name |
System Software for e-STUDIO202L/232/282 V1.0 |
Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
01.09.2019 |
not_valid_before |
29.03.2006 |
27.06.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-42fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0043_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-42en.pdf |
manufacturer |
Toshiba TEC Corporation |
Trusted Logic / Infineon |
manufacturer_web |
https://www.toshibatec.co.jp/en/ |
https://www.trusted-logic.com/ |
security_level |
EAL3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
79cf3cf36c8217af |
ac1e7ac251e9255c |
heuristics/cert_id |
JISEC-CC-CRP-C0043 |
ANSSI-CC-2013/42 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
ALC_DVS.2, AVA_VAN.5 |
heuristics/extracted_versions |
1.0 |
46 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2015/25, BSI-DSZ-CC-0898-2014 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0829-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/25, BSI-DSZ-CC-0898-2014 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0043
- certification_date: 01.03.2006
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0043_eimg.pdf
- description: PRODUCT DESCRIPTION The TOE is the system software of the digital multi function device “ e-STUDIO202L/232/282 ” manufactured by TOSHIBA TEC CORPORATION. The system software provides general functions as a digital multifunction device as well as the function of data overwrite and complete deletion on the user document data deleted from the e-STUDIO202L/232/282 HDD. The function of data overwrite and complete deletion includes the function to collectively and completely delete all user document data from the HDD before the HDD is disposed or replaced. This function also prevents unauthorized restore of data.
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: System Software for e-STUDIO202L/232/282
- product_type: IT Product ( data protection function in Multi Function Device )
- report_link: https://www.ipa.go.jp/en/security/c0043_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0043_est.pdf
- toe_version: V1.0
- vendor: TOSHIBA TEC CORPORATION
- expiration_date: 01.01.2011
- supplier: TOSHIBA TEC CORPORATION
- toe_japan_name: System Software for e-STUDIO202L/232/282 V1.0
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0043_it5057.html
- toe_overseas_name: System Software for e-STUDIO 202L/232/282 V1.0
|
|
heuristics/st_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0898-2014 |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0898-2014 |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0043_erpt.pdf |
ANSSI-CC_2013-42fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 3
- cert_id: ANSSI-CC-2013/42
- cert_item: Plateforme jTOP INFv#46 masquée sur composants Infineon SLE78CLX1600PM, SLE78CLX800P et SLE78CLX360PM avec fonctionnalités MRTD
- cert_item_version: Version 46.03
- cert_lab: Serma Technologies 30 avenue Gustave Eiffel, 33608 Pessac, FRANCE
- developer: Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE Infineon Technologies AG AIM CC SM PS - Am Campeon 1-12 - 85579 Neubiberg, GERMANY Commanditaire Trusted Logic SAS 6, rue de la Verrerie, 92197 Meudon, FRANCE
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: JCSPP], version 3.0 Java CardTM System Open Configuration Protection Profile
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0043-01: 1
- Certification No. C0043: 1
|
- DE:
- FR:
- ANSSI-CC-2013/42: 19
- Rapport de certification 2013/42: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- T:
- T.STOREDATA_ACCESS: 1
- T.TEMPDATA_ACCESS: 1
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 23
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author:
- /CreationDate: D:20060515142139+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20060515142342+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title:
- pdf_file_size_bytes: 546561
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
- /CreationDate: D:20130731165216+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate: D:20130801102813+02'00'
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_file_size_bytes: 231283
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 19
|
pdf_data/st_filename |
c0043_est.pdf |
ANSSI-CC-cible_2013-42en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP-0017: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 2
- EAL5 augmented: 2
- EAL5+: 2
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 3
- ACM_SCP.1: 1
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 3
- AGD:
- AGD_ADM.1: 3
- AGD_USR.1: 1
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_FUN.1: 3
- ATE_IND.2: 1
- AVA:
- AVA_MSU.1: 3
- AVA_SOF.1: 2
- AVA_VLA.1: 3
|
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FDP_RIP.2: 8
- FPT:
- FPT_RVM.1: 12
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_ARP: 3
- FAU_ARP.1: 3
- FAU_SAS: 1
- FCO:
- FCO_NRO: 7
- FCO_NRO.2: 8
- FCO_NRR: 2
- FCO_NRR.1: 3
- FCS:
- FCS_CKM: 19
- FCS_CKM.1: 3
- FCS_CKM.2: 2
- FCS_CKM.3: 1
- FCS_CKM.4: 2
- FCS_COP: 30
- FCS_COP.1: 5
- FCS_RND: 4
- FCS_RND.1: 5
- FCS_RND.1.1: 1
- FCS_RNG: 1
- FCS_TST.1: 1
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 3
- FDP_ACC.2: 5
- FDP_ACF: 13
- FDP_ACF.1: 23
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_IFC: 6
- FDP_IFC.1: 1
- FDP_IFC.2: 2
- FDP_IFF: 5
- FDP_IFF.1: 16
- FDP_IFF.1.2: 1
- FDP_IFF.1.4: 1
- FDP_ITC: 5
- FDP_ITC.1: 3
- FDP_ITC.2: 9
- FDP_ITT: 1
- FDP_RIP: 23
- FDP_RIP.1: 9
- FDP_ROL: 6
- FDP_ROL.1: 7
- FDP_SDI: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UIT: 6
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 9
- FIA_AFL.1: 8
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UAU: 14
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.5: 2
- FIA_UAU.6: 1
- FIA_UID: 9
- FIA_UID.1: 4
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 9
- FMT_LIM.1: 9
- FMT_LIM.1.1: 2
- FMT_LIM.2: 8
- FMT_LIM.2.1: 2
- FMT_MSA: 40
- FMT_MSA.1: 10
- FMT_MSA.2: 3
- FMT_MSA.3: 14
- FMT_MTD: 9
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 11
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR: 15
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS: 14
- FPT_FLS.1: 5
- FPT_ITT: 1
- FPT_PHP: 1
- FPT_RCV: 10
- FPT_RCV.3: 18
- FPT_RCV.4: 1
- FPT_TDC: 2
- FPT_TDC.1: 4
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST: 4
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FRU_FLT: 1
- FRU_RSA: 2
- FRU_RSA.1: 1
- FTP:
|
pdf_data/st_keywords/cc_claims |
- O:
- O.STOREDATA_OVERWRITE: 4
- O.TEMPDATA_OVERWRITE: 6
- OE:
- OE.HDD_ERASE: 3
- OE.OVERWRITE_COMPLETE: 3
- T:
- T.STOREDATA_ACCESS: 3
- T.TEMPDATA_ACCESS: 4
|
- A:
- A.APPLET: 2
- A.CARD-MANAGEMENT: 1
- A.DELETION: 1
- A.NATIVE: 3
- A.VERIFICATION: 2
- D:
- D.API_DATA: 4
- D.APP-CODE: 3
- D.APP-INST: 2
- D.APP_CODE: 5
- D.APP_C_DATA: 4
- D.APP_I_DATA: 6
- D.COMMAND: 2
- D.CRYPTO: 5
- D.CVM: 2
- D.GP-REGISTRY: 2
- D.JCS_CODE: 5
- D.JCS_DATA: 6
- D.PIN: 5
- D.SD-PERSO: 2
- D.SD-SESSION-KEYS: 2
- D.SEC_DATA: 8
- D.SOFTWARE: 2
- O:
- O.ALARM: 2
- O.APPLET: 16
- O.CARD-: 1
- O.CARD-MANAGEMENT: 2
- O.CIPHER: 3
- O.CODE_PKG: 14
- O.CVM-BLOCK: 2
- O.DELETION: 2
- O.ERROR-COUNTERS: 2
- O.FIREWALL: 2
- O.GLOBAL-CVM: 2
- O.GLOBAL_ARRAYS_CONFID: 2
- O.GLOBAL_ARRAYS_INTEG: 2
- O.INFO-CONFIDENTIALITY: 2
- O.INFO-INTEGRITY: 3
- O.INFO-ORIGIN: 2
- O.INSTALL: 4
- O.JAVAOBJECT: 41
- O.KEY-MNGT: 3
- O.LIFE-CYCLE: 2
- O.LOAD: 4
- O.LOCK: 2
- O.NATIVE: 2
- O.NO-KEY-REUSE: 2
- O.OBJ-DELETION: 2
- O.OPERATE: 2
- O.OS-SUPPORT: 2
- O.PIN-MNGT: 3
- O.REALLOCATION: 2
- O.RECEIPT: 2
- O.RECOVERY: 2
- O.REQUEST: 2
- O.RESOURCES: 2
- O.RND: 1
- O.SID: 2
- O.TRANSACTION: 3
- O.VERIFICATION: 3
- OE:
- OE.APPLET: 2
- OE.BAC_PP: 2
- OE.CARD-MANAGEMENT: 2
- OE.CODE-EVIDENCE: 2
- OE.KEY-LENGTH: 2
- OE.MRTD_: 1
- OE.NATIVE: 2
- OE.NO-RMI-APPLETS: 2
- OE.SCP: 6
- OE.SECRETS: 2
- OE.VERIFICATION: 5
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 2
- OP.DELETE_PKG_APPLET: 1
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 6
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.BAC-PP: 2
- OSP.FILE-ORIGIN: 2
- OSP.KEY-LENGTH: 2
- OSP.NO-RMI-APPLETS: 2
- OSP.PERSONALIZATION: 2
- OSP.PROCESS-TOE: 1
- OSP.SECRETS: 3
- OSP.VERIFICATION: 2
- R:
- T:
- T.BRUTE-FORCE: 2
- T.CONFID-APPLI-DATA: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.CRYPTO: 2
- T.DELETION: 4
- T.EXE-CODE: 4
- T.FORCED-RESET: 2
- T.IMPERSONATE: 2
- T.INSTALL: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 4
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 2
- T.INVALID-INPUT: 2
- T.INVALID-ORDER: 2
- T.LIFE-CYCLE: 2
- T.MALFUNCTION: 1
- T.MEM_ACCESS: 1
- T.NATIVE: 2
- T.OBJ-DELETION: 2
- T.PHYSICAL: 2
- T.PHYS_MANIPULATION: 1
- T.PHYS_PROBING: 1
- T.RECEIPT: 2
- T.REPLAY: 2
- T.RESOURCES: 2
- T.RND: 1
- T.SID: 4
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- RSA:
- RSA 1536: 1
- RSA-CRT: 3
- RSA1024: 2
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 1
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Malfunction: 3
- Physical Tampering: 1
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 2
- SCA:
- DPA: 4
- Leak-Inherent: 1
- SPA: 2
- physical probing: 3
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 2
- EF.DG1: 2
- EF.DG14: 1
- EF.DG16: 2
- EF.DG2: 2
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 2
- EF.SOD: 2
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- FIPS:
- FIPS 180-2: 2
- FIPS 197: 2
- FIPS 46-2: 1
- FIPS 46-3: 2
- FIPS PUB 197: 2
- FIPS PUB 46-3: 6
- FIPS PUB 81: 1
- ICAO:
- ISO:
- ISO/IEC 15408:2005: 3
- ISO/IEC 15946-: 2
- ISO/IEC 15946-3: 3
- NIST:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework: 3
- javacard.internalservices: 1
- javacard.lds.filesystem: 1
- javacard.pace: 1
- javacard.security: 5
- javacardx:
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20060512044538Z
- /ModDate: D:20060731114807+09'00'
- /Producer: Acrobat Distiller 5.0 (Windows)
- /Subject: 2006/7/31 update
- pdf_file_size_bytes: 741778
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20130519162311+02'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20130801102846+02'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title:
- pdf_file_size_bytes: 3935958
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 162
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |