name |
Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A |
Carte à puce SLJ 52 Gxx yyy AL : application pour passeport électronique sur plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
ES |
FR |
status |
active |
archived |
not_valid_after |
07.06.2027 |
01.09.2019 |
not_valid_before |
07.06.2022 |
18.11.2013 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48_Certificado.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20INF-3811.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2013-64%20Rapport%20de%20certification.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019-48%20ST_lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/PU-2012-RT-767-1.0-LITE.pdf |
manufacturer |
Winbond Electonics Corporation |
Trusted Logic / Infineon |
manufacturer_web |
https://www.winbond.com/ |
https://www.trusted-logic.com/ |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
ALC_DVS.2, AVA_VAN.5, EAL4+ |
dgst |
51a1149f945dea23 |
f5aa1a840ff9d020 |
heuristics/cert_id |
2019-48-INF-3811 |
ANSSI-CC-2013/64 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, AVA_VAN.5, ATE_COV.2, ADV_FSP.5, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ATE_DPT.3, ADV_TDS.4, ASE_REQ.2, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ASE_ECD.1, ALC_DEL.1, ASE_OBJ.2, ASE_INT.1, ADV_INT.2, ALC_TAT.2, ASE_SPD.1, ATE_FUN.1, ALC_CMS.5, ALC_CMC.4, ALC_LCD.1 |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
- |
46, 52 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2013/55, BSI-DSZ-CC-0829-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0728-2011, ANSSI-CC-2013/55, BSI-DSZ-CC-0829-2012 |
heuristics/scheme_data |
- category: Smart Cards and similiar devices
- certification_date: 07.06.2022
- enhanced:
- category: Smart Cards and similiar devices
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1478
- certification_date: 07.06.2022
- description: The TOE is a memory flash IC designed to be embedded into highly critical hardware devices such as smart card, secure element, USB token, secure micro SD, etc. These devices will embed secure applications such as financial, telecommunication, identity (e-Government), etc. and will be working in a hostile environment. In particular, the TOE main function is the secure storage of the code and data of critical applications. The security needs for the TOE consist in: Maintaining the integrity of the content of the memories and the confidentiality of the content of protected memory areas as required by the critical HW products (e.g. Security IC) the Memory Flash is built for. Providing a secure communication with the Host device that will embed the TOE in a secure HW product such as Security IC.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Winbond Electronics Corporation
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1479
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1477
- type: Product
- manufacturer: Winbond Electronics Corporation
- product: Winbond SpiFlash TrustME Secure Flash Memory W75F40WBYJEG version A
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/826-winbond-spiflash-trustme-secure-flash-memory-w75f40wbyjeg-version-a
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
a33327d40f253f46, 78bcc246f0f43034 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
pdf_data/cert_filename |
2019-48_Certificado.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 880365
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
|
pdf_data/report_filename |
2019-48 INF-3811.pdf |
2013-64 Rapport de certification.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 4 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/64
- cert_item: Carte à puce SLJ 52 Gxx yyy AL : application pour passeport électronique sur plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM
- cert_item_version: 5.7
- cert_lab: Serma Technologies 14 rue Galilée – CS 10055, 33615 Pessac Cedex, FRANCE
- developer: Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, ALLEMAGNE Commanditaire Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité aux profils de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: PP EAC], version 1.10-2009 Common Criteria PP Machine Readable Travel Document with ICAO Application, Extended Access Control [PP PACE], version 2-2011 Common Criteria PP Machine Readable Travel Document using Standard Inspection Procedure with PACE
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2013/55: 4
- ANSSI-CC-2013/64: 19
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-PP-0035-2007: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0056-2009: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- ITSEC:
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 4: 2
- EAL 5: 1
- EAL 7: 1
- EAL4: 2
- EAL5: 2
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_IFC.1: 1
- FDP_RIP.1: 1
- FDP_SDI.2: 1
- FDP_UIT.1: 1
- FMT:
- FPT:
- FPT_FLS: 2
- FPT_ITT.1: 1
- FPT_TRP.1: 1
- FRU:
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 24
- Infineon Technologies AG: 2
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate:
- /Creator:
- /Keywords:
- /ModDate:
- /Producer:
- /Subject:
- /Title:
- /Trapped:
- pdf_file_size_bytes: 964023
- pdf_hyperlinks: http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: 2013-64 Rapport de certification
- pdf_file_size_bytes: 243601
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
pdf_data/st_filename |
2019-48 ST_lite.pdf |
PU-2012-RT-767-1.0-LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-PP-0002: 1
- BSI-PP-0017: 1
- BSI-PP-0035: 1
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL5: 6
- EAL5 augmented: 2
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 1
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE.1: 6
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 5
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 3
- FDP_ACF: 1
- FDP_IFC.1: 27
- FDP_IFC.1.1: 1
- FDP_IFF.1: 4
- FDP_ITT.1: 13
- FDP_ITT.1.1: 1
- FDP_RIP.1: 8
- FDP_RIP.1.1: 1
- FDP_SDC: 4
- FDP_SDC.1: 16
- FDP_SDC.1.1: 2
- FDP_SDI: 1
- FDP_SDI.2: 11
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT.1: 8
- FDP_UCT.1.1: 1
- FDP_UIT.1: 8
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 22
- FMT_LIM.1.1: 2
- FMT_LIM.2: 19
- FMT_LIM.2.1: 2
- FPT:
- FPT_FLS: 24
- FPT_FLS.1: 3
- FPT_ITT.1: 12
- FPT_ITT.1.1: 1
- FPT_PHP.3: 14
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT.2: 12
- FRU_FLT.2.1: 1
- FTP:
- FTP_ITC.1: 2
- FTP_TRP.1: 11
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 9
- FAU_SAS.1: 5
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 7
- FCS_CKM.1: 3
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 24
- FCS_COP.1: 1
- FCS_RND: 9
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FCS_TST.1: 1
- FDP:
- FDP_ACC: 5
- FDP_ACC.1: 2
- FDP_ACF: 7
- FDP_ACF.1: 5
- FDP_IFC: 1
- FDP_IFC.1: 1
- FDP_IFF: 1
- FDP_ITT.1: 1
- FDP_RIP: 4
- FDP_RIP.1: 2
- FDP_UCT: 5
- FDP_UCT.1: 2
- FDP_UIT: 5
- FDP_UIT.1: 3
- FIA:
- FIA_AFL: 5
- FIA_AFL.1: 2
- FIA_API: 12
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU: 19
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.5: 3
- FIA_UAU.6: 2
- FIA_UID: 4
- FIA_UID.1: 4
- FMT:
- FMT_LIM: 12
- FMT_LIM.1: 9
- FMT_LIM.1.1: 2
- FMT_LIM.2: 8
- FMT_LIM.2.1: 2
- FMT_MSA: 6
- FMT_MSA.2: 2
- FMT_MTD: 53
- FMT_MTD.1: 12
- FMT_MTD.3: 6
- FMT_MTD.3.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 2
- FMT_SMR: 4
- FMT_SMR.1: 4
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 1
- FPT_FLS: 3
- FPT_FLS.1: 2
- FPT_ITT.1: 1
- FPT_PHP: 5
- FPT_PHP.3: 3
- FPT_TST: 4
- FPT_TST.1: 5
- FTP:
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 5
- A.NATIVE: 5
- A.VERIFICATION: 5
- O:
- OE:
- OE.APPLET: 4
- OE.APPLETS-IDENTIFICATION: 3
- OE.BAC_PP: 3
- OE.CODE-EVIDENCE: 1
- OE.KEY-LENGTH: 3
- OE.MRTD_: 2
- OE.NATIVE: 4
- OE.NO-RMI-APPLETS: 1
- OE.PLATFORM-IDENTIFICATION: 3
- OE.PRE-PERSONALIZATION: 3
- OE.SECRETS: 4
- OE.VERIFICATION: 5
- OSP:
- OSP: 1
- OSP.APPLET-INSTALL: 3
- OSP.BAC-PP: 3
- OSP.FILE-ORIGIN: 5
- OSP.VERIFICATION: 5
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 3
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Fault Injection: 1
- Malfunction: 17
- fault injection: 2
- malfunction: 3
- physical tampering: 3
- SCA:
- Leak-Inherent: 17
- Physical Probing: 2
- physical probing: 5
|
- FI:
- DFA: 1
- Malfunction: 3
- Physical Tampering: 1
- Physical tampering: 1
- fault injection: 1
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 1
- SPA: 2
- physical probing: 4
- side channel: 5
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 6
- EF.DG1: 10
- EF.DG14: 6
- EF.DG16: 10
- EF.DG2: 5
- EF.DG3: 13
- EF.DG4: 12
- EF.DG5: 4
- EF.SOD: 6
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- CCMB-2009-07-001: 3
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 197: 2
- FIPS 46-3: 2
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 2
- ISO/IEC 7816-2: 1
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- GlobalPlatform 2.1.1: 3
- GlobalPlatform 2.2.1: 1
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: TRUSTED-LABS
- /CreationDate: D:20131112133824+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20131112133824+01'00'
- /Producer: Microsoft® Office Word 2007
- /Title: BRONTES ST
- pdf_file_size_bytes: 1227478
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 88
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |