Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Adapter Compatible High-Speed Juki Card Software
JISEC-CC-CRP-C0191
STARCOS 3.3 Passport Edition Version 2.0a
BSI-DSZ-CC-0521-2008
name Adapter Compatible High-Speed Juki Card Software STARCOS 3.3 Passport Edition Version 2.0a
scheme JP DE
not_valid_after 09.12.2013 01.09.2019
not_valid_before 30.10.2008 18.09.2008
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0191_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0521a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0191_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0521b.pdf
manufacturer NTT Communications Corporation G+D Mobile Security GmbH
manufacturer_web https://www.ntt.com/ https://www.gi-de.com/de/de/mobile-security/
security_level AVA_MSU.3, EAL4+ ADV_IMP.2, AVA_VLA.4, AVA_MSU.3, EAL4+, ALC_DVS.2
dgst 406f134e8e3881ce a87e4a8f39591366
heuristics/cert_id JISEC-CC-CRP-C0191 BSI-DSZ-CC-0521-2008
heuristics/cert_lab [] BSI
heuristics/extracted_sars ADV_IMP.1, ADV_FSP.2, AGD_ADM.1, ATE_COV.2, AVA_VLA.2, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, AGD_USR.1, ATE_IND.2, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3, ADV_RCR.1, ALC_LCD.1, ATE_FUN.1, ADV_LLD.1, ADV_HLD.2 ALC_DVS.2, ADV_FSP.2, AGD_ADM.1, ATE_COV.2, AVA_VLA.4, AGD_USR.1, ALC_TAT.1, ADV_IMP.2, AVA_MSU.3, ADV_SPM.1, ADV_RCR.1, ALC_LCD.1, ATE_FUN.1, ADV_LLD.1, ADV_HLD.2
heuristics/extracted_versions - 2.0, 3.3
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0522-2008
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0463-2008
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0635-2010, BSI-DSZ-CC-0642-2011, BSI-DSZ-CC-0522-2008
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0404-2007, BSI-DSZ-CC-0410-2007, BSI-DSZ-CC-0463-2008
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0191
  • certification_date: 01.10.2008
  • claim: EAL4+ AVA_MSU.3
  • enhanced:
    • assurance_level: EAL4 Augmented with AVA_MSU.3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0191_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The target TOE of this ST is software built into Juki cards used in Juki Net, which is used to control data recorded and applications (hereafter referred to as APs) installed on Juki cards. This TOE is installed on Juki cards, and intended to realize the secure issuance of Juki cards from the card issuer to cardholders, verification of cardholders, and protect cardholder information stored on Juki cards. Juki Net is implemented to connect Japan痴 city, town and village systems via electric communication lines, based on the resident ledgers managed by each city, town and village, and increase efficiency of data processing of the resident ledgers. Juki cards are used to issue copies of resident certificates in wide areas, take exceptional measures of move-in and move-out, and check identification of residents. Juki cards are inserted into the Juki card readers/writers being connected to the operating terminals of Juki Net installed at the counters of cities, towns and villages in Japan. Through Juki card readers/writers, Juki cards are used to communicate the operating terminals of cities, towns and villages and realize various operations. This TOE is intended to provide security functions, when realizing requirements as stated above, such as authentication of users, access control, cryptographic communication, and securing of application independency. TOE security functions This TOE has the following security function. 1. Identification and authentication functions - Identification function - PIN verification function - External authentication function 2. Access control functions - File management function - SD management function - AP management function - Key management function 3. Cryptographic communication function - Secure messaging function 4. Execution management function - Authentication status management function - State transition management function - Command execution control function 5. Domain separation function - Domain separation function 6. Data recovery function - Power-off abnormality detection function - Fault recovery function
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
    • product: Adapter Compatible High-Speed Juki Card Software
    • product_type: IT Product (IC chip firmware)
    • report_link: https://www.ipa.go.jp/en/security/c0191_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0191_est.pdf
    • toe_version: 2.00
    • vendor: NTT Communications Corporation
  • expiration_date: 01.12.2013
  • supplier: NTT Communica tions Corporation
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0191_it7162.html
  • toe_japan_name: Adapter Compatible High-Speed Juki Card Software 2.00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0410-2007
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0410-2007
pdf_data/report_filename c0191_erpt.pdf 0521a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0521-2008
    • cert_item: STARCOS 3.3 Passport Edition Version 2.0a
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0191-01: 1
    • Certification No. C0191: 1
  • DE:
    • BSI-DSZ-CC-0410: 1
    • BSI-DSZ-CC-0410-2007: 2
    • BSI-DSZ-CC-0463-2008: 3
    • BSI-DSZ-CC-0521-2008: 19
  • NL:
    • CC-0521-2008: 3
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0026: 3
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 1
    • EAL5+: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 8
    • EAL 4 augmented: 2
    • EAL 5+: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • AVA:
    • AVA_MSU.3: 3
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 4
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 5
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 4
    • ATE_IND: 4
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 4
    • AVA_SOF: 3
    • AVA_VLA: 5
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 5
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 1
    • Giesecke & Devrient: 16
  • Infineon:
    • Infineon Technologies AG: 1
  • NXP:
    • NXP: 8
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • SRC:
    • SRC Security Research & Consulting: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
  • DES:
    • 3DES:
      • Triple-DES: 1
    • DES:
      • DES: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • SPA: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 24
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 2
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 2
    • ISO/IEC 7816: 2
  • BSI:
    • AIS 25: 1
    • AIS 26: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 1
    • AIS 38: 1
  • ICAO:
    • ICAO: 10
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Edition Version 2.0a, BSI-DSZ- CC-0521-2008, Version 0.6, 23 June 2008, Giesecke & Devrient GmbH (confidential document) [7] Security Target Lite STARCOS 3.3 Passport Edition Version 2.0a, BSI-DSZ- CC-0521-2008, Version: 1
    • September 2008, STARCOS 3.3 Passport Edition Version 2.0a, SRC Security Research & Consulting GmbH (confidential document) [9] Common Criteria Protection Profile Machine Readable Travel Document with „ICAO Application: 1
pdf_data/report_metadata
  • /CreationDate: D:20090414171426+09'00'
  • /ModDate: D:20090414171426+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 180185
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
  • /Author: Federal Office for Information Security
  • /CreationDate: D:20080930091938+02'00'
  • /Creator: Writer
  • /Keywords: "STARCOS 3.3 Passport EditionVersion 2.0a, Giesecke & Devrient GmbH, Common Criteria, Certification"
  • /ModDate: D:20080930100635+02'00'
  • /Producer: StarOffice 8
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0521-2008
  • pdf_file_size_bytes: 502730
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 36
pdf_data/st_filename c0191_est.pdf 0521b.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • CC-1: 1
    • CC-2: 2
    • CC-3: 1
  • DE:
    • BSI-DSZ-CC-0410-2007: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0026: 1
    • BSI-PP-0002-2001: 1
    • BSI-PP-0017: 1
    • BSI-PP-0026: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 5
    • EAL4 augmented: 1
  • EAL:
    • EAL 4: 2
    • EAL 4 augmented: 1
    • EAL 5: 3
    • EAL 5 augmented: 1
    • EAL 5+: 1
    • EAL4: 11
    • EAL4 augmented: 1
    • EAL4+: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 4
    • ACM_CAP.4: 4
    • ACM_SCP.2: 4
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 1
    • ADV_FSP.2: 4
    • ADV_HLD.2: 4
    • ADV_IMP.1: 4
    • ADV_LLD.1: 4
    • ADV_RCR.1: 4
    • ADV_SPM.1: 10
  • AGD:
    • AGD_ADM.1: 11
    • AGD_USR.1: 5
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 4
    • ALC_TAT.1: 4
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 4
    • ATE_FUN.1: 4
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.3: 10
    • AVA_SOF.1: 4
    • AVA_VLA.2: 4
  • ACM:
    • ACM_AUT.1: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 2
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 8
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 5
  • AGD:
    • AGD_ADM.1: 3
    • AGD_USR.1: 2
  • ALC:
    • ALC_DVS.2: 7
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_FUN.1: 1
  • AVA:
    • AVA_MSU.3: 7
    • AVA_VLA.4: 8
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.2: 14
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP: 27
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC.1: 31
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 24
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 3
    • FDP_ITC.1: 27
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 6
    • FDP_SMF.1: 1
  • FIA:
    • FIA_AFL: 24
    • FIA_AFL.1: 5
    • FIA_ATD.1: 26
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 21
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 13
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 15
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 13
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 22
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 15
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 13
    • FMT_MSA.1: 3
    • FMT_MSA.2: 10
    • FMT_MSA.3: 9
    • FMT_MTD: 39
    • FMT_MTD.1: 3
    • FMT_SMF: 3
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RCV.1: 1
    • FPT_RCV.2: 18
    • FPT_RCV.2.2: 1
    • FPT_RVM.1: 36
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 29
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 7
    • FAU_SAS.1: 10
    • FAU_SAS.1.1: 5
  • FCS:
    • FCS_CKM: 51
    • FCS_CKM.1: 51
    • FCS_CKM.2: 12
    • FCS_CKM.4: 59
    • FCS_COP: 112
    • FCS_COP.1: 43
    • FCS_RND: 27
    • FCS_RND.1: 16
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 20
    • FDP_ACC.1.1: 3
    • FDP_ACF: 2
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 4
    • FDP_DAU: 8
    • FDP_DAU.1: 4
    • FDP_IFC.1: 8
    • FDP_ITC.1: 29
    • FDP_ITC.2: 30
    • FDP_ITT.1: 3
    • FDP_UCT: 14
    • FDP_UCT.1: 7
    • FDP_UIT: 14
    • FDP_UIT.1: 9
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_API: 33
    • FIA_API.1: 13
    • FIA_API.1.1: 1
    • FIA_SOS.2: 1
    • FIA_UAU: 66
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 3
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 9
    • FIA_UAU.5: 10
    • FIA_UAU.6: 8
    • FIA_UID: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_INI_DIS: 1
    • FMT_LIM: 9
    • FMT_LIM.1: 24
    • FMT_LIM.1.1: 4
    • FMT_LIM.2: 20
    • FMT_LIM.2.1: 4
    • FMT_MDT.3: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 41
    • FMT_MSA.3: 2
    • FMT_MTD: 61
    • FMT_MTD.1: 31
    • FMT_MTD.3: 4
    • FMT_MTD.3.1: 3
    • FMT_SMF: 1
    • FMT_SMF.1: 24
    • FMT_SMF.1.1: 3
    • FMT_SMR: 1
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS: 1
    • FPT_FLS.1: 14
    • FPT_FLS.1.1: 3
    • FPT_ITT.1: 3
    • FPT_PHP: 1
    • FPT_PHP.3: 14
    • FPT_PHP.3.1: 3
    • FPT_RVM: 1
    • FPT_RVM.1: 6
    • FPT_RVM.1.1: 3
    • FPT_SEP: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 3
    • FPT_SEP.1.2: 3
    • FPT_TST: 2
    • FPT_TST.1: 11
    • FPT_TST.1.1: 3
    • FPT_TST.1.2: 3
    • FPT_TST.1.3: 3
  • FRU:
    • FRU_FLT.2: 5
  • FTP:
    • FTP_ITC.1: 9
    • FTP_TRP.1: 5
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • NXP:
    • NXP: 6
    • NXP Semiconductors: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • T-DES: 1
      • Triple-DES: 8
    • DES:
      • DES: 5
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • TDES: 1
      • Triple-DES: 18
    • DES:
      • DES: 15
  • constructions:
    • MAC:
      • KMAC: 1
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 1024: 11
  • ECC:
    • ECDH:
      • ECDH: 7
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 9
    • SHA2:
      • SHA-224: 4
      • SHA-256: 5
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 11
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/side_channel_analysis
  • other:
    • JIL: 2
  • FI:
    • Malfunction: 11
    • Physical Tampering: 6
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 6
    • physical tampering: 8
  • SCA:
    • DPA: 2
    • Leak-Inherent: 6
    • SPA: 1
    • physical probing: 3
    • timing attacks: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 2006: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 8
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 135
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 16
    • EF.DG1: 32
    • EF.DG13: 3
    • EF.DG14: 8
    • EF.DG15: 4
    • EF.DG16: 35
    • EF.DG2: 10
    • EF.DG3: 16
    • EF.DG4: 15
    • EF.DG5: 10
    • EF.SOD: 17
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 2
    • CCMB-2005-08-002: 2
    • CCMB-2005-08-003: 2
    • CCMB-2005-08-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
  • PKCS:
    • PKCS#1: 3
  • BSI:
    • AIS 20: 4
    • AIS20: 3
    • AIS31: 1
  • CC:
    • CCMB-2005-09-00: 1
    • CCMB-2005-09-001: 1
    • CCMB-2005-09-002: 1
    • CCMB-2005-09-004: 1
  • FIPS:
    • FIPS 180-2: 5
    • FIPS 180-213: 1
    • FIPS 46-3: 5
    • FIPS PUB 180-2: 3
    • FIPS PUB 46-3: 1
  • ICAO:
    • ICAO: 18
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 7816-4: 1
    • ISO/IEC 9796-2: 1
  • RFC:
    • RFC 2631: 1
    • RFC3369: 1
pdf_data/st_metadata
  • /CreationDate: D:20090414171602+09'00'
  • /ModDate: D:20090414171602+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 693319
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 118
  • /Author: CSOP43
  • /Company: G&D
  • /CreationDate: D:20080924130900+02'00'
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 1.0 / Status 19.08.2008
  • /ModDate: D:20080930102804+02'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /STARCOS Version: STARCOS 3.3 Passport Edition Version 2.0a
  • /SourceModified: D:20080924110642
  • /Subject: Security Target Lite STARCOS 3.3 Passport Edition Version 2.0a
  • /Title: Security Target Lite STARCOS 3.3 Passport Edition Version 2.0a
  • pdf_file_size_bytes: 957299
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 124
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different