Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
N-PosCore v1.1
21.0.01/TSE-CCCS-28
KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
KECS-ISIS-0468-2013
name N-PosCore v1.1 KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme TR KR
not_valid_after 17.04.2018 01.06.2019
not_valid_before 17.04.2015 08.11.2013
report_link https://www.commoncriteriaportal.org/files/epfiles/ENPOS%20%20N-PosCorev1.1%20Certification%20Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-37%20KOMSCO%20JK21%20V1.0%20on%20S3CT9KAKCKW(eng).pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/NPC-ST-v.1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK21-TR-0001]%20Security%20Target-Lite-e-v1.1.pdf
manufacturer EnPOS Bilişim Sanayi ve Ticaret A.Ş. KOMSCO
manufacturer_web https://www.komsco.com
security_level EAL2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 5b42b489497b1655 fd0beec036b21950
heuristics/cert_id 21.0.01/TSE-CCCS-28 KECS-ISIS-0468-2013
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ALC_CMC.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 1.1 1.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
protection_profile_links {} {}
pdf_data/report_filename ENPOS N-PosCorev1.1 Certification Report.pdf KECS-CR-13-37 KOMSCO JK21 V1.0 on S3CT9KAKCKW(eng).pdf
pdf_data/report_keywords/cc_cert_id
  • TR:
    • 21.0.01/TSE-CCCS-28: 2
  • DE:
    • BSI-DSZ-CC-0719: 3
    • BSI-DSZ-CC-0719-2011: 1
  • FR:
    • ANSSI-CC-2012/70: 4
  • KR:
    • KECS-ISIS-0468-2013: 1
  • NL:
    • CC-2011-002: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 6
    • EAL4: 1
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 8
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 8
pdf_data/report_keywords/eval_facility
  • TUBITAK-BILGEM:
    • TÜBİTAK BİLGEM: 5
  • KISA:
    • KISA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • malfunction: 1
    • physical tampering: 3
  • SCA:
    • DPA: 1
    • SPA: 1
    • side channel: 1
  • FI:
    • fault injection: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • X509:
    • X.509: 1
  • BSI:
    • AIS 34: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Cengiz GÖREN
  • /CreationDate: D:20161130114940+03'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20161130114940+03'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 884932
  • pdf_hyperlinks: http://www/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 20
  • /Author: 이은경
  • /CreationDate: D:20131107180619+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131107180619+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 571329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename NPC-ST-v.1.3.pdf [JK21-TR-0001] Security Target-Lite-e-v1.1.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0719-: 1
    • BSI-DSZ-CC-0719-2011: 3
  • FR:
    • ANSSI-CC-2012/70: 3
    • ANSSI-CC-2012/72: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 5
  • EAL:
    • EAL 5+: 1
    • EAL3: 1
    • EAL4: 3
    • EAL4+: 1
    • EAL5: 11
    • EAL5 augmented: 1
    • EAL5+: 13
pdf_data/st_keywords/cc_sar
  • AGD:
    • AGD_OPE.1: 2
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 5
    • ADV_TDS.4: 19
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 20
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 2
    • AVA_VAN.5: 20
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG: 1
    • FAU_STG.1: 6
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 1
    • FCO_NRO.2: 5
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 29
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.4: 37
    • FCS_CKM.4.1: 1
    • FCS_COP: 30
    • FCS_COP.1: 10
    • FCS_COP.1.1: 6
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 35
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC: 12
    • FDP_ETC.2: 8
    • FDP_ETC.2.1: 3
    • FDP_ETC.2.2: 3
    • FDP_ETC.2.3: 3
    • FDP_ETC.2.4: 3
    • FDP_IFC: 25
    • FDP_IFC.1: 34
    • FDP_IFC.1.1: 3
    • FDP_IFF: 16
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 3
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_ITC: 18
    • FDP_ITC.1: 14
    • FDP_ITC.2: 14
    • FDP_ITC.2.1: 3
    • FDP_ITC.2.2: 3
    • FDP_ITC.2.3: 3
    • FDP_ITC.2.4: 3
    • FDP_ITC.2.5: 3
    • FDP_SDI: 11
    • FDP_SDI.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_AFL: 11
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 5
    • FIA_UAU.4.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 66
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 8
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD: 12
    • FMT_MTD.1.1: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 27
    • FMT_SMR.2: 7
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 1
    • FPT_PHP.2: 6
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_RCV: 1
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TDC: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE: 11
    • FPT_TEE.1.1: 2
    • FPT_TEE.1.2: 2
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 6
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 3
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 12
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP: 6
    • FCS_COP.1: 44
    • FCS_COP.1.1: 7
    • FCS_RNG: 2
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.2: 15
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ITT.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 22
    • FIA_UAU.1.1: 7
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 8
    • FPT_RCV.2: 1
    • FPT_RCV.3: 6
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • OSP:
    • OSP: 1
  • A:
    • A.TOE: 3
    • A.TSF: 3
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 23
    • O.RND: 1
  • OE:
    • OE.TSF: 6
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 10
    • OP.INSTALL: 10
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 10
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 7
pdf_data/st_keywords/eval_facility
  • BEAM:
    • BEAM Teknoloji: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 8
      • AES256: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 14
    • DES:
      • DES: 2
  • miscellaneous:
    • ARIA:
      • ARIA: 7
    • SEED:
      • SEED: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DHE: 2
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA 1024: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA2: 1
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 6
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • RNG:
    • RND: 2
    • RNG: 1
  • TRNG:
    • TRNG: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 3
    • malfunction: 2
    • physical tampering: 8
  • SCA:
    • DPA: 3
    • SPA: 3
    • side channel: 3
  • FI:
    • DFA: 1
    • Malfunction: 10
    • Physical tampering: 2
    • malfunction: 9
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attack: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 198-1: 2
    • FIPS PUB 180-2: 3
  • NIST:
    • NIST SP 800-38A: 1
    • NIST SP 800-56A: 1
  • RFC:
    • RFC 5246: 4
  • X509:
    • X.509: 2
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#2: 2
  • SCP:
    • SCP 02: 1
    • SCP02: 19
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis: 1
pdf_data/st_metadata
  • /Author: EnPOS Bilişim
  • /CreationDate: D:20161130130905+03'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20161130130905+03'00'
  • /Producer: Microsoft® Word 2013
  • /Subject: Security Target
  • /Title: N-PosCore v.1.1.0.0
  • pdf_file_size_bytes: 1174258
  • pdf_hyperlinks: http://en.wikipedia.org/wiki/Receipt
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
  • /Author: HoGeun Song
  • /CreationDate: D:20131111082538+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131111082538+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: KOMSCO Document Template
  • pdf_file_size_bytes: 1422360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different