name |
Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point |
OKI Color Page Printer C8800 Security Module DS 01.00 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
28.03.2016 |
07.10.2013 |
not_valid_before |
28.03.2014 |
27.04.2007 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-vr.pdf |
https://www.commoncriteriaportal.org/files/epfiles/c0093_ecvr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10472-st.pdf |
https://www.commoncriteriaportal.org/files/epfiles/ |
manufacturer |
Motorola Solutions, Inc. |
OKI Data Corporation |
manufacturer_web |
https://www.motorolasolutions.com |
|
security_level |
EAL2+, ALC_FLR.2 |
EAL3 |
dgst |
778473e553d9d55f |
cba38ac094767037 |
heuristics/cert_id |
CCEVS-VR-VID-10472-2014 |
JISEC-CC-CRP-C0093 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1, ADV_SPM.1 |
{} |
heuristics/extracted_versions |
- |
01.00 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Wireless LAN
- certification_date: 28.03.2014
- evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
- expiration_date: 28.03.2016
- id: CCEVS-VR-VID10472
- product: Motorola Solutions RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- scheme: US
- url: https://www.niap-ccevs.org/product/10472
- vendor: Motorola Mobility LLC
|
- cert_id: JISEC-CC-CRP-C0093
- certification_date: 01.04.2007
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0093_eimg.pdf
- description: PRODUCT DESCRIPTION This TOE, which operates with a security kit installed in an OKI Color Page Printer C8800, properly uses the encipherment functionality of the kit to encipher and save data stored on an HDD in the printer for the data to be printed and managed, thereby preventing information from leaking via the HDD if the HDD is stolen and data is unauthorizedly read from it. The TOE is provided as firmware for the C8800 series of OKI Color Page Printers made by Oki Data Corporation and operates to provide security functions when an optional security kit type A1 is installed in the printer.
- evaluation_facility: Mizuho Information & Research Institute, Inc.Center for Evaluation of Information Security
- product: OKI Color Page Printer C8800 Security Module
- product_type: IT Product (data protection function in printer systems)
- toe_version: DS 01.00
- vendor: Oki Data Corporation
- expiration_date: 01.10.2013
- supplier: Oki Data Corporation
- toe_japan_name: OKI Color Page Printer C8800 Security Module DS 01.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0093_it6119.html
- toe_overseas_name: OKI Color Page Printer C8800 Security Module DS 01.00
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
st_vid10472-vr.pdf |
c0093_ecvr.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10472-2014
- cert_item: Motorola Solutions, Inc. RFS7000-GR Wireless LAN Switch and AP-7131N Wireless Access Point
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10472-2014: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NO_EVIL: 1
- A.NO_GENERAL_PURPOSE: 1
- A.PHYSICAL: 1
- A.TOE_NO_BYPASS: 1
- T:
- T.ACCIDENTAL_ADMIN_ERROR: 1
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 1
- T.MASQUERADE: 1
- T.POOR_DESIGN: 1
- T.POOR_IMPLEMENTATION: 1
- T.POOR_TEST: 1
- T.RESIDUAL_DATA: 1
- T.TSF_COMPROMISE: 1
- T.UNATTENDED_SESSION: 1
- T.UNAUTHORIZED_ACCESS: 1
- T.UNAUTH_ACCESS_POINT: 1
- T.UNAUTH_ADMIN_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: Steve Wilson
- /Company: InfoGard Laboratories
- /CreationDate: D:20140331160855-04'00'
- /Creator: Acrobat PDFMaker 10.1 for Word
- /Keywords:
- /ModDate: D:20140331160902-04'00'
- /Producer: Adobe PDF Library 10.0
- /SourceModified: D:20140331200839
- /Subject:
- /Title: D
- pdf_file_size_bytes: 166987
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
- /CreationDate: D:20070427213020+09'00'
- /ModDate: D:20070427213020+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 12873
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/st_filename |
st_vid10472-st.pdf |
|
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 6
- EAL1: 4
- EAL2: 8
- EAL2 augmented: 4
- EAL2+: 2
- EAL3: 4
- EAL5: 4
- EAL6: 2
- EAL7: 4
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 12
- ADV_FSP: 2
- ADV_FSP.1: 2
- ADV_FSP.2: 26
- ADV_IMP: 2
- ADV_INT: 2
- ADV_SPM: 4
- ADV_SPM.1: 4
- ADV_TDS: 2
- ADV_TDS.1: 20
- AGD:
- AGD_OPE: 4
- AGD_OPE.1: 18
- AGD_PRE: 2
- AGD_PRE.1: 16
- ALC:
- ALC_CMC: 2
- ALC_CMC.2: 8
- ALC_CMS: 2
- ALC_CMS.2: 8
- ALC_DEL: 2
- ALC_DEL.1: 8
- ALC_DVS: 2
- ALC_FLR: 2
- ALC_FLR.2: 18
- ALC_TAT: 2
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 2
- ASE_ECD: 2
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 2
- ASE_OBJ: 2
- ASE_OBJ.2: 2
- ASE_REQ: 2
- ASE_REQ.2: 2
- ASE_SPD: 2
- ASE_SPD.1: 2
- ASE_TSS: 2
- ASE_TSS.1: 2
- ATE:
- ATE_COV: 2
- ATE_COV.1: 14
- ATE_COV.2: 2
- ATE_DPT: 2
- ATE_FUN: 2
- ATE_FUN.1: 12
- ATE_IND: 2
- ATE_IND.2: 6
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 36
- FAU_GEN.1: 22
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FAU_GEN.2: 16
- FAU_GEN.2.1: 2
- FAU_SEL.1: 16
- FAU_SEL.1.1: 2
- FAU_UAU.1: 2
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 68
- FCS_CKM.1.1: 7
- FCS_CKM.2: 18
- FCS_CKM.2.1: 9
- FCS_CKM.4: 52
- FCS_CKM.4.1: 2
- FCS_CKM_EXT.2: 2
- FCS_COP: 6
- FCS_COP.1: 81
- FCS_COP.1.1: 37
- FCS_PEAP_EXT: 5
- FCS_PEAP_EXT.1: 28
- FCS_PEAP_EXT.1.1: 2
- FCS_PEAP_EXT.1.2: 4
- FCS_PEAP_EXT.1.3: 4
- FCS_PEAP_EXT.1.4: 4
- FCS_RAD_EXT: 5
- FCS_RAD_EXT.1: 28
- FCS_RAD_EXT.1.1: 4
- FCS_RAD_EXT.1.2: 4
- FCS_RAD_EXT.1.3: 4
- FCS_SFTP_EXT: 4
- FCS_SFTP_EXT.1: 30
- FCS_SFTP_EXT.1.1: 2
- FCS_SFTP_EXT.1.2: 4
- FCS_SSH_EXT: 4
- FCS_SSH_EXT.1: 39
- FCS_SSH_EXT.1.1: 4
- FCS_SSH_EXT.1.2: 4
- FCS_SSH_EXT.1.3: 4
- FCS_SSH_EXT.1.4: 4
- FCS_SSH_EXT.1.5: 4
- FCS_SSH_EXT.1.6: 4
- FCS_SSH_EXT.1.7: 4
- FCS_SSH_EXT.1.8: 4
- FCS_SSH_EXT.1.9: 4
- FCS_TLS_EXT: 4
- FCS_TLS_EXT.1: 61
- FCS_TLS_EXT.1.1: 4
- FCS_TTLS_EXT.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 4
- FDP_IFC.1: 48
- FDP_IFC.1.1: 5
- FDP_IFF: 43
- FDP_IFF.1: 44
- FDP_ITC.1: 18
- FDP_ITC.2: 14
- FDP_PUD: 2
- FDP_RIP: 4
- FDP_RIP.1: 18
- FDP_RIP.1.1: 2
- FIA:
- FIA_AFL: 4
- FIA_AFL.1: 16
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD: 4
- FIA_ATD.1: 29
- FIA_ATD.1.1: 5
- FIA_UAU: 12
- FIA_UAU.1: 38
- FIA_UAU.1.1: 6
- FIA_UAU.1.2: 4
- FIA_UAU.4: 7
- FIA_UAU.4.1: 1
- FIA_UAU.5: 1
- FIA_UAU.5.1: 1
- FIA_UID: 4
- FIA_UID.1: 8
- FIA_UID.2: 21
- FIA_UID.2.1: 2
- FIA_USB: 4
- FIA_USB.1: 16
- FIA_USB.1.1: 2
- FIA_USB.1.2: 2
- FIA_USB.1.3: 2
- FMT:
- FMT_MOF: 4
- FMT_MOF.1: 93
- FMT_MOF.1.1: 12
- FMT_MSA: 5
- FMT_MSA.1: 19
- FMT_MSA.1.1: 1
- FMT_MSA.2: 58
- FMT_MSA.2.1: 2
- FMT_MSA.3: 49
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD: 4
- FMT_MTD.1: 40
- FMT_MTD.1.1: 5
- FMT_REV.1: 1
- FMT_SMF: 4
- FMT_SMF.1: 105
- FMT_SMF.1.1: 12
- FMT_SMR: 4
- FMT_SMR.1: 43
- FMT_SMR.1.1: 2
- FMT_SMR.1.2: 2
- FPT:
- FPT_ITC_EXT.1: 2
- FPT_ITC_EXT.1.1: 2
- FPT_ITC_EXT.1.2: 2
- FPT_ITC_EXT.1.3: 2
- FPT_ITT: 2
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM: 4
- FPT_STM.1: 2
- FPT_STM_EXT.1: 4
- FPT_STM_EXT.1.1: 4
- FPT_TST: 4
- FPT_TST.1: 32
- FPT_TST.1.1: 4
- FPT_TST.1.2: 4
- FPT_TST.1.3: 4
- FPT_TST.2: 2
- FPT_TST_EXT: 8
- FPT_TST_EXT.1: 22
- FPT_TST_EXT.1.1: 4
- FPT_TST_EXT.1.2: 4
- FTA:
- FTA_SSL: 4
- FTA_SSL.3: 14
- FTA_SSL.3.1: 4
- FTA_TAB: 4
- FTA_TAB.1: 14
- FTA_TAB.1.1: 2
- FTA_TSE: 2
- FTA_TSE.1: 8
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC: 4
- FTP_ITC.1: 2
- FTP_ITC_EXT: 4
- FTP_ITC_EXT.1: 23
- FTP_ITC_EXT.1.1: 2
- FTP_ITC_EXT.1.2: 2
- FTP_ITC_EXT.1.3: 2
- FTP_TRP: 2
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NO_EVIL: 6
- A.NO_GENERAL_PURPOSE: 2
- A.PHYSICAL: 4
- A.TOE_NO_BYPASS: 3
- O:
- O.ADMIN_GUIDANCE: 14
- O.AUDIT_GENERATION: 8
- O.CONFIGURATION_: 3
- O.CONFIGURATION_DENTIFICATION: 6
- O.CONFIGURATION_IDENTIFICATION: 6
- O.CORRECT_: 1
- O.CORRECT_TSF_OPERATION: 7
- O.CRYPTOGRAPHY: 14
- O.CRYPTOGRAPHY_VALIDATED: 8
- O.DISPLAY_BANNER: 14
- O.DOCUMENTED_: 3
- O.DOCUMENTED_DESIGN: 8
- O.MANAGE: 20
- O.MEDIATE: 12
- O.PARTIAL_FUNCTIONAL_TESTING: 16
- O.RESIDUAL_: 1
- O.RESIDUAL_INFORMATION: 9
- O.ROGUE_AP_DETECTION: 14
- O.SELF_PROTECTION: 19
- O.TIME_STAMPS: 8
- O.TOE_ACCESS: 14
- O.VULNERABILITY_: 3
- O.VULNERABILITY_ANALYSIS: 5
- OE:
- OE.AUDIT_PROTECTION: 6
- OE.AUDIT_REVIEW: 6
- OE.MANAGE: 10
- OE.NO_EVIL: 8
- OE.NO_GENERAL_PURPOSE: 6
- OE.PHYSICAL: 6
- OE.PROTECT_MGMT_COMMS: 6
- OE.RESIDUAL_INFORMATION: 6
- OE.SELF_PROTECTION: 9
- OE.TIME_STAMPS: 6
- OE.TOE_ACCESS: 8
- OE.TOE_NO_BYPASS: 6
- OSP:
- T:
- T.ACCIDENTAL_: 2
- T.ACCIDENTAL_ADMIN_: 7
- T.ACCIDENTAL_ADMIN_ERROR: 7
- T.ACCIDENTAL_CRYPTO_COMPROMISE: 9
- T.MASQUERADE: 12
- T.POOR_DESIGN: 6
- T.POOR_IMPLEMENTATION: 6
- T.POOR_TEST: 4
- T.RESIDUAL_DATA: 8
- T.TSF_COMPROMISE: 14
- T.UNATTENDED_: 3
- T.UNATTENDED_SESSION: 3
- T.UNAUTHORIZED_: 2
- T.UNAUTHORIZED_ACCESS: 9
- T.UNAUTH_ACCESS_POINT: 2
- T.UNAUTH_ADMIN_ACCESS: 14
- T.UNAUTH_AP: 2
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES: 17
- AES-: 2
- AES-128: 6
- AES-192: 6
- AES-256: 6
- AES128: 1
- DES:
- 3DES:
- TDEA: 4
- TDES: 1
- Triple-DES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- HMAC: 2
- HMAC-SHA-256: 2
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
- KA:
- Key Agreement: 2
- Key agreement: 2
- KEX:
- MAC:
|
|
pdf_data/st_keywords/crypto_protocol |
- IKE:
- IKE: 17
- IKEv1: 30
- IKEv2: 6
- IPsec:
- SSH:
- TLS:
- TLS:
- TLS: 96
- TLS 1.0: 14
- TLS 1.1: 2
- TLS 1.2: 2
- TLS v1.1: 6
- TLS v1.2: 6
- TLS1.0: 2
- TLSv1.0: 8
- VPN:
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA: 2
- TLS_DHE_RSA_WITH_AES_128_CBC_SHA: 10
- TLS_DHE_RSA_WITH_AES_256_CBC_SHA: 10
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 2
- TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
- TLS_RSA_WITH_3DES_EDE_CBC_SHA: 4
- TLS_RSA_WITH_AES_128_CBC_SHA: 13
- TLS_RSA_WITH_AES_128_CBC_SHA256: 2
- TLS_RSA_WITH_AES_256_CBC_SHA: 12
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- FIPS:
- FIPS 140-2: 16
- FIPS 186-2: 2
- FIPS 197: 2
- FIPS 46-3: 2
- FIPS 81: 2
- FIPS PUB 140-2: 4
- FIPS PUB 186-2: 2
- NIST:
- RFC:
- RFC 2346: 4
- RFC 2409: 2
- RFC 2818: 4
- RFC 3146: 1
- RFC 3164: 2
- RFC 3280: 2
- RFC 3602: 2
- RFC 4106: 4
- RFC 4109: 6
- RFC 4252: 8
- RFC 4253: 9
- RFC 4303: 4
- RFC 4346: 2
- RFC 4868: 2
- RFC 4869: 2
- RFC 5216: 5
- RFC 5246: 2
- RFC 5281: 6
- RFC 792: 2
- RFC3164: 1
- RFC3280: 4
- RFC4346: 2
- X509:
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: CRD003
- /CreationDate: D:20140331105449+05'00'
- /Creator: PrimoPDF http://www.primopdf.com
- /ModDate: D:20140331162840-04'00'
- /Producer: Nitro PDF PrimoPDF
- /Title: Microsoft Word - Motorola_RFS7000_-AP7131_Security_Target_v1.51.docx
- pdf_file_size_bytes: 2408502
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 253
|
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
True |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
False |
state/st/download_ok |
True |
False |
state/st/extract_ok |
True |
False |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |