This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0640-2010 |
Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software BSI-DSZ-CC-0827-V4-2016 |
|
---|---|---|
name | Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software | Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 - RSA4096 v1.03.006 / v2.05.005 - EC v1.03.006 / v2.05.005 - Toolbox v1.03.006 / v2.05.005 - Base v1.03.006 / v2.05.005 - FTL v1.01.0008 - SCL v2.01.011 - PSL v4.00.009 and with specific IC dedicated software |
not_valid_before | 2010-07-28 | 2016-11-23 |
not_valid_after | 2019-09-01 | 2021-11-23 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V4b_pdf.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0827V4a_pdf.pdf |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2010, 8, 30), 'maintenance_title': 'Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2v1.1 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640_ma1b_pdf.pdf'}), frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2011, 8, 8), 'maintenance_title': 'Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2v1.1 libraries and with specific IC dedicated software', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640_ma2a_pdf.pdf', 'maintenance_st_link': None}) | |
state/report/pdf_hash | c6990cd24c41f94a466033230cfae435863b12c222404a8fee0edccf8e6b9f63 | 0d97f0b5532f5a687413a7ccae85ca3d278477b5795bd16537ee5722e74a748e |
state/report/txt_hash | 6de1516dd50bb7ce7ffbe25b61b63373d7104793e9e176912a25f0435c1a0a2f | 7155542acac11697fa673dda7044a75258ffe26fcc0dbb83d85fc83aba20a93d |
state/st/pdf_hash | 3f58c3db61acda65df3f96474fbed76a6ccf740f2dd16d8e43ac6c6f3678bca4 | eba39ff320b0452694d746c3fc546a8cae3557c996ca334ef102c350048ac799 |
state/st/txt_hash | 934774f1409d9d748b9d59bb9030954650657149e459fe14ce0dfa110bdd5ac8 | 176a98682e63c6ae49a8f1e0bf180b6fdab47df4bad371d48f92241e508e4318 |
heuristics/cert_id | BSI-DSZ-CC-0640-2010 | BSI-DSZ-CC-0827-V4-2016 |
heuristics/extracted_versions | 1.1, 1.1.18 | 1.01.0008, 4.00.009, 2.01.011, 1.03.006, 2.05.005 |
heuristics/indirect_transitive_cves | CVE-2017-15361 | None |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0732-2011 | CSEC2014007, BSI-DSZ-CC-0827-V5-2017 |
heuristics/report_references/directly_referencing | None | BSI-DSZ-CC-0827-V3-2015 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2015/02, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2013/10, BSI-DSZ-CC-0880-2013, ANSSI-CC-2014/48, ANSSI-CC-2014/09, BSI-DSZ-CC-0729-2011, ANSSI-CC-2016/73, BSI-DSZ-CC-0761-2013, ANSSI-CC-2013/32, ANSSI-CC-2015/37, ANSSI-CC-2013/40, CRP290, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0851-2013, BSI-DSZ-CC-0751-2013, ANSSI-CC-2016/03, ANSSI-CC-2014/06, ANSSI-CC-2014/86, BSI-DSZ-CC-0850-2013, ANSSI-CC-2015/30, ANSSI-CC-2015/04, ANSSI-CC-2015/15, BSI-DSZ-CC-0889-2013, ANSSI-CC-2015/39, ANSSI-CC-2015/03, ANSSI-CC-2014/07, ANSSI-CC-2015/25, BSI-DSZ-CC-0952-V2-2016, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0762-2012, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2012/31, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/04, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2015/38, ANSSI-CC-2013/55, ANSSI-CC-2012/40, ANSSI-CC-2014/62, ANSSI-CC-2012/41, ANSSI-CC-2012/44, BSI-DSZ-CC-0677-2010, ANSSI-CC-2014/14, ANSSI-CC-2013/33, ANSSI-CC-2014/49, ANSSI-CC-2012/38, ANSSI-CC-2013/42, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2015/40, BSI-DSZ-CC-0904-2015, BSI-DSZ-CC-0728-2011, ANSSI-CC-2016/75, BSI-DSZ-CC-0763-2012, ANSSI-CC-2013/64, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, BSI-DSZ-CC-0733-2011, ANSSI-CC-2015/01, ANSSI-CC-2016/74, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0764-2012, ANSSI-CC-2015/09, ANSSI-CC-2014/50, ANSSI-CC-2012/50, ANSSI-CC-2015/41, ANSSI-CC-2015/08, BSI-DSZ-CC-0695-2011, ANSSI-CC-2012/85, ANSSI-CC-2013/11, BSI-DSZ-CC-0732-2011 | CSEC2014007, BSI-DSZ-CC-0827-V6-2017, BSI-DSZ-CC-1158-2020, BSI-DSZ-CC-0827-V8-2020, BSI-DSZ-CC-1158-V2-2023, BSI-DSZ-CC-1069-2018, BSI-DSZ-CC-0827-V7-2018, BSI-DSZ-CC-0827-V5-2017 |
heuristics/report_references/indirectly_referencing | None | BSI-DSZ-CC-0827-V3-2015, BSI-DSZ-CC-0827-2013, BSI-DSZ-CC-0827-V2-2014, BSI-DSZ-CC-0791-2012 |
heuristics/st_references/directly_referenced_by | ANSSI-CC-2012/31, ANSSI-CC-2013/10, ANSSI-CC-2013/11, ANSSI-CC-2012/41, ANSSI-CC-2013/40, ANSSI-CC-2012/50, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0728-2011, ANSSI-CC-2012/40, ANSSI-CC-2012/32, BSI-DSZ-CC-0677-2010, ANSSI-CC-2012/51, BSI-DSZ-CC-0732-2011 | CSEC2014007 |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/39, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/40, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0922-2014, ANSSI-CC-2016/75, ANSSI-CC-2014/12, BSI-DSZ-CC-0952-2014, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/07, ANSSI-CC-2013/10, ANSSI-CC-2012/41, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/35, BSI-DSZ-CC-0819-2012, ANSSI-CC-2014/48, ANSSI-CC-2012/44, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/14, ANSSI-CC-2016/74, BSI-DSZ-CC-0677-2010, ANSSI-CC-2014/09, ANSSI-CC-2014/61, ANSSI-CC-2014/08, BSI-DSZ-CC-0729-2011, ANSSI-CC-2015/09, ANSSI-CC-2016/73, ANSSI-CC-2013/33, ANSSI-CC-2012/50, ANSSI-CC-2012/38, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0760-2013, ANSSI-CC-2013/32, ANSSI-CC-2012/31, ANSSI-CC-2013/11, ANSSI-CC-2013/34, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/40, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0751-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0818-2013, ANSSI-CC-2012/32, BSI-DSZ-CC-0813-2012, ANSSI-CC-2014/13, ANSSI-CC-2012/51, BSI-DSZ-CC-0732-2011 | CSEC2014007 |
pdf_data/report_filename | 0640a_pdf.pdf | 0827V4a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0640-2010 | BSI-DSZ-CC-0827-V4-2016 |
pdf_data/report_frontpage/DE/cert_item | Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software | Infineon smart card IC (Security Controller) M9900 A22 / C22 / D22 / G11, M9905 A11, M9906 A11 with optional Software Libraries RSA2048 v1.03.006 / v2.05.005 – RSA4096 v1.03.006 / v2.05.005 – EC v1.03.006 / v2.05.005 – Toolbox v1.03.006 / v2.05.005 – Base v1.03.006 / v2.05.005 – FTL v1.01.0008 – SCL v2.01.011 – PSL v4.00.009 and with specific IC dedicated software |
pdf_data/report_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA |
|
|
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA2048 | 1 | 9 |
pdf_data/report_keywords/asymmetric_crypto/RSA/RSA4096 | 1 | 9 |
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR | 1 | 3 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 5 | 9 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 4 | 14 |
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/crypto_library | |
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 1 | 2 |
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/side_channel_analysis/FI/DFA | 3 | 4 |
pdf_data/report_keywords/side_channel_analysis/SCA/DPA | 3 | 4 |
pdf_data/report_keywords/side_channel_analysis/other/JIL | 3 | 4 |
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 31 | 2 | 3 |
pdf_data/report_keywords/standard_id/BSI/AIS 34 | 3 | 2 |
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 4 | 9 |
pdf_data/report_keywords/symmetric_crypto/DES/3DES/3DES | 2 | 1 |
pdf_data/report_keywords/symmetric_crypto/DES/DES/DES | 3 | 8 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/tee_name | |
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Infineon/Infineon | 4 | 25 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies | 15 | 8 |
pdf_data/report_keywords/vendor/Infineon/Infineon Technologies AG | 20 | 11 |
pdf_data/report_metadata//CreationDate | D:20100806130533+02'00' | D:20161129141134+01'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software, Infineon Technologies AG" | "Common Criteria, Certification, Zertifizierung, SmartCard, Pepe, PP-0084, Infineon BSI-DSZ-CC-0827-V4" |
pdf_data/report_metadata//ModDate | D:20100809170019+02'00' | D:20161130144903+01'00' |
pdf_data/report_metadata//Producer | OpenOffice.org 3.1 | LibreOffice 4.2 |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0640-2010 | Certification Report BSI-DSZ-CC-0827-V4-2016 |
pdf_data/report_metadata/pdf_file_size_bytes | 996847 | 1233762 |
pdf_data/report_metadata/pdf_hyperlinks | http://www.bsi.bund.de/ | https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/, http://www.sogisportal.eu/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte |
pdf_data/report_metadata/pdf_number_of_pages | 42 | 44 |
pdf_data/st_filename | 0640b_pdf.pdf | 0827V4b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC | 8 | 84 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH | 4 | 8 |
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA | 12 | 17 |
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman | 5 | 7 |
pdf_data/st_keywords/asymmetric_crypto/FF/DSA/DSA | 1 | 2 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA2048 | 2 | 3 |
pdf_data/st_keywords/asymmetric_crypto/RSA/RSA4096 | 1 | 3 |
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_protection_profile_id/BSI/BSI-PP-0035 | 2 | 3 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 3 |
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 4 |
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_security_level/EAL/EAL 5 | 3 | 4 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 | 5 | 7 |
pdf_data/st_keywords/cc_security_level/EAL/EAL5 augmented | 1 | 3 |
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU/FAU_SAS | 4 | 5 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM | 24 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 33 | 42 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 5 | 6 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 24 | 33 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP | 56 | 126 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 28 | 37 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 4 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 11 | 25 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 | 1 | 2 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 25 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 22 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 18 | 26 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 18 | 26 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITT.1 | 18 | 11 |
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_LIM.2 | 7 | 8 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 20 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 21 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 16 | 15 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 19 | 18 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_ITT.1 | 16 | 13 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 | 25 | 14 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST | 7 | 5 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2 | 37 | 34 |
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.2.1 | 1 | 2 |
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 2 | 18 |
pdf_data/st_keywords/cipher_mode/ECB/ECB | 2 | 11 |
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/KA/Key Agreement | 1 | 4 |
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/hash_function/MD/MD5/MD5 | 6 | 56 |
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA1 | 6 | 56 |
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA256 | 5 | 56 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG/RNG | 3 | 17 |
pdf_data/st_keywords/randomness/TRNG/TRNG | 13 | 14 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA |
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/DPA | 10 | 7 |
pdf_data/st_keywords/side_channel_analysis/SCA/SPA | 5 | 6 |
pdf_data/st_keywords/side_channel_analysis/SCA/side channel | 2 | 7 |
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/standard_id/CC |
|
|
pdf_data/st_keywords/standard_id/FIPS |
|
|
pdf_data/st_keywords/standard_id/FIPS/FIPS PUB 197 | 2 | 6 |
pdf_data/st_keywords/standard_id/ISO |
|
|
pdf_data/st_keywords/standard_id/RFC |
|
|
pdf_data/st_keywords/standard_id/RFC/RFC3447 | 11 | 17 |
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 24 | 56 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/3DES | 17 | 28 |
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES | 2 | 3 |
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES | 6 | 16 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/tee_name | |
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vendor/Infineon/Infineon | 5 | 7 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies | 5 | 7 |
pdf_data/st_keywords/vendor/Infineon/Infineon Technologies AG | 12 | 19 |
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Hans-Ulrich Buchmüller, Jürgen Noller | Jürgen Noller, Rainer Urian (IFAG CCS SQM PS) |
pdf_data/st_metadata//CreationDate | D:20100623103859 | D:20161129124810+01'00' |
pdf_data/st_metadata//Creator | SecurityTarget_SLE78_M7820.doc - Microsoft Word | Microsoft® Word 2010 |
pdf_data/st_metadata//Keywords | Security Target, contactless, dual interface, DCLB, CL, bridge, high end Security Controller, integrity guard, robust, dual core, high attack potential, EAL5+, EAL5 high, not practical, Infineon, RSA, Elliptic Curve, SHA-2, cryptographic, libraries | Infineon, Security Target Lite, PP0084, BSI-CC-PP-0035-2007, BSI-DSZ-CC-0827-V4-2016 |
pdf_data/st_metadata//Producer | Acrobat PDFWriter 5.0 for Windows NT | Microsoft® Word 2010 |
pdf_data/st_metadata//Subject | Security Target M7820 Integrity Guard | Security Target Lite |
pdf_data/st_metadata//Title | CC EAL5+ Certification Security Target | Security Target Lite, BSI-DSZ-CC-0827-V4-2016 |
pdf_data/st_metadata/pdf_file_size_bytes | 520296 | 1339240 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.ietf.org/rfc/rfc5639.txt, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.bsi.bund.de/, http://www.infineon.com/ | |
pdf_data/st_metadata/pdf_number_of_pages | 73 | 95 |
dgst | 454b704420e1b9ab | 37a743f92a3da4a3 |