Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Software "Backoffice v. 2.0" incluso nella scheda di gioco ELSY J0P001 MAYAN TEMPLE
OCSI/CERT/TEC/02/2009/RC
Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
CCEVS-VR-10452-2012
name Software "Backoffice v. 2.0" incluso nella scheda di gioco ELSY J0P001 MAYAN TEMPLE Networks Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
category Other Devices and Systems Boundary Protection Devices and Systems
scheme IT US
not_valid_after 01.09.2019 01.11.2014
not_valid_before 25.06.2010 28.06.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_elsy_j0p001_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/tds_elsy_j0p001_v1.0_rev2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10452-st.pdf
manufacturer Electro System S.p.A. Juniper Networks, Inc.
manufacturer_web https://www.electrosystem.com/ https://www.juniper.net/
security_level ALC_DEL.1, EAL1+ EAL2+, ALC_FLR.2
dgst 4323b540bc54d138 2874fcfdedc57721
heuristics/cert_id OCSI/CERT/TEC/02/2009/RC CCEVS-VR-10452-2012
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:juniper:netscreen_screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r22:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:b:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23b:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r17:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r7:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r13:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r19:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r7:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r18:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r4:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r2:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r14:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r11:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r13:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r1:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r3:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r12:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r23:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r25:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r19:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r2:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r9:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:b:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r16:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r15:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r23:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r15:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r26:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r10:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r18:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r8:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r11:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r12:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r4:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r23:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r6:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r16:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r21:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r27:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r21:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r5:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r9:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r22:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r6:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r1:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r17:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r24:-:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r8:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r5:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0:r20:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r10:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r3:*:*:*:*:*:*:*, cpe:2.3:o:juniper:netscreen_screenos:6.3.0r14:*:*:*:*:*:*:*, cpe:2.3:o:juniper:screenos:6.3.0r24b:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2017-2337, CVE-2017-2335, CVE-2015-7750, CVE-2018-0059, CVE-2015-7756, CVE-2015-7755, CVE-2013-7313, CVE-2017-2338, CVE-2016-1268, CVE-2017-2339, CVE-2018-0014, CVE-2017-2336, CVE-2014-2842, CVE-2015-7754
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ALC_DEL.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ADV_TDS.1, ALC_CMS.4, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1
heuristics/extracted_versions 2.0 6.3
heuristics/scheme_data
  • category: Firewall
  • certification_date: 28.06.2012
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10452
  • product: Juniper Networks Security Appliances: ISG 1000, ISG2000, NetScreen 5200, NetScreen 5400, SSG5, SSG20, SSG140, SSG320M, SSG350M, SSG520M and SSG550M with ScreenOS Version 6.3
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10452
  • vendor: Juniper Networks, Inc.
pdf_data/report_filename rc_elsy_j0p001_v1.0.pdf st_vid10452-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-10452-2012
    • cert_item: Juniper Networks Security Appliances
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/TEC/02/2009/RC: 20
  • US:
    • CCEVS-VR-10452-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 6
  • EAL:
    • EAL 2: 2
    • EAL 2 augmented: 2
    • EAL4: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_DEL.1: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.DIRECT: 1
    • A.GENPUR: 1
    • A.LOWEXP: 1
    • A.NOEVIL: 1
    • A.NOREMO: 1
    • A.PHYSEC: 1
    • A.PUBLIC: 1
    • A.REMACC: 1
    • A.SINGEN: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
pdf_data/report_keywords/eval_facility
  • LVSTechnisBlu:
    • LVS Technis Blu: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 8
  • VPN:
    • VPN: 8
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 1
    • CCMB-2007-09-002: 1
    • CCMB-2007-09-003: 1
    • CCMB-2007-09-004: 1
  • FIPS:
    • FIPS 140: 1
    • FIPS 140-2: 3
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20100622130751+02'00'
  • /Creator: Writer
  • /ModDate: D:20100720095247+02'00'
  • /Producer: OpenOffice.org 3.2
  • /Title: Rapporto di Certificazione del prodotto Software “Backoffice v. 2.0” incluso nella scheda di gioco ELSY J0P001 MAYAN TEMPLE
  • pdf_file_size_bytes: 370925
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: Mallett, Patrick W.
  • /CreationDate: D:20121005092651
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092651
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 329777
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
pdf_data/st_filename tds_elsy_j0p001_v1.0_rev2.pdf st_vid10452-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 8
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 6
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
    • ALC_DEL.1: 3
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.1: 4
    • ASE_REQ.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 10
    • ADV_FSP: 1
    • ADV_FSP.2: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 11
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 8
    • ALC_CMS: 1
    • ALC_CMS.2: 5
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 5
    • ALC_FLR: 1
    • ALC_FLR.2: 15
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 8
    • ATE_IND: 1
    • ATE_IND.2: 7
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 7
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1.1: 8
    • FDP_ACF.1: 1
    • FDP_ACF.1.1: 8
    • FDP_ACF.1.2: 8
    • FDP_ACF.1.3: 8
    • FDP_ACF.1.4: 8
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS: 1
    • FIA_SOS.1: 1
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 1
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 2
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MSA.1.1: 7
    • FMT_MSA.3: 2
    • FMT_SMF.1: 2
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FTA:
    • FTA_MCS: 1
    • FTA_MCS.2: 1
    • FTA_MCS.2.1: 1
    • FTA_MCS.2.2: 1
    • FTA_SSL: 1
    • FTA_SSL.4: 1
    • FTA_SSL.4.1: 1
    • FTA_TSE: 2
    • FTA_TSE.1: 1
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 8
    • FAU_SAR.1: 1
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 1
    • FAU_SAR.3.1: 1
    • FAU_STG: 8
    • FAU_STG.1: 1
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.4: 1
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 18
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 3
    • FDP_IFC.1: 15
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
    • FDP_RIP: 3
    • FDP_RIP.1: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL: 4
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 1
    • FIA_ATD: 4
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 2
    • FIA_UAU: 8
    • FIA_UAU.1: 2
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 3
    • FIA_UAU.4.1: 1
    • FIA_UID: 4
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 4
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 1
    • FMT_MSA: 4
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 4
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
    • FMT_SMR: 4
    • FMT_SMR.1: 2
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM.1: 1
    • FPT_STM: 4
    • FPT_STM.1: 2
    • FPT_STM.1.1: 1
pdf_data/st_keywords/cc_claims
  • R:
    • R.D: 1
  • T:
    • T.U: 5
  • A:
    • A.DIRECT: 2
    • A.GENPUR: 2
    • A.LOWEXP: 2
    • A.NOEVIL: 2
    • A.NOREMO: 2
    • A.PHYSEC: 2
    • A.PUBLIC: 2
    • A.REMACC: 2
    • A.SINGEN: 2
  • O:
    • O.ACCOUN: 1
    • O.ADMTRA: 1
    • O.AUDREC: 1
    • O.ENCRYP: 1
    • O.GUIDAN: 1
    • O.IDAUTH: 1
    • O.INTEGRITY: 4
    • O.LIMEXT: 1
    • O.MEDIAT: 1
    • O.SECFUN: 1
    • O.SECSTA: 1
    • O.SELPRO: 1
    • O.SINUSE: 1
  • T:
    • T.ASPOOF: 1
    • T.AUDACC: 1
    • T.AUDFUL: 1
    • T.MEDIAT: 1
    • T.NOAUTH: 1
    • T.OLDINF: 1
    • T.PROCOM: 1
    • T.REPEAT: 1
    • T.REPLAY: 1
    • T.SELPRO: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • DES:
    • DES:
      • DES: 1
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 3
      • SHA256: 1
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 3
  • SSH:
    • SSH: 25
  • VPN:
    • VPN: 76
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 4
    • secp256r1: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-2: 1
    • FIPS 186-3: 1
    • FIPS 197: 2
    • FIPS PUB 140-2: 6
  • NIST:
    • SP 800-67: 2
  • RFC:
    • RFC 2404: 1
    • RFC 2406: 2
pdf_data/st_metadata
  • /Author: Electro System S.p.A.
  • /CreationDate: D:20100123112105
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20100720095816+02'00'
  • /Producer: GPL Ghostscript 8.15
  • /Title: Traguardo di Sicurezza del prodotto Software “Backoffice v.2.0” incluso nella scheda di gioco ELSY J0P001 MAYAN TEMPLE
  • pdf_file_size_bytes: 651680
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 49
  • /Author: Neal
  • /CreationDate: D:20121005092759
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20121005092759
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Security Appliances Security Target
  • pdf_file_size_bytes: 867098
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 57
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different