- ADV_LLD.1: 1
- ADV_RCR: 1
- ADV_RCR.1: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- AGD:
- AGD_ADM: 1
- AGD_ADM.1: 1
- AGD_USR: 1
- AGD_USR.1: 1
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 7
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ASE:
- ASE_DES.1: 1
- ASE_ENV.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_PPC.1: 1
- ASE_REQ.1: 1
- ASE_SRE.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_IND: 1
- ATE_IND.2: 1
- AVA:
- AVA_CCA: 1
- AVA_MSU: 1
- AVA_MSU.2: 1
- AVA_MSU.3: 1
- AVA_SOF: 1
- AVA_SOF.1: 1
- AVA_VLA: 1
- AVA_VLA.2: 1
- AVA_VLA.4: 1
|
pdf_data/report_keywords/cc_sfr |
|
- FCS:
- FCS_CKM.1: 1
- FCS_CKM.4: 1
- FCS_COP.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_ACF.1: 1
- FDP_ETC.1: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 1
- FDP_ITT.1: 1
- FDP_ROL.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 1
- FDP_UIT.1: 1
- FIA:
- FIA_UAU.1: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UID.1: 1
- FMT:
- FMT_LIM.1: 1
- FMT_LIM.2: 1
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 1
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPR:
- FPT:
- FPT_FLS.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_SEP.1: 1
- FPT_TST.1: 1
- FRU:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 4
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20180726124116-04'00'
- /ModDate: D:20180726124116-04'00'
- pdf_file_size_bytes: 453494
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /Author: DCSSI
- /CreationDate: D:20051219185336+01'00'
- /Creator: Acrobat PDFMaker 5.0 pour Word
- /Keywords: CER/F/07.3
- /ModDate: D:20051219185340+01'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: Composant SLE66CLX641P masqué par l'application jTOP e-Passport version 8.05
- /Title: Rapport de certification 2005/52
- pdf_file_size_bytes: 666197
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 23
|
pdf_data/st_filename |
st_vid10886-st.pdf |
cible2005_52.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 2
- EAL4 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.1: 2
- ALC_CMS.1: 1
- ALC_TSU_EXT.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.1: 1
- ASE_REQ.1: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 5
- FCS_CKM.2: 1
- FCS_RBG_EXT.1: 3
- FCS_RBG_EXT.1.1: 2
- FCS_STO_EXT.1: 4
- FCS_STO_EXT.1.1: 2
- FCS_TLSC_EXT: 1
- FCS_TLSC_EXT.1: 5
- FCS_TLSC_EXT.1.1: 2
- FCS_TLSC_EXT.1.2: 2
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.4: 3
- FCS_TLSC_EXT.4.1: 1
- FCS_TLSS_EXT.1: 9
- FCS_TLSS_EXT.1.1: 3
- FCS_TLSS_EXT.1.3: 1
- FCS_TLSS_EXT.2: 2
- FDP:
- FDP_DAR_EXT.1: 4
- FDP_DAR_EXT.1.1: 1
- FDP_DEC_EXT.1: 3
- FDP_DEC_EXT.1.1: 1
- FDP_DEC_EXT.1.2: 1
- FDP_NET_EXT.1: 3
- FDP_NET_EXT.1.1: 1
- FMT:
- FMT_CFG_EXT.1: 3
- FMT_CFG_EXT.1.1: 1
- FMT_CFG_EXT.1.2: 2
- FMT_MEC_EXT.1: 4
- FMT_MEC_EXT.1.1: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 3
- FPR:
- FPR_ANO_EXT.1: 3
- FPR_ANO_EXT.1.1: 1
- FPT:
- FPT_AEX_EXT.1: 3
- FPT_AEX_EXT.1.1: 1
- FPT_AEX_EXT.1.2: 1
- FPT_AEX_EXT.1.3: 4
- FPT_AEX_EXT.1.4: 2
- FPT_AEX_EXT.1.5: 1
- FPT_API_EXT.1: 3
- FPT_API_EXT.1.1: 1
- FPT_LIB_EXT.1: 3
- FPT_LIB_EXT.1.1: 1
- FPT_TUD_EXT.1: 3
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FPT_TUD_EXT.1.4: 1
- FPT_TUD_EXT.1.5: 1
- FPT_TUD_EXT.1.6: 1
- FTP:
- FTP_DIT_EXT.1: 4
- FTP_DIT_EXT.1.1: 1
|
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 2
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 16
- FCS_COP.1: 8
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 2
- FDP_ACF: 5
- FDP_ACF.1: 8
- FDP_ETC: 4
- FDP_ETC.1: 4
- FDP_IFC: 2
- FDP_IFC.1: 1
- FDP_ITC: 5
- FDP_ITC.1: 6
- FDP_ITT: 2
- FDP_ITT.1: 1
- FDP_ROL: 4
- FDP_ROL.1: 4
- FDP_SDI: 2
- FDP_SDI.2: 2
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UIT: 2
- FDP_UIT.1: 2
- FIA:
- FIA_UAU: 6
- FIA_UAU.1: 2
- FIA_UAU.4: 1
- FIA_UAU.5: 2
- FIA_UID: 3
- FIA_UID.1: 2
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 10
- FMT_LIM.2: 9
- FMT_LIM.2.1: 2
- FMT_MSA: 16
- FMT_MSA.1: 4
- FMT_MSA.2: 1
- FMT_MSA.3: 6
- FMT_SMF: 6
- FMT_SMF.1: 3
- FMT_SMR: 2
- FMT_SMR.1: 2
- FPR:
- FPR_UNO.1: 2
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 3
- FPT_FLS.1: 1
- FPT_ITT: 2
- FPT_ITT.1: 1
- FPT_PHP: 2
- FPT_PHP.3: 1
- FPT_SEP: 2
- FPT_SEP.1: 2
- FPT_TST: 3
- FPT_TST.1: 3
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.PLATFORM: 1
- A.PROPER_ADMIN: 1
- A.PROPER_USER: 1
- O:
- O.INTEGRITY: 1
- O.MANAGEMENT: 1
- O.PROTECTED_COMMS: 1
- O.PROTECTED_STORAGE: 1
- O.QUALITY: 1
- OE:
- OE.PLATFORM: 1
- OE.PROPER_ADMIN: 1
- OE.PROPER_USER: 1
- T:
- T.LOCAL_ATTACK: 1
- T.NETWORK_ATTACK: 1
- T.NETWORK_EAVESDROP: 1
- T.PHYSICAL_ACCESS: 1
|
- A:
- A.INSPECTION-SYSTEM: 2
- A.KEYS: 2
- A.MANUFACTURING: 3
- A.PERSONALIZATION: 2
- A.SIGNATURE-PKI: 2
- O:
- O.ABUSE-FUNC: 2
- O.AC-PERSO: 2
- O.ACTIVE-AUTH-PROOF: 2
- O.CRYPTO: 2
- O.DISALLOWED-FUNCTIONS: 2
- O.IDENTIFICATION: 3
- O.INFO-: 1
- O.INFO-CONFIDENTIALITY: 3
- O.INFO-ORIGIN-INTEGRITY: 2
- O.KEY-MNGT: 3
- O.LIFE-CYCLE: 2
- O.LOGICAL-PROTECTION: 2
- O.NO-DELETION: 2
- O.NO-KEY-REUSE: 2
- O.NO-LOAD: 2
- O.PROT-INF-LEAK: 3
- O.PROT-MALFUNCTION: 2
- O.PROT-PERS: 2
- O.PROT-PHYS-TAMPER: 3
- O.RECOVERY: 2
- O.REQUEST: 2
- O.STORAGE-INTEGRITY: 3
- OE:
- OE.ACTIVE-AUTH-KEY: 2
- OE.ACTIVE-AUTH-VERIF: 2
- OE.EXAMINATION: 2
- OE.MANUFACTURING: 3
- OE.PASSIVE-AUTH-SIGN: 2
- OE.PASSIVE-AUTH-VERIF: 2
- OE.PASSPORT-ADMIN: 2
- OE.PERSONALIZATION: 2
- OE.PROT-DATA: 2
- OSP:
- OSP: 1
- OSP.INIT: 3
- OSP.PERSONAL-DATA: 2
- OSP.SECURE-COMMUNICATIONS: 2
- T:
- T.ABUSE-FUNC: 3
- T.BRUTE-FORCE: 2
- T.CHIP-ID: 2
- T.COUNTERFEIT: 2
- T.DELETION: 2
- T.EAVESDOPPING: 1
- T.EAVESDROPPING: 2
- T.FAULT-INSERTION: 2
- T.FORCED-RESET: 2
- T.FORGERY: 2
- T.INF-LEAK: 2
- T.INSTALL: 3
- T.INVALID-INPUT: 2
- T.MALFUNCTION: 2
- T.PHYS-TAMPER: 2
- T.REPLAY: 2
- T.SKIMMING: 2
- T.USURPATION: 2
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon Technologies AG: 3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- secp256r1: 2
- secp384r1: 2
- secp521r1: 2
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_AES_128_CBC_SHA: 2
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Physical tampering: 1
- malfunction: 5
- physical tampering: 2
- SCA:
- DPA: 2
- Leak-Inherent: 1
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- RFC:
- RFC 2560: 1
- RFC 2818: 2
- RFC 5246: 9
- RFC 5280: 4
- RFC 5289: 16
- RFC 6125: 1
- RFC5280: 1
- RFC5759: 1
- X509:
|
- CC:
- CCIMB-2004-01-001: 1
- CCIMB-2004-01-002: 1
- CCIMB-2004-01-003: 1
- CCIMB-2004-01-004: 1
- FIPS:
- FIPS 180-1: 1
- FIPS 46-3: 1
- ICAO:
- ISO:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
- com:
- com.afollestad.materialdialogs.internal: 2
- com.crashlytics.android: 2
- com.google.android.gms: 2
- com.google.common: 1
- com.google.firebase.iid: 2
- com.google.firebase.messaging: 1
- com.google.firebase.provider: 2
- com.google.gson.internal.bind: 1
- com.google.gson.reflect: 2
- com.google.gson.stream: 1
- com.google.j2objc.annotations: 2
- com.google.thirdparty.publicsuffix: 1
- java:
- java.io: 1
- java.lang: 1
- java.math: 1
- java.net: 1
- java.nio.channels: 1
- java.nio.charset: 1
- java.security: 2
- java.security.spec: 1
- java.text: 1
- java.util.concurrent.atomic: 1
- java.util.concurrent.locks: 1
- java.util.jar: 1
- java.util.logging: 1
- java.util.regex: 1
- java.util.zip: 1
- org:
- org.apache.commons.net: 2
- org.apache.http.client.methods: 1
- org.apache.http.entity: 2
- org.apache.http.message: 1
- org.json: 1
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: gimenez
- /CreationDate: D:20060113112209Z
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20060118102421+01'00'
- /Producer: Acrobat Distiller 5.0.5 (Windows)
- /Title: Microsoft Word - PU-2005-RT-624-1.0 jTOP v#8.05 e-Passport Lite Security T.
- pdf_file_size_bytes: 267841
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |