name |
MX-FR15 Version C.10 |
LDS Applet EAC with PACE on ID-One V8.2 Platform on NXP P60D145 (version 03 00 00 00) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
02.06.2015 |
13.11.2024 |
not_valid_before |
26.05.2010 |
13.11.2019 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_49fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0255_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_49en.pdf |
manufacturer |
Sharp Corporation |
Idemia |
manufacturer_web |
https://sharp-world.com/ |
https://www.idemia.com |
security_level |
EAL3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
630ebe8ce3aab74e |
4666af472f2ac9da |
heuristics/cert_id |
JISEC-CC-CRP-C0255 |
ANSSI-CC-2019/49 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ALC_DVS.1, ASE_OBJ.2, ALC_CMS.3, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ALC_DEL.1, ATE_FUN.1, ALC_CMC.3, ATE_DPT.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.2, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, ASE_CCL.1, AGD_OPE.1 |
ADV_ARC.1, ALC_CMC.4, ALC_DVS.2, ASE_OBJ.2, ALC_TAT.2, ALC_FLR.1, ASE_SPD.1, AGD_PRE.1, ADV_FSP.5, ALC_DEL.1, ATE_FUN.1, ATE_DPT.3, ADV_TDS.4, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_INT.1, AVA_VAN.5, ADV_INT.2, ASE_TSS.2, ALC_CMS.5, ADV_IMP.1, ASE_CCL.1, AGD_OPE.1 |
heuristics/extracted_versions |
10 |
8.2 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2020/37 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2019/28, ANSSI-CC-2018/05, BSI-DSZ-CC-1059-2018 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2020/37 |
heuristics/report_references/indirectly_referencing |
{} |
ANSSI-CC-2010/03, BSI-DSZ-CC-0955-2016, ANSSI-CC-2017/49, BSI-DSZ-CC-0973-2016, ANSSI-CC-2009/05, ANSSI-CC-2019/28, ANSSI-CC-2017/47, ANSSI-CC-2018/05, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-0955-V2-2016, ANSSI-CC-2009/06, ANSSI-CC-2009/26 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0255
- certification_date: 01.05.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0255_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is firmware to enhance security functionality of a Multi-Function Device (hereafter referred to as "MFD"). It is an option that implements security functions and controls the entire MFD when installed instead of the MFD standard firmware. TOE security functionality To counter attempts to steal image data in an MFD, the TOE provides such security functions as: - The cryptographic operation function: Encrypts the image data that the MFD manages before storing to the Flash memory in the MFD, - The data clear function: Overwrites random or fixed values over the storage area that the spooled image data occupy in the volatile memory and Flash memory in the MFD.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR15
- product_type: Data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0255_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0255_est.pdf
- toe_version: C.10
- vendor: Sharp Corporation
- expiration_date: 01.06.2015
- supplier: Sharp Corporation
- toe_japan_name: MX-FR15 C.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0255_it9273.html
- toe_overseas_name: MX-FR15 C.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
ANSSI-CC-2019/28 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
ANSSI-CC-2019/28 |
heuristics/protection_profiles |
{} |
b380aabf93b29692, a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0255_erpt.pdf |
anssi-cc-2019_49fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2019/49
- cert_item: LDS Applet EAC with PACE on ID-One V8.2 Platform on NXP P60D145
- cert_item_version: version 03 00 00 00 Conformité a un profil de protection Machine Readable Travel Document with ICAO application, Extended Access Control with PACE (EAC PP), version 1.3.2 Certifié BSI-CC-PP-0056-V2-2012-MA-02 le 5 décembre 2012 Machine Readable Travel Document using Standard Inspection Procedure with PACE, version 1.01 Certifié BSI-CC-PP-0068-V2-2011-MA-01 le 22 juillet 2014
- cert_lab: CEA - LETI 17 avenue des martyrs, 38054 Grenoble Cedex 9, France
- developer: IDEMIA NXP Semiconductors GmbH 2 place Samuel de Champlain, Troplowitzstrasse 20, 92400 Courbevoie, France 22529 Hamburg, Allemagne Commanditaire IDEMIA 2 place Samuel de Champlain, 92400 Courbevoie, France
- match_rules: ["Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Critères d'évaluation et version(.+)Niveau d'évaluation(.+)Développeurs(.+)Centre d'évaluation(.+)Accords de reconnaissance applicables"]
- ref_protection_profiles:
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0255-01: 1
- Certification No. C0255: 1
|
- DE:
- FR:
- ANSSI-CC-2018/05: 3
- ANSSI-CC-2019/28: 3
- ANSSI-CC-2019/49: 17
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 5: 2
- EAL2: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- AGD_ALP: 2
- AGD_OPE: 2
- AGD_PRE: 4
- ALC:
- ALC_CMC: 1
- ALC_DEL: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_GMS: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Idemia:
- NXP:
- NXP: 30
- NXP Semiconductors: 2
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 2
- CESTI:
- Serma:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- ICAO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110530111145+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110530111242+09'00'
- /Producer: Acrobat Distiller 8.2.3 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 441982
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 21
|
- /Author: harbus
- /CreationDate: D:20191115120335+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20191115120335+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title: Microsoft Word - ANSSI-CC-2019_49fr
- pdf_file_size_bytes: 280676
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
c0255_est.pdf |
anssi-cible-cc-2019_49en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL5: 4
- EAL5 augmented: 1
- EAL5+: 2
- EAL6: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 2
- ADV_FSP.5: 8
- ADV_IMP.1: 9
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 5
- AGD_PRE.1: 6
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 9
- ALC_FLR.1: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 8
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 2
- FDP_ITC.2: 1
- FDP_RIP.1: 10
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 11
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 13
- FIA_UAU.2.1: 1
- FIA_UAU.7: 11
- FIA_UAU.7.1: 1
- FIA_UID.1: 4
- FIA_UID.2: 13
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MTD.1: 7
- FMT_MTD.1.1: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
|
- FAU:
- FAU_SAS: 2
- FAU_SAS.1: 15
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 60
- FCS_CKM.1: 15
- FCS_CKM.2: 2
- FCS_CKM.4: 31
- FCS_COP: 112
- FCS_COP.1: 16
- FCS_RND: 3
- FCS_RND.1: 22
- FCS_RND.1.1: 1
- FDP:
- FDP_ACC: 28
- FDP_ACC.1: 8
- FDP_ACF: 28
- FDP_ACF.1: 16
- FDP_DAU: 10
- FDP_DAU.1: 2
- FDP_IFC.1: 3
- FDP_ITC: 11
- FDP_ITC.1: 11
- FDP_ITC.2: 8
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FDP_UCT: 13
- FDP_UCT.1: 1
- FDP_UIT: 15
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 10
- FIA_AFL.1: 2
- FIA_API: 4
- FIA_API.1: 12
- FIA_API.1.1: 1
- FIA_UAU: 169
- FIA_UAU.1: 7
- FIA_UAU.4: 3
- FIA_UAU.5: 12
- FIA_UAU.6: 4
- FIA_UID: 40
- FIA_UID.1: 9
- FMT:
- FMT_LIM: 13
- FMT_LIM.1: 19
- FMT_LIM.1.1: 1
- FMT_LIM.2: 17
- FMT_LIM.2.1: 1
- FMT_MOF: 18
- FMT_MOF.1: 2
- FMT_MSA.1: 2
- FMT_MSA.3: 7
- FMT_MTD: 173
- FMT_MTD.1: 21
- FMT_MTD.3: 7
- FMT_SMF: 8
- FMT_SMF.1: 50
- FMT_SMF.1.1: 1
- FMT_SMR: 39
- FMT_SMR.1: 21
- FPT:
- FPT_EMS: 13
- FPT_EMS.1: 24
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS: 1
- FPT_FLS.1: 10
- FPT_PHP: 1
- FPT_PHP.3: 12
- FPT_TST: 10
- FPT_TST.1: 23
- FTP:
- FTP_ITC: 15
- FTP_ITC.1: 7
- FTP_TRP.1: 4
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.MANAGE: 7
- O.REMOVE: 7
- O.RESIDUAL: 8
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
|
pdf_data/st_keywords/vendor |
|
- Idemia:
- Morpho:
- NXP:
- NXP: 5
- NXP Semiconductors: 4
- Oberthur:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 10
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 2
- SHA-384: 1
- SHA-512: 2
- SHA2: 2
- SHA224: 1
- SHA256: 2
- SHA384: 1
- SHA512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- Physical Tampering: 4
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 1
- physical probing: 3
- other:
- JIL: 1
- reverse engineering: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 13
- EF.DG1: 18
- EF.DG14: 4
- EF.DG15: 3
- EF.DG16: 17
- EF.DG2: 3
- EF.DG3: 15
- EF.DG4: 15
- EF.DG5: 2
- EF.SOD: 11
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS PUB 140-2: 1
- FIPS PUB 180-3: 1
- FIPS PUB 186-3: 1
- FIPS PUB 197: 1
- FIPS PUB 46-3: 1
- FIPS PUB 81: 1
- ICAO:
- ISO:
- ISO/IEC 11770-2: 2
- ISO/IEC 14443: 6
- ISO/IEC 15946-1: 1
- ISO/IEC 15946-2: 1
- ISO/IEC 18013-3: 1
- ISO/IEC 7816-3: 2
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-1: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 3
- PKCS:
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: K.Nakagawa
- /Company: Sharp Corporation
- /CreationDate: D:20110525112546+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20110526173154+09'00'
- /Producer: Acrobat Distiller 8.2.6 (Windows)
- /Subject: MX-FR15
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 797003
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 24
|
- /Author: Oberthur Technologies
- /CreationDate: D:20190819185855+05'30'
- /Creator: Microsoft® Word 2016
- /Keywords: Quality
- /ModDate: D:20190819185855+05'30'
- /Producer: Microsoft® Word 2016
- /Subject: FQR standard
- /Title: FQR standard
- pdf_file_size_bytes: 2239909
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 104
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |