Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
ISCB-5-RPT-C112-CR-v1
NXP Smart Card Controller P61N1M3VD/VD-1/PVE-1 with IC Dedicated Software
BSI-DSZ-CC-1051-2019
name CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12 NXP Smart Card Controller P61N1M3VD/VD-1/PVE-1 with IC Dedicated Software
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme MY DE
not_valid_after 23.10.2025 15.03.2024
not_valid_before 23.10.2020 15.03.2019
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C112-CERTIFICATE-v1%20signed.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1051c_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C112-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1051a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CYSECA%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1051b_pdf.pdf
manufacturer Pernec Integrated Network Systems Sdn. Bhd. NXP Semiconductors Germany GmbH, Business Unit Security and Connectivity
manufacturer_web https://www.pernec.com.my/ https://www.nxp.com
security_level EAL2 EAL6+, ASE_TSS.2, ALC_FLR.1
dgst 5bbd05b848eb7573 0ebfdede0e6bf085
heuristics/cert_id ISCB-5-RPT-C112-CR-v1 BSI-DSZ-CC-1051-2019
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ADV_COV.3, ASE_INT.1, ASE_REQ.2, ADV_CMS.5, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ALC_COV.3, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ADV_CMC.5, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1
heuristics/extracted_versions 1.2.0, 1.1.12 1
heuristics/report_references/directly_referenced_by {} NSCIB-CC-37812-CR2
heuristics/report_references/indirectly_referenced_by {} NSCIB-CC-37812-CR2
heuristics/scheme_data
  • cert_no: 2020-007-C112
  • certification_date: 23.10.2020
  • developer: Pernec Integrated Network Systems Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C112
    • certification_date: 23.10.2020
    • developer: 21, Jalan Setiawangsa 8,Taman Setiawangsa,54200 Kuala Lumpur,Wilayah Persekutuan Kuala Lumpur Tel: 03-4259 6000Email: [email protected]: https://www.pernec.com.my/
    • expiration_date: 23.10.2025
    • mutual_recognition: CCRA
    • product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/ISCB-5-RPT-C112-CR-v1.pdf
    • scope: The Target of Evaluation (TOE) is CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 (TOE Server) and CYSECA Endpoint Application Control Client v1.1.12 (TOE Client). The TOE is an endpoint application control allows organization to enhance the defences against executing unwanted or malicious application on critical endpoint computer. TOE comprise of server and client components that can be operated in one or more instance. TOE is designed with granular policy, extensive application catalogue as well as, real-time monitoring and defences, CYSECA reduces the risk of threat exposures on client. The TOE is designed for Application control implementation for client and allows only selected files or applications that are allowed/whitelisted to be executed while others are being stopped.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C112/CYSECA_Security_Target_v1.0.pdf
    • type: Other Devices and Systems
  • expiration_date: 23.10.2025
  • level: EAL2
  • product: CYSECA Endpoint CYSECA Endpoint Application Control which consists of CYSECA Endpoint Application Control Server v1.2.0 and CYSECA Endpoint Application Control Client v1.1.12
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/133
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/cert_filename ISCB-5-CERT-C112-CERTIFICATE-v1 signed.pdf 1051c_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1051-2019: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
  • EAL:
    • EAL 2: 1
    • EAL 5: 1
    • EAL 6: 1
    • EAL 6 augmented: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 1
  • ASE:
    • ASE_TSS.2: 1
pdf_data/cert_keywords/vendor
  • NXP:
    • NXP: 1
    • NXP Semiconductors: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20201105094524+08'00'
  • /Creator: ISCB Printer
  • /ModDate: D:20201105125157+08'00'
  • /Producer: KONICA MINOLTA bizhub C360i
  • /Title: SISCB Print20110509451
  • pdf_file_size_bytes: 226462
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20190318122014+01'00'
  • /Creator: Writer
  • /Keywords: Common Criteria, Certification, Zertifizierung, Smartcard Controller, P61N1M3VD/VD-1/PVE-1, NXP
  • /ModDate: D:20190318122150+01'00'
  • /Producer: LibreOffice 5.2
  • /Subject: Common Criteria Certification
  • /Title: Certificate BSI-DSZ-CC-1051-2019
  • pdf_file_size_bytes: 408864
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-5-RPT-C112-CR-v1.pdf 1051a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 6 augmented by ALC_FLR.1, ASE_TSS.2
    • cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-1051-2019
    • cert_item: NXP Smart Card Controller P61N1M3VD/VD-1/PVE-1 with IC Dedicated Software
    • cert_lab: BSI
    • developer: NXP Semiconductors Germany GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January 2014, BSI-CC-PP-0084-2014
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C112-CR-v1: 1
    • ISCB-5-RPT-C112-CR-v1: 36
  • DE:
    • BSI-DSZ-CC-1051-2019: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 1
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 5
    • EAL 6 augmented: 3
    • EAL5: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_TSS.2: 4
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.PHYSICAL: 1
    • A.PLATFORM: 1
    • A.TIMESTAMP: 1
    • A.USER: 1
  • O:
    • O.C: 4
  • R:
    • R.O: 4
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 27
    • NXP Semiconductors: 22
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • 3DES: 2
      • Triple-DES: 4
    • DES:
      • DES: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
    • TLS:
      • TLS: 2
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 3
  • TRNG:
    • TRNG: 1
pdf_data/report_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/report_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 8
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 1: 1
    • AIS 14: 1
    • AIS 19: 1
    • AIS 23: 1
    • AIS 25: 2
    • AIS 26: 2
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 2
    • AIS 35: 2
    • AIS 36: 2
    • AIS 37: 1
    • AIS 38: 1
    • AIS 46: 1
    • AIS 47: 1
    • AIS31: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
    • ISO/IEC 7816: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 10] ETR for composite evaluation P61N1M3P VD/VD-1/VE-1, 2019-01-28, TÜV Informationstechnik GmbH (confidential document) [11] NXP Secure Smart Card Controller P61N1M3PVD/VD-1/VE-1 Configuration List, Version 1.19: 1
    • GmbH, (confidential document) [8] Security IC Platform Protection Profile with Augmentation Packages Version 1.0, 13 January: 1
    • NXP Semiconductors (confidential document) [12] SmartMX2 P61N1M3 Secure high-performance mobile controller Product Data Sheet, Version 3.1: 1
    • P61N1M3PVD/VD-1/VE-1 BSI- DSZ-CC-1051-2019, Version 2.11, 2019-01-10, NXP Semiconductors (confidential document) [7] Evaluation Technical Report P61N1M3P VD/VD-1/VE-1, Version 3, 2019-01-28, TÜV: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
  • /CreationDate: D:20201111142929Z00'00'
  • /Creator: Word
  • /ModDate: D:20201111142929Z00'00'
  • /Producer: macOS Version 10.15.7 (Build 19H2) Quartz PDFContext
  • pdf_file_size_bytes: 789695
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename CYSECA Security Target v1.0.pdf 1051b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1051: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-: 1
    • BSI-CC-PP-0084-2014: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 7
  • EAL:
    • EAL 6: 2
    • EAL4: 4
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL6: 43
    • EAL6 augmented: 6
    • EAL6+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 4
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 7
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_CMC.4: 1
    • ADV_CMC.5: 1
    • ADV_CMS.4: 1
    • ADV_CMS.5: 1
    • ADV_COV.3: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 5
    • ADV_FSP.5: 13
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_IMP.2: 5
    • ADV_INT.3: 1
    • ADV_SPM: 2
    • ADV_SPM.1: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 3
    • ALC_CMC.5: 6
    • ALC_CMS: 2
    • ALC_CMS.4: 4
    • ALC_CMS.5: 6
    • ALC_COV: 1
    • ALC_COV.2: 2
    • ALC_COV.3: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_DVS.2: 3
    • ALC_FLR.1: 5
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 6
  • ATE:
    • ATE_COV.2: 1
    • ATE_COV.3: 4
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 2
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 5
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 6
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTP:
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM: 18
    • FCS_CKM.1: 9
    • FCS_CKM.4: 6
    • FCS_COP: 23
    • FCS_COP.1: 2
    • FCS_RNG: 2
    • FCS_RNG.1: 6
    • FCS_RNG.1.1: 1
  • FDP:
    • FDP_ACC.1: 36
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 12
    • FDP_ITC.1: 9
    • FDP_ITC.2: 9
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 1
    • FDP_SDC.1: 6
    • FDP_SDC.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 10
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FMT:
    • FMT_LIM: 14
    • FMT_LIM.1: 8
    • FMT_LIM.2: 8
    • FMT_MSA.1: 24
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 21
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
  • FPT:
    • FPT_FLS.1: 9
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 8
  • FRU:
    • FRU_FLT.2: 8
  • FTP:
    • FTP_ITT.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.PHYSICAL: 4
    • A.PLATFORM: 4
    • A.TIMESTAMP: 3
    • A.USER: 4
  • O:
    • O.ACCESS: 2
    • O.CONFIG: 4
    • O.MANAGE: 1
    • O.SEC_COM: 1
    • O.USER: 5
  • OE:
    • OE.ADMIN: 1
    • OE.PHYSICAL: 1
    • OE.PLATFORM: 2
    • OE.TIMESTAMP: 1
    • OE.TOE_ACCESS: 3
    • OE.USER: 3
  • T:
    • T.AUDIT_COMPROMISE: 2
    • T.CONFIG: 4
    • T.MASQUERADE: 3
    • T.UNAUTHORISED_AC: 1
  • O:
    • O.AES: 2
    • O.FM_FW: 11
    • O.MEM_ACCESS: 12
    • O.NVM_INTEGRITY: 6
    • O.RND: 3
    • O.SFR_ACCESS: 12
    • O.TDES: 3
  • T:
    • T.RND: 2
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
  • NXP:
    • NXP: 105
    • NXP Semiconductors: 29
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 27
  • DES:
    • 3DES:
      • TDEA: 3
      • TDES: 8
      • Triple-DEA: 1
      • Triple-DES: 9
    • DES:
      • DEA: 2
      • DES: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
      • TLS v1.2: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 5
    • RNG: 11
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • ECB:
    • ECB: 5
pdf_data/st_keywords/crypto_engine
  • SmartMX:
    • SmartMX2: 18
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • fault injection: 2
    • malfunction: 2
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 11
    • Physical Probing: 2
    • physical probing: 1
    • side channel: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 197: 2
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 13239: 2
    • ISO/IEC 14443: 8
    • ISO/IEC 7816: 12
    • ISO/IEC 7816-3: 1
  • NIST:
    • NIST SP 800-38A: 3
    • NIST SP 800-67: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation: 1
    • out of Scope: 1
    • within the TOE boundary). The operating systems, web Server components and CYSECA Master Server are out of Scope of Evaluation. In order to comply with the evaluated configuration, the following hardware and: 1
pdf_data/st_metadata
  • /Author: Alwin Habeck
  • /CreationDate: D:20190125113338+00'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20190125113338+00'00'
  • /Producer: Microsoft® Word 2016
  • /Subject: P61N1M3PVD/VD-1/VE-1
  • /Title: Security Target
  • pdf_file_size_bytes: 1174503
  • pdf_hyperlinks: https://www.bsi.bund.de/, mailto:[email protected], http://www.nxp.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 78
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different