name |
CA ACF2 r16 |
NEC Groups Information Leakage Prevention System Version: 1.0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
01.09.2019 |
07.10.2013 |
not_valid_before |
01.09.2017 |
26.12.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10811-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_st.pdf |
manufacturer |
CA Technologies |
NEC Corporation |
manufacturer_web |
https://www.ca.com |
https://www.nec.com/ |
security_level |
{} |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
dgst |
61c9cd7cd4d905c5 |
85e3322e0f4f0162 |
heuristics/cert_id |
CCEVS-VR-VID-10811-2017 |
JISEC-CC-CRP-C0134 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_OBJ.2, ASE_SPD.1, ASE_REQ.2 |
heuristics/extracted_versions |
- |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Enterprise Security Management
- certification_date: 18.08.2017
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date: 18.08.2019
- id: CCEVS-VR-VID10811
- product: CA ACF2 r16
- scheme: US
- url: https://www.niap-ccevs.org/product/10811
- vendor: CA Technologies
|
- cert_id: JISEC-CC-CRP-C0134
- certification_date: 01.12.2007
- claim: EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
- enhanced:
- assurance_level: EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
- cc_version: 3.1
- description: PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user's PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: NEC Group Information Leakage Prevention System
- product_type: Information Leakage Prevention System
- report_link: https://www.ipa.go.jp/en/security/c0134_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0134_est.pdf
- toe_version: 1.0
- vendor: NEC Corporation
- expiration_date: 01.10.2013
- supplier: NEC Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html
- toe_japan_name: NEC Group Information Leakage Prevention System 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
292a489599472031, 64065af56aac20cf |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_ac_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_esm_pm_v2.1.pdf |
{} |
pdf_data/cert_filename |
st_vid10811-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10811-2017: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20170901125546-04'00'
- /ModDate: D:20170901125657-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 178593
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10811-vr.pdf |
20080306_c0134_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10811-2017
- cert_item: CAACF2 r16
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10811-2017: 1
|
- JP:
- CRP-C0134-01: 1
- Certification No. C0134: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL1: 4
- EAL1 augmented: 2
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
|
- ASE:
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- O:
- O.ACCESSID: 1
- O.AUDIT: 1
- O.AUTH: 1
- O.CONSISTENT: 1
- O.DATAPROT: 1
- O.DISTRIB: 1
- O.INTEGRITY: 2
- O.MAINTAIN: 1
- O.MANAGE: 1
- O.MNGRID: 1
- O.MONITOR: 1
- O.OFLOWS: 1
- O.POLICY: 1
- O.PROTCOMMS: 1
- O.ROBUST: 1
- O.SELFID: 2
- T:
- T.ADMIN_ERROR: 1
- T.CONTRADICT: 1
- T.DISABLE: 1
- T.EAVES: 1
- T.FALSIFY: 1
- T.FORGE: 2
- T.MASK: 1
- T.NOROUTE: 1
- T.OFLOWS: 1
- T.UNAUTH: 2
- T.WEAKIA: 1
- T.WEAKPOL: 1
|
- A:
- A.FACILITIES_IN_SECURE_ROOM: 1
- A.LOG_BACKUP: 1
- A.MANAGE_SAFE_PLACE: 1
- A.NETWORK: 1
- A.OPERATOR_MANAGEMENT: 1
- A.PASSWORD_MANAGEMENT: 1
- A.PC_STARTUP_SET: 1
- A.UNJUST_SOFTWARE: 1
- T:
- T.INJUSTICE_CONNECT: 1
- T.INJUSTICE_LOGON: 1
- T.UNAUTHORIZED_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2006-09-002: 2
- CCMB-2006-09-003: 2
- CCMB-2006-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /CreationDate: D:20080227110226+09'00'
- /ModDate: D:20080227110226+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 156801
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st_vid10811-st.pdf |
20080306_c0134_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 11
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.1: 5
- ALC_CMS.1: 6
- ATE:
- AVA:
|
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 3
- ASE_REQ: 1
- ASE_REQ.2: 5
- ASE_SPD: 1
- ASE_SPD.1: 5
- ASE_TSS: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 2
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 1
- FAU_SEL: 2
- FAU_SEL.1: 4
- FAU_SEL.1.1: 1
- FAU_SEL_EXT: 2
- FAU_SEL_EXT.1: 6
- FAU_SEL_EXT.1.1: 1
- FAU_STG: 2
- FAU_STG.1: 2
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG_EXT: 2
- FAU_STG_EXT.1: 7
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCO:
- FCO_NRR: 2
- FCO_NRR.2: 3
- FCO_NRR.2.1: 2
- FCO_NRR.2.2: 1
- FCO_NRR.2.3: 1
- FDP:
- FDP_ACC.1: 10
- FDP_ACC.1.1: 2
- FDP_ACF.1: 11
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 3
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_USB: 2
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 12
- FMT_MOF.1.1: 4
- FMT_MOF_EXT: 2
- FMT_MOF_EXT.1: 5
- FMT_MOF_EXT.1.1: 1
- FMT_MSA: 4
- FMT_MSA.1: 2
- FMT_MSA.1.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MSA_EXT: 2
- FMT_MSA_EXT.5: 5
- FMT_MSA_EXT.5.1: 1
- FMT_MSA_EXT.5.2: 1
- FMT_SMF: 2
- FMT_SMF.1: 3
- FMT_SMF.1.1: 1
- FMT_SMR: 2
- FMT_SMR.1: 8
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_APW_EXT: 2
- FPT_APW_EXT.1: 4
- FPT_FLS_EXT: 2
- FPT_FLS_EXT.1: 4
- FPT_FLS_EXT.1.1: 1
- FPT_RPL: 2
- FPT_RPL.1: 3
- FPT_RPL.1.1: 1
- FPT_RPL.1.2: 1
- FPT_SKP_EXT: 2
- FPT_SKP_EXT.1: 2
- FPT_SKP_EXT.1.1: 1
- FRU:
- FRU_FLT: 2
- FRU_FLT.1: 2
- FRU_FLT.1.1: 1
- FTA:
- FTA_TAB.1: 4
- FTA_TSE: 2
- FTA_TSE.1: 4
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 7
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 2
- FTP_TRP.1: 6
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 3
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 32
- FDP_ACC.1: 19
- FDP_ACF: 25
- FDP_ACF.1: 18
- FDP_ETC.2: 7
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 3
- FDP_ITC.2: 12
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 9
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UAU.7: 9
- FIA_UID.1: 5
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 49
- FMT_MSA.1: 9
- FMT_MSA.2: 10
- FMT_MSA.3: 12
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 4
- FTP:
- FTP_ITC.1: 3
- FTP_TRP: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CRYPTO: 1
- A.ESM: 1
- A.INSTALL: 1
- A.MANAGE: 1
- A.POLICY: 1
- A.SYSTIME: 1
- A.USERID: 1
- O:
- O.ACCESSID: 1
- O.AUDIT: 1
- O.AUTH: 1
- O.BANNER: 1
- O.CONSISTENT: 1
- O.DATAPROT: 1
- O.DISTRIB: 1
- O.INTEGRITY: 1
- O.MAINTAIN: 1
- O.MANAGE: 1
- O.MNGRID: 1
- O.MONITOR: 1
- O.OFLOWS: 1
- O.POLICY: 1
- O.PROTCOMMS: 1
- O.ROBUST: 1
- O.SELFID: 2
- OE:
- OE.ADMIN: 2
- OE.BANNER: 2
- OE.CRYPTO: 3
- OE.INSTALL: 2
- OE.PERSON: 2
- OE.POLICY: 2
- OE.PROTECT: 2
- OE.ROBUST: 1
- OE.SYSTIME: 2
- OE.USERID: 3
- T:
- T.ADMIN_ERROR: 1
- T.CONTRADICT: 1
- T.DISABLE: 1
- T.EAVES: 1
- T.FALSIFY: 1
- T.FORGE: 1
- T.MASK: 1
- T.NOROUTE: 1
- T.OFLOWS: 1
- T.UNAUTH: 3
- T.WEAKIA: 1
- T.WEAKPOL: 1
|
- A:
- A.FACILITIES_IN_SECURE_ROOM: 4
- A.LOG_BACKUP: 5
- A.MANAGE_SAFE_PLACE: 3
- A.NETWORK: 5
- A.OPERATOR_MANAGEMENT: 4
- A.PASSWORD_MANAGEMENT: 4
- A.PC_STARTUP_SET: 4
- A.UNJUST_SOFTWARE: 5
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 8
- O.ACCESS_CONTROL_: 1
- O.ACCESS_CONTROL_MEDIA: 5
- O.AUDIT: 6
- O.CRYPTO: 1
- O.CRYPTOGRAPHY: 9
- O.LOG_COLLECT: 7
- O.RE_AUTH: 8
- OE:
- OE.FACILITIES_IN_SECURE_ROOM: 4
- OE.LOG_: 1
- OE.LOG_BACKUP: 4
- OE.LOG_COLLECT: 4
- OE.MANAGE_PC_PLACE: 5
- OE.NETWORK: 5
- OE.OPERATOR_MANAGEMENT: 5
- OE.PASSWORD_MANAGEMENT: 5
- OE.PC_STARTUP: 1
- OE.PC_STARTUP_SET: 3
- OE.SECURITY_: 1
- OE.SECURITY_PARAMETER: 4
- OE.UNJUST_SOFTWARE: 5
- OE.USERDATA_CRYPTOGRAPHY: 4
- T:
- T.INJUSTICE_CONNECT: 5
- T.INJUSTICE_LOGON: 5
- T.UNAUTHORISED_ACCESS: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2012-009-001: 1
- CCMB-2012-009-003: 1
- CCMB-2012-009-004: 1
- FIPS:
- FIPS 140-2: 1
- FIPS PUB 197: 2
- PKCS:
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2006-09-002: 2
- CCMB-2006-09-003: 2
- CCMB-2006-09-004: 2
- FIPS:
- FIPS PUB 197: 8
- FIPS PUB 46-3: 4
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- boundary. It does not matter if they are installed on the Operational Environment because they are out of scope for the requirements in this evaluation as explained below. EUA – Extended User Authentication: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
|
- /CreationDate: D:20080226213013+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20080226213216+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 618504
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |