Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Mobile FeliCa OS 3.0 on T6NE1/0115_432B
SERTIT-081
SPass NX V1.0 R3 on S3CT9KW/S3CT9KC/S3CT9K9
KECS-ISIS-0456-2013
name Mobile FeliCa OS 3.0 on T6NE1/0115_432B SPass NX V1.0 R3 on S3CT9KW/S3CT9KC/S3CT9K9
scheme NO KR
not_valid_after 05.09.2021 01.06.2019
not_valid_before 05.09.2016 05.07.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-081%20CR%201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-25%20SPass%20NX%20V1.0%20R3%20on%20S3CT9KWS3CT9KCS3CT9K9(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[STP-T]%20F03T-ASEP01-E01-70.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Samsung%20SDS_SPass%20NX%20V1.0_R3_ST%20Lite(En).pdf
manufacturer FeliCa Networks, Inc Samsung SDS
manufacturer_web https://https://www.felicanetworks.co.jp/en/ https://www.sds.samsung.co.kr
security_level EAL4+, AVA_VAN.4, ATE_DPT.2, ALC_DVS.2 ADV_IMP.2, EAL5+, ALC_DVS.2, AVA_VAN.5
dgst 6835e0576746ad57 33e76711d731b4e1
heuristics/cert_id SERTIT-081 KECS-ISIS-0456-2013
heuristics/extracted_sars ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.0 1.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/70
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2012/70, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009
heuristics/scheme_data
  • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
  • certification_date: 05.09.2016
  • developer: FeliCa Networks, Inc.
  • enhanced:
    • category: ICs, Smart Cards and Smart Card-Related Devices and Systems
    • cert_id: SERTIT-081
    • certification_date: 05.09.2016
    • description: The TOE is an integrated circuit with an embedded smartcard operating system. The operating system is the FeliCa Networks Mobile FeliCa Operating System and the integrated circuit is the Toshiba CORPORATION chip T6NE1.
    • developer: FeliCa Networks, Inc.
    • documents: frozendict({'target': [frozendict({'href': 'https://sertit.no/getfile.php/135067-1607952737/SERTIT/Sertifikater/2016/81/%5BSTP-T%5D%20F03T-ASEP01-E01-70.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135070-1607952743/SERTIT/Sertifikater/2016/81/SERTIT-081%20CR%201.0.pdf'})]})
    • evaluation_facility: Brightsight B.V.
    • level: EAL 4, ALC_DVS.2, ATE_DPT.2, AVA_VAN.4
    • mutual_recognition: CCRA, SOG-IS
    • product: Software: Mobile FeliCa OS Version 3.0 0115_432B; Hardware Toshiba T6NE1 4.0
    • sponsor: FeliCa Networks, Inc.
  • product: Mobile FeliCa OS 3.0 on T6NE1/0115_432B
  • url: https://sertit.no/certified-products/product-archive/mobile-felica-os-3-0-on-t6ne1-0115-432b
heuristics/st_references/directly_referencing {} ANSSI-CC-2012/70
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2012/70
heuristics/protection_profiles {} 4bfe1a1aff1207a4
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/20110221143918.pdf
pdf_data/report_filename SERTIT-081 CR 1.0.pdf KECS-CR-13-25 SPass NX V1.0 R3 on S3CT9KWS3CT9KCS3CT9K9(eng).pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-081: 19
  • FR:
    • ANSSI-CC-2012/70: 4
  • KR:
    • KECS-ISIS-0456-2013: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 18
    • EAL1: 1
    • EAL4: 1
    • EAL7: 1
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 4
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 4
    • ATE_FUN.1: 1
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 4
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.2: 5
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 8
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_SAS.1: 4
  • FCS:
    • FCS_RNG.1: 3
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_SDI.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.4: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_FLS.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 9
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • TTA:
    • TTA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
  • DES:
    • DES:
      • DES: 1
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 2
  • FI:
    • fault injection: 1
  • SCA:
    • side-channel: 2
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • BSI:
    • AIS 34: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 12
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#3: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Wei Yuan
  • /CreationDate: D:20160905104440Z00'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ugradert
  • /ModDate: D:20160905104440Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 1388306
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: 이은경
  • /CreationDate: D:20130704165125+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130704165125+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 648885
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename [STP-T] F03T-ASEP01-E01-70.pdf Samsung SDS_SPass NX V1.0_R3_ST Lite(En).pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2012/70: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035: 23
  • BSI:
    • BSI-PP-0035-2007: 3
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 7
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 1
    • EAL4: 6
    • EAL4 augmented: 1
    • EAL4+: 3
    • EAL5: 9
    • EAL5 augmented: 1
    • EAL5+: 7
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 4
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 6
  • ATE:
    • ATE_DPT.2: 6
    • ATE_FUN.1: 2
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.4: 6
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 4
    • ADV_IMP.1: 1
    • ADV_IMP.2: 17
    • ADV_INT.2: 4
    • ADV_TDS.3: 2
    • ADV_TDS.4: 4
  • AGD:
    • AGD_OPE.1: 3
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMC.5: 3
    • ALC_CMS.4: 1
    • ALC_CMS.5: 5
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 16
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
    • ALC_TAT.2: 6
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_DPT.2: 6
    • ATE_DPT.3: 5
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.4: 4
    • AVA_VAN.5: 18
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 3
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_RNG: 1
    • FCS_RNG.1: 4
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITT.1: 6
    • FDP_ITT.1.1: 1
    • FDP_SDI.2: 4
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
  • FIA:
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UID.1: 6
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM.1: 5
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 5
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 7
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 7
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT.2: 7
    • FRU_FLT.2.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FCS:
    • FCS_CKM.1: 38
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 19
    • FCS_CKM.2.1: 5
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 36
    • FCS_COP.1.1: 9
    • FCS_RNG: 3
    • FCS_RNG.1: 9
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_IFC.1: 7
    • FDP_ITC.1: 18
    • FDP_ITC.2: 18
    • FDP_ITT.1: 2
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_UCT.1: 5
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_UAU: 4
    • FIA_UAU.1: 28
    • FIA_UAU.1.1: 6
    • FIA_UAU.1.2: 6
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 2
    • FIA_UID: 2
    • FIA_UID.1: 22
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 3
  • FMT:
    • FMT_CKM.4: 3
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 3
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 17
    • FMT_MTD.1.1: 5
    • FMT_MTD.3: 5
    • FMT_MTD.3.1: 2
    • FMT_SMF.1: 20
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 4
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 1
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 6
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT.1: 2
    • FPT_PHP.3: 5
    • FPT_PHP.3.1: 1
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 4
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • O:
    • O.AC: 18
    • O.RND: 4
    • O.SC: 13
  • T:
    • T.RND: 3
  • O:
    • O.AA: 6
    • O.BAC: 2
    • O.EAC: 5
  • OE:
    • OE.PKI: 3
  • T:
    • T.EAC-CA: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 100
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • DES:
      • DES: 4
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 3
      • TDES: 8
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDH:
      • ECDH: 8
    • ECDSA:
      • ECDSA: 7
  • FF:
    • DH:
      • DH: 13
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • JH:
    • JH: 1
  • SHA:
    • SHA1:
      • SHA-1: 10
    • SHA2:
      • SHA-224: 4
      • SHA-256: 7
      • SHA-384: 5
      • SHA-512: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 47
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 7
    • RNG: 4
  • RNG:
    • RND: 1
  • TRNG:
    • TRNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • NSS:
    • NSS: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 10
    • malfunction: 3
  • SCA:
    • Leak-Inherent: 10
    • Physical Probing: 2
    • physical probing: 4
  • FI:
    • Malfunction: 4
    • malfunction: 7
  • SCA:
    • DPA: 4
    • SPA: 4
    • physical probing: 1
    • side channel: 1
  • other:
    • Reverse Engineering: 1
    • reverse engineering: 2
pdf_data/st_keywords/tee_name
  • IBM:
    • SSC: 13
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 6
    • EF.DG1: 2
    • EF.DG14: 1
    • EF.DG15: 1
    • EF.DG16: 2
    • EF.DG2: 2
    • EF.DG3: 2
    • EF.DG4: 2
    • EF.SOD: 3
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 4
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • ICAO:
    • ICAO: 22
  • ISO:
    • ISO/IEC 10118-3: 1
    • ISO/IEC 11770-2: 2
    • ISO/IEC 14443: 4
    • ISO/IEC 14443-4: 2
    • ISO/IEC 15946-2: 1
    • ISO/IEC 15946-3: 1
    • ISO/IEC 18033-3: 2
    • ISO/IEC 7816: 4
    • ISO/IEC 9796-2: 1
    • ISO/IEC 9797-1: 2
  • NIST:
    • NIST SP 800-38B: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#3: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • main processor of mobile phone. The ESE-IF, the CLF chip, the Host controller and the antenna are out of scope of the TOE. All components of the TOE including guidance manuals are listed in the following: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: FeliCa Networks, Inc
  • /ChipVendor: Toshiba
  • /Company: FeliCa Networks, Inc
  • /CreationDate: D:20160708165517+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 11
  • /DocName: Security Target for Mobile FeliCa OS 3.0 on T6NE1
  • /DocNumber: F03T-ASEP01-E01-70
  • /DocVersion: 1.70
  • /IssueDate: June 2016
  • /ModDate: D:20160708171515+09'00'
  • /ModelName: T6NE1
  • /Producer: Adobe PDF Library 11.0
  • /ProductName: Mobile FeliCa OS 3.0 on T6NE1
  • /ProductType: Mobile FeliCa IC Chip
  • /SourceModified: D:20160708065621
  • pdf_file_size_bytes: 365339
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 35
  • /Author: SmartCard
  • /CreationDate: D:20130607111344+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130607111344+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target
  • /Title: Single Evaluation Report
  • pdf_file_size_bytes: 1636355
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different