name |
Symfoware Server Enterprise extended Edtion 4.0 |
eTugra SAM v1.4 |
category |
Databases |
Products for Digital Signatures |
scheme |
JP |
IT |
status |
archived |
active |
not_valid_after |
10.12.2010 |
16.04.2029 |
not_valid_before |
26.11.2003 |
16.04.2024 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_FP_etugra_sam_14_v1.0_en.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0003.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cr_etugra_sam_14_v1.0_en.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_etugra_sam_14_v10.pdf |
manufacturer |
Fujitsu Limited |
E-Tugra EBG Information Technologies and Services Joint Stock Company |
manufacturer_web |
https://www.fujitsu.com/ |
https://e-tugra.com.tr/ |
security_level |
EAL4 |
EAL4+, AVA_VAN.5 |
dgst |
505e2adba5d4a6cf |
f4885e7bbdd8eb7d |
heuristics/cert_id |
JISEC-CC-CRP-C0003 |
OCSI/CERT/CCL/01/2023/RC |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759 |
heuristics/indirect_transitive_cves |
{} |
CVE-2022-36986, CVE-2022-36997, CVE-2022-42301, CVE-2022-36984, CVE-2022-42299, CVE-2022-42304, CVE-2022-36999, CVE-2022-42307, CVE-2022-36992, CVE-2022-42305, CVE-2022-36988, CVE-2022-37000, CVE-2022-36995, CVE-2022-36996, CVE-2022-36991, CVE-2022-36990, CVE-2022-36985, CVE-2022-36987, CVE-2021-41570, CVE-2022-42300, CVE-2022-42302, CVE-2022-36998, CVE-2022-36989, CVE-2022-42303, CVE-2022-36993, CVE-2022-36994, CVE-2023-28759 |
heuristics/extracted_sars |
{} |
ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
4.0 |
1.4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
OCSI/CERT/CCL/01/2022/RC |
heuristics/report_references/directly_referencing |
{} |
OCSI/CERT/CCL/13/2021/RC |
heuristics/report_references/indirectly_referenced_by |
{} |
OCSI/CERT/CCL/01/2022/RC |
heuristics/report_references/indirectly_referencing |
{} |
OCSI/CERT/CCL/13/2021/RC |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0133
- certification_date: 01.11.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION The TOE enables users to manage operations to execute jobs based on predefined daily schedule on distributed servers on enterprise internal networks. The TOE also enables users to manage those operations in a secure manner although systems are becoming diverse and getting complex. The TOE defines “Job execution based on predefined daily schedule” process and its related resources as protected resources. The TOE provides following security functions to prohibit unauthorized access to the protected resources. - "Extended user authentication function" to identify and authenticate users. - "Access control function" to restrict user operations to authorized users - "Audit log output function" to verify user operations - "Password protection function" to protect passwords from being sniffed sent over enterprise internal networks
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSC)
- product: Systemwalker Operation Manager Enterprise Edition
- product_type: IT Product (Operation and maintenance supporting software)
- toe_version: V13.2.0 (Linux for Itanium)
- vendor: Fujitsu Limited
- expiration_date: 01.10.2013
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0133_it7150.html
- toe_japan_name: Systemwalker Operation Manager Enterprise Edition V13.2.0 (Linux for Itanium)
- toe_overseas_link: None
- toe_overseas_name: -----
|
- certification_date: 16.04.2024
- level: EAL4+
- report_link_en: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/cr_etugra_sam_14_v1.0_en.pdf
- report_link_it: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/rc_etugra_sam_14_v.1.0_it.pdf
- supplier: E-Tugra EBG Information Technologies and Services Joint Stock Company
- target_link: https://www.ocsi.gov.it/documenti/certificazioni/eTugra/st_etugra_sam_14_v10.pdf
- title: eTugra SAM v1.4
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
eabbd431e1f174cd |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/anssi-cc-pp-2018_02fr_pp.pdf |
pdf_data/cert_filename |
|
cr_FP_etugra_sam_14_v1.0_en.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- IT:
- OCSI/CERT/CCL/01/2023/RC: 1
- OCSI/CERT/CCL/13/2021/RC: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Tiziano Inzerilli
- /CreationDate: D:20240419162007+02'00'
- /ModDate: D:20240419162007+02'00'
- /Producer: Microsoft: Print To PDF
- /Title: Certification Report "eTugra SAM v1.4".pdf
- pdf_file_size_bytes: 373181
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0003.pdf |
cr_etugra_sam_14_v1.0_en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- IT:
- OCSI/CERT/CCL/01/2023/RC: 25
- OCSI/CERT/CCL/13/2021/RC: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4+: 4
- EAL2: 4
- EAL4: 10
- EAL4 augmented: 3
- EAL4+: 1
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR: 4
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 5
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154221+09'00'
- /ModDate: D:20040526154221+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12495
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: OCSI
- /CreationDate: D:20240416084741+02'00'
- /Creator: Microsoft® Word per Microsoft 365
- /ModDate: D:20240416084741+02'00'
- /Producer: Microsoft® Word per Microsoft 365
- /Title: Certification Report "eTugra SAM v1.4"
- pdf_file_size_bytes: 656782
- pdf_hyperlinks: https://www.sogis.eu/, https://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
|
st_etugra_sam_14_v10.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 4: 9
- EAL 4 augmented: 5
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 1
- AGD_PRE: 2
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ALC_TAT.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FCS:
- FCS_CKM: 25
- FCS_CKM.1: 17
- FCS_CKM.2: 6
- FCS_CKM.4: 29
- FCS_CKM.4.1: 1
- FCS_COP: 26
- FCS_COP.1: 14
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 91
- FDP_ACC.1: 43
- FDP_ACF: 60
- FDP_ACF.1: 49
- FDP_ETC: 15
- FDP_ETC.2: 8
- FDP_IFC: 29
- FDP_IFC.1: 24
- FDP_IFF: 15
- FDP_IFF.1: 14
- FDP_ITC: 15
- FDP_ITC.1: 12
- FDP_ITC.2: 22
- FDP_UCT.1: 7
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL: 11
- FIA_AFL.1: 1
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 12
- FIA_ATD.1.1: 1
- FIA_UAU: 15
- FIA_UAU.1: 5
- FIA_UAU.2: 8
- FIA_UAU.2.1: 1
- FIA_UAU.5: 4
- FIA_UID.1: 5
- FIA_UID.2: 11
- FIA_UID.2.1: 1
- FIA_USB.1: 18
- FIA_USB.1.1: 1
- FIA_USB.1.2: 2
- FIA_USB.1.3: 1
- FIA_UTD.1: 1
- FMT:
- FMT_MSA: 38
- FMT_MSA.1: 10
- FMT_MSA.2: 9
- FMT_MSA.2.1: 1
- FMT_MSA.3: 26
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 10
- FMT_SMF.1.1: 1
- FMT_SMR.1: 10
- FMT_SMR.2: 13
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_PHP.1: 11
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_RPL.1: 7
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 14
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TRP: 2
- FTP:
- FTP_ITC: 8
- FTP_ITC.1: 11
- FTP_TDC.1: 2
- FTP_TRP: 24
- FTP_TRP.1: 15
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ACCESS_PROTECTED: 4
- A.AUTH_DATA: 4
- A.CA: 4
- A.PRIVILEGED_USER: 4
- A.SEC_REQ: 4
- A.SIGNER_AUTHENTICATION_DATA_PROTECTION: 4
- A.SIGNER_DEVICE: 4
- A.SIGNER_ENROLMENT: 4
- A.TSP_AUDITED: 4
- OE:
- OE.CA_REQUEST_CERTIFICATE: 4
- OE.CERTIFICATE_VERFICATION: 2
- OE.CERTIFICATE_VERIFICATION: 1
- OE.CRYPTOMODULE_CERTIFIED: 5
- OE.DELEGATED_AUTHENTICATION: 3
- OE.DEVICE: 10
- OE.ENV: 9
- OE.SIGNER_AUTHENTICATION_DATA: 6
- OE.SVD_AUTHENTICITY: 5
- OSP:
- OSP.CRYPTO: 4
- OSP.RANDOM: 5
- OT:
- OT.AUDIT_PROTECTION: 5
- OT.CRYPTO: 6
- OT.DTBSR_INTEGRITY: 4
- OT.PRIVILEGED_USER_AUTHENTICATION: 6
- OT.PRIVILEGED_USER_MANAGEMENT: 19
- OT.PRIVILEGED_USER_PROTECTION: 18
- OT.RANDOM: 20
- OT.REFERENCE_SIGNER_AUTHENTICATION_DATA: 7
- OT.SAD_VERIFICATION: 18
- OT.SAP: 8
- OT.SIGNATURE_AUTHENTICATION_DATA_PROTECTION: 19
- OT.SIGNATURE_INTEGRITY: 18
- OT.SIGNER_KEY_PAIR_GENERATION: 19
- OT.SIGNER_MANAGEMENT: 5
- OT.SIGNER_PROTECTION: 20
- OT.SVD: 4
- OT.SYSTEM_PROTECTION: 19
- R:
- R.AUDIT: 2
- R.RANDOM: 2
- R.SAD: 27
- R.SVD: 42
- R.TSF_DATA: 11
- T:
- T.ADMIN_IMPERSONATION: 8
- T.AUDIT_ALTERATION: 7
- T.AUTHENTICATION_SIGNER_IMPERSONATION: 10
- T.AUTHORISATION_DATA_DISCLOSE: 3
- T.AUTHORISATION_DATA_UPDATE: 10
- T.CONTEXT_ALTERATION: 11
- T.DTBSR_FORGERY: 7
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_: 1
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCL: 2
- T.ENROLMENT_SIGNER_AUTHENTICATION_DATA_DISCLOSED: 3
- T.ENROLMENT_SIGNER_IMPERSONATION: 10
- T.MAINTENANCE_AUTHENTICATION_DISCLOSE: 6
- T.PRIVILEGED_USER_INSERTION: 10
- T.RANDOM: 9
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_: 1
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DA: 1
- T.REFERENCE_PRIVILEGED_USER_AUTHENTICATION_DATA_MODIFICATION: 2
- T.SAD_FORGERY: 6
- T.SAP_BYPASS: 7
- T.SAP_REPLAY: 7
- T.SIGNATURE_FORGERY: 7
- T.SIGNATURE_REQUEST_DISCLOSURE: 7
- T.SIGNER_AUTHENTICATION_DATA_MODIFIED: 6
- T.SVD_FORGERY: 8
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
- CCLab:
- CCLab Software Laboratory: 1
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- MD:
- SHA:
- SHA2:
- SHA-224: 2
- SHA-256: 1
- SHA-384: 2
- SHA224: 2
- SHA256: 7
- SHA384: 3
- SHA512: 5
- SHA3:
- SHA-3: 1
- SHA3-224: 4
- SHA3-256: 3
- SHA3-384: 5
- SHA3-512: 5
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 2
- brainpoolP256r1: 2
- brainpoolP256t1: 2
- brainpoolP320r1: 2
- brainpoolP320t1: 2
- brainpoolP384r1: 2
- brainpoolP384t1: 2
- brainpoolP512r1: 2
- brainpoolP512t1: 2
- NIST:
- NIST P-256: 2
- P-256: 2
- P-384: 2
- P-521: 4
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 3
- FIPS:
- FIPS 140-3: 1
- FIPS 186-5: 7
- FIPS 202: 1
- FIPS PUB 140-3: 1
- FIPS PUB 186-5: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 19790: 8
- ISO/IEC 19790:2012: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- used to authenticate the signer are managed by the IdP or mobile application via SSA and are thus out of scope of this ST. 145 [selection: [assignment: the rules describing how delegated authentication is: 1
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
True |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |