name |
Symfoware Server Enterprise extended Edtion 4.0 |
Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH |
category |
Databases |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
08.10.2021 |
not_valid_before |
26.11.2003 |
03.08.2018 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_32fr.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_32en.pdf |
manufacturer |
Fujitsu Limited |
Gemalto / Samsung |
manufacturer_web |
https://www.fujitsu.com/ |
https://www.gemalto.com/ |
security_level |
EAL4 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
505e2adba5d4a6cf |
2ed49e59b7e90e34 |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
ANSSI-CC-2018/32 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
AGD_PRE.1, ATE_COV.2, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ATE_DPT.3, AVA_VAN.5, ATE_IND.2, ALC_LCD.1, ALC_DVS.2, ADV_TDS.4, ADV_FSP.5, ADV_ARC.1, AGD_OPE.1, ADV_INT.2, ALC_TAT.2, ASE_TSS.2, ADV_IMP.1 |
heuristics/extracted_versions |
4.0 |
4.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2018/58, ANSSI-CC-2018/57, ANSSI-CC-2019/07, ANSSI-CC-2019/31, ANSSI-CC-2018/32v2, ANSSI-CC-2018/53, ANSSI-CC-2018/56 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2017/76, ANSSI-CC-2017/24 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2018/56v2, ANSSI-CC-2018/58, ANSSI-CC-2018/58v2, ANSSI-CC-2018/57, ANSSI-CC-2019/07, ANSSI-CC-2018/57v2, ANSSI-CC-2019/31, ANSSI-CC-2018/32v2, ANSSI-CC-2018/53, ANSSI-CC-2018/56 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2017/07, ANSSI-CC-2017/24, ANSSI-CC-2015/66, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, ANSSI-CC-2017/76, ANSSI-CC-2016/59, ANSSI-CC-2017/54, BSI-DSZ-CC-0891-V2-2016 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
|
heuristics/st_references/directly_referenced_by |
{} |
ANSSI-CC-2019/31 |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2017/24 |
heuristics/st_references/indirectly_referenced_by |
{} |
ANSSI-CC-2019/31 |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2017/24 |
heuristics/protection_profiles |
{} |
70cdc8b0cf910af7 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0067b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0003.pdf |
anssi-cc-2018_32fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2018/32
- cert_item: Plateforme ouverte Java Card MultiApp V4.1 en configuration ouverte masquée sur le composant S3FT9MH
- cert_item_version: Java Card version 3.0.4, GP version 2.3 (avec ID configuration version 1.0 et GP Mapping version 1.0
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France Samsung Electronics Co. 17 Floor, B-Tower, DSR building, Samsungjeonja-ro 1-1, Hwaseong-si, Gyenonggi-do 445-330 South Korea Commanditaire Gemalto 6, rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card System Protection Profile – Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2017/24: 3
- ANSSI-CC-2017/76: 3
- ANSSI-CC-2018/32: 22
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto: 1
- com.gemalto.javacard.eid: 1
- com.gemalto.javacard.esign: 1
- com.gemalto.javacard.iasclassic: 1
- com.gemalto.javacard.mspnp: 1
- com.gemalto.mchipadv: 1
- com.gemalto.moc.server: 1
- com.gemalto.mpcos: 1
- com.gemalto.pure: 1
- com.gemalto.puredi: 1
- com.visa.vsdc: 1
- javacard:
- javacard.eid: 1
- javacard.esign: 1
- javacard.iasclassic: 1
- javacard.mspnp: 1
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20180822151858+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.026
- /ModDate: D:20180823113947+02'00'
- /Producer: Microsoft® Word 2010
- /Subject:
- /Title:
- pdf_file_size_bytes: 845849
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
pdf_data/st_filename |
|
anssi-cible-cc-2018_32en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0068-V2-2011-MA-01: 1
- BSI-CC-PP-0084-: 1
- BSI-PP- 0055-2009: 1
- BSI-PP-0056-V2-MA-2012: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 6+: 1
- EAL5: 7
- EAL5 augmented: 2
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 9
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 4
- ADV_IMP: 1
- ADV_IMP.1: 7
- ADV_INT.2: 1
- ADV_TDS: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 7
- AGD:
- AGD_OPE.1: 7
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 7
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP.1: 14
- FAU_ARP.1.1: 1
- FAU_SAA.1: 2
- FCO:
- FCS:
- FCS_CKM: 48
- FCS_CKM.1: 31
- FCS_CKM.1.1: 3
- FCS_CKM.2: 10
- FCS_CKM.2.1: 1
- FCS_CKM.3: 6
- FCS_CKM.3.1: 1
- FCS_CKM.4: 24
- FCS_CKM.4.1: 2
- FCS_COP: 38
- FCS_COP.1: 30
- FCS_COP.1.1: 5
- FCS_RND: 18
- FCS_RND.1: 8
- FCS_RND.1.1: 3
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 37
- FDP_ACC.1: 14
- FDP_ACC.2: 6
- FDP_ACF: 31
- FDP_ACF.1: 16
- FDP_IFC: 22
- FDP_IFC.1: 13
- FDP_IFC.2: 2
- FDP_IFF: 15
- FDP_IFF.1: 12
- FDP_ITC: 11
- FDP_ITC.1: 12
- FDP_ITC.2: 17
- FDP_ITT.1: 1
- FDP_RIP: 85
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FDP_ROL: 13
- FDP_ROL.1: 2
- FDP_SDI.1: 1
- FDP_SDI.2: 8
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 6
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 21
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 8
- FIA_ATD.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 54
- FIA_UAU.1: 6
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_UID: 35
- FIA_UID.1: 18
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 20
- FMT_LIM.1: 16
- FMT_LIM.1.1: 3
- FMT_LIM.2: 15
- FMT_LIM.2.1: 3
- FMT_MSA: 80
- FMT_MSA.1: 11
- FMT_MSA.2: 1
- FMT_MSA.3: 15
- FMT_MTD: 33
- FMT_MTD.1: 9
- FMT_MTD.3: 1
- FMT_SMF: 53
- FMT_SMF.1: 17
- FMT_SMF.1.1: 2
- FMT_SMR: 67
- FMT_SMR.1: 27
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 9
- FPR_UNO.1.1: 1
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS: 42
- FPT_FLS.1: 14
- FPT_FLS.1.1: 1
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_PHP: 6
- FPT_PHP.3: 15
- FPT_PHP.3.1: 1
- FPT_RCV: 14
- FPT_RCV.3: 4
- FPT_RCV.4: 2
- FPT_TDC.1: 8
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 8
- FPT_TST.1: 13
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.VERIFICATION: 4
- D:
- D.API_DATA: 3
- D.APP_CODE: 6
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.CRYPTO: 5
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.PIN: 4
- D.SEC_DATA: 7
- O:
- O.AES: 1
- O.ALARM: 15
- O.APPLET: 28
- O.CARD-MANAGEMENT: 2
- O.CARD_MANAGEMENT: 17
- O.CIPHER: 10
- O.CODE_PCKG: 16
- O.CODE_PKG: 7
- O.DELETION: 8
- O.FIREWALL: 12
- O.GLOBAL_ARRAYS_CO: 3
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INT: 3
- O.GLOBAL_ARRAYS_INTEG: 5
- O.INSTALL: 11
- O.JAVAOBJECT: 56
- O.KEY-MNGT: 6
- O.KEY_MNGT: 4
- O.LOAD: 6
- O.NATIVE: 11
- O.OBJ-DELETION: 4
- O.OPERATE: 15
- O.PIN-: 1
- O.PIN-MNGT: 5
- O.REALLOCATION: 5
- O.RESOURCES: 9
- O.RND: 13
- O.SCP: 29
- O.SID: 13
- O.TDES: 1
- O.TRANSACTION: 6
- OE:
- OE.APPLET: 4
- OE.CODE-EVIDENCE: 10
- OE.VERIFICATION: 25
- OP:
- OP.ARRAY_ACCESS: 6
- OP.CREATE: 10
- OP.DELETE_APPLET: 6
- OP.DELETE_PCKG: 4
- OP.DELETE_PCKG_APPLET: 4
- OP.INSTANCE_FIELD: 6
- OP.INVK_INTERFACE: 10
- OP.INVK_VIRTUAL: 8
- OP.JAVA: 8
- OP.PUT: 7
- OP.THROW: 7
- OP.TYPE_ACCESS: 7
- OSP:
- OSP: 1
- OSP.RND: 3
- OSP.RNG: 1
- OSP.VERIFICATION: 4
- OT:
- R:
- T:
- T.CONFID-APPLI-DATA: 4
- T.CONFID-JCS-CODE: 4
- T.CONFID-JCS-DATA: 4
- T.DELETION: 3
- T.EXE-CODE: 8
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 7
- T.INTEG-APPLI-DATA: 8
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 4
- T.NATIVE: 4
- T.OBJ-DELETION: 4
- T.PHYSICAL: 4
- T.RESOURCES: 3
- T.SID: 8
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 2
- TDEA: 1
- TDES: 15
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 4
- SHA-256: 4
- SHA-384: 2
- SHA-512: 4
- SHA224: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 2
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- Physical Tampering: 3
- fault induction: 2
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 5
- SPA: 1
- physical probing: 6
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.DG1: 6
- EF.DG16: 6
- EF.DG3: 1
- EF.DG4: 1
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2009-07-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS180-2: 1
- FIPS197: 5
- ICAO:
- NIST:
- PKCS:
- SCP:
- SCP01: 4
- SCP02: 4
- SCP03: 5
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2: 3
- Java Card 3.0.4: 8
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Security Target, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /CreationDate: D:20180328144957+02'00'
- /Creator: Microsoft® Word 2013
- /Keywords: 28-03-2018
- /ModDate: D:20180823114004+02'00'
- /Producer: Microsoft® Word 2013
- /Subject:
- /Title:
- pdf_file_size_bytes: 2571177
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 127
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |