| name |
POLYAS CORE Version 2.5.0 |
NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1 |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
DE |
NL |
| status |
active |
active |
| not_valid_after |
24.06.2026 |
14.12.2028 |
| not_valid_before |
25.06.2021 |
14.12.2023 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0862V2c_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300099-01.1-Cert.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0862V2a_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300099-01-CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0862V2b_pdf.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-2300099-01-ST_Lite_v1.1.pdf |
| manufacturer |
POLYAS GmbH |
NXP Semiconductors Germany GmbH |
| manufacturer_web |
https://www.polyas.de |
https://www.nxp.com |
| security_level |
ALC_DVS.1, ALC_CMC.3, ALC_CMS.3, EAL2+, ALC_LCD.1 |
EAL5+, ALC_FLR.1, ALC_DVS.2, AVA_VAN.5, ASE_TSS.2 |
| dgst |
8916d91243168c04 |
1d3c37e7f9e89f82 |
| heuristics/cert_id |
BSI-DSZ-CC-0862-V2-2021 |
NSCIB-CC-2300099-01-CR |
| heuristics/cert_lab |
BSI |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_FSP.2, ALC_CMS.3, ALC_DVS.1, AGD_PRE.1, ASE_TSS.1, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2 |
ALC_DEL.1, ATE_FUN.1, AVA_VAN.5, ASE_INT.1, AGD_OPE.1, ASE_CCL.1, ADV_TDS.4, ALC_CMS.5, ADV_ARC.1, ATE_COV.2, ADV_FSP.5, ASE_TSS.2, ALC_FLR.1, ASE_SPD.1, ALC_TAT.2, ALC_CMC.4, ATE_DPT.1, ASE_ECD.1, AGD_PRE.1, ADV_IMP.1, ALC_DVS.2, ASE_REQ.2, ADV_INT.2, ALC_LCD.1, ASE_OBJ.2 |
| heuristics/extracted_versions |
2.5.0 |
1.06.00.1.1, 8.9 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
NSCIB-CC-2400083-01-CR |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-0862-2016 |
NSCIB-CC-2300083-01-CR |
| heuristics/report_references/indirectly_referenced_by |
{} |
NSCIB-CC-2400083-01-CR |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-0862-2016 |
NSCIB-CC-2300083-01-CR |
| heuristics/scheme_data |
- category: Other products
- cert_id: BSI-DSZ-CC-0862-V2-2021
- certification_date: 25.06.2021
- enhanced:
- applicant: POLYAS GmbH Marie-Calm-Straße 1-5 34131 Kassel
- assurance_level: EAL2,ALC_LCD.1,ALC_DVS.1,ALC_CMS.3,ALC_CMC.3
- certification_date: 25.06.2021
- description: The Target of Evaluation (TOE) is the product for conducting online elections (in short: online voting product) POLYAS CORE Version 2.2.3. Corresponding to the security requirements from the claimed Protection Profile BSI-CC-PP-0037, POLYAS CORE V2.2.3 is sufficient to securely implement elections in associations, for boards and bodies such as at universities, within the scope of education and research, and in particular other non-political elections with low attack potential. The functional and security features of the TOE relate only to the polling phase incl. tallying, but not to the election preparation (such as drawing up the electoral register, for example) or to the archiving of the polling and result data. A client-sided TOE at the endpoint device does not exist. The complete range of functions is provided by the server-sided TOE.
- entries: [frozendict({'id': 'BSI-DSZ-CC-0862-V2-2021-MA-02 (Ausstellungsdatum / Certification Date 11.03.2022)', 'description': 'security functionality is unchanged. Configuration management procedures require a change of the product version from version 2.5.3 to version 2.5.4.'}), frozendict({'id': 'BSI-DSZ-CC-0862-V2-2021-MA-01 (Ausstellungsdatum / Certification Date 24.11.2021)', 'description': 'Security Target'}), frozendict({'id': 'BSI-DSZ-CC-0862-V2-2021 (Ausstellungsdatum / Certification Date 25.06.2021, gültig bis / valid until 24.06.2026) Zertifizierungsreport / Certification Report', 'description': 'This re-certification was conducted, because the validity of the previous certificate expired and to include minor product changes in the certified scope.'}), frozendict({'id': 'BSI-DSZ-CC-0862-2016 (Ausstellungsdatum / Certification Date 10.03.2016, gültig bis / valid until 09.03.2021)', 'description': 'Security Target'})]
- evaluation_facility: Deutsches Forschungszentrum für Künstliche Intelligenz GmbH
- expiration_date: 24.06.2026
- product: POLYAS CORE Version 2.5.0
- protection_profile: Common Criteria Schutzprofil für Basissatz von Sicherheitsanforderungen an Online-Wahlprodukte, Version 1.0, 18. April 2008, BSI-CC-PP-0037-2008
- product: POLYAS CORE Version 2.5.0
- url: https://www.bsi.bund.de/SharedDocs/Zertifikate_CC/CC/Sonstiges/0862_0862V2.html
- vendor: POLYAS GmbH
|
|
| heuristics/st_references/directly_referenced_by |
{} |
NSCIB-CC-2400083-01-CR |
| heuristics/st_references/directly_referencing |
{} |
NSCIB-CC-2300083-01-CR |
| heuristics/st_references/indirectly_referenced_by |
{} |
NSCIB-CC-2400083-01-CR |
| heuristics/st_references/indirectly_referencing |
{} |
NSCIB-CC-2300083-01-CR |
| heuristics/protection_profiles |
fc76773839dc79d0 |
7f886b64878b68c1, 1153ad24c84b397a |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0037b.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0104b_pdf.pdf |
| pdf_data/cert_filename |
0862V2c_pdf.pdf |
NSCIB-CC-2300099-01.1-Cert.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0862-V2-2021: 1
|
- NL:
- NSCIB-2300099-01: 1
- NSCIB-CC-2300099-01: 1
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 1
- BSI-CC-PP-0104: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL2: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
|
| pdf_data/cert_keywords/cc_sar |
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.3: 1
- ASE:
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
- NXP:
- NXP: 1
- NXP Semiconductors: 1
|
| pdf_data/cert_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 1
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
- ISO:
- ISO/IEC 15408-1: 2
- ISO/IEC 18045: 4
- ISO/IEC 18045:2008: 1
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
0862V2a_pdf.pdf |
NSCIB-CC-2300099-01-CR.pdf |
| pdf_data/report_frontpage |
- DE:
- cert_id: BSI-DSZ-CC-0862-V2-2021
- cert_item: POLYAS Core, Version 2.5.0
- cert_lab: BSI
- developer: POLYAS GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) zu (.+?) der (.*)']
- NL:
|
- DE:
- NL:
- cert_id: NSCIB-CC-2300099-01-CR
- cert_item: NXP JCOP 8.9 on SN300 Secure Element JCOP-eSE 8.9 R1.06.00.1.1
- cert_lab: TÜV Informationstechnik GmbH
- developer: NXP Semiconductors Germany GmbH
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-0862-: 1
- BSI-DSZ-CC-0862-2016: 2
- BSI-DSZ-CC-0862-V2-2021: 15
|
- NL:
- NSCIB-2300083-01: 1
- NSCIB-2300083-01-CR: 1
- NSCIB-2300099-01: 3
- NSCIB-CC-2300099-01-CR: 13
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0037: 2
- BSI-CC-PP-0037-2008: 2
|
- BSI:
- BSI-CC-PP-0099-V2-2020: 1
- BSI-CC-PP-0104: 1
|
| pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 1: 1
- EAL 2: 6
- EAL 2+: 1
- EAL 4: 1
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 1
- EAL5 augmented: 1
- EAL5+: 1
|
| pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMC.3: 4
- ALC_CMS.3: 4
- ALC_DVS.1: 4
- ALC_FLR: 2
- ALC_LCD.1: 4
|
- ALC:
- ALC_DVS.2: 2
- ALC_FLR.1: 2
- ASE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_SAR.1: 2
- FDP:
- FDP_DAU.1: 2
- FDP_IFC: 4
- FDP_IFF: 4
- FDP_IFF.5: 3
- FDP_RIP: 4
- FDP_SDI.2: 2
- FDP_UCT: 4
- FDP_UIT: 4
- FIA:
- FIA_ATD.1: 2
- FIA_UAU: 2
- FIA_UAU.6: 1
- FIA_UID: 2
- FIA_USB: 3
- FMT:
- FPR:
- FPT:
- FPT_ITT.1: 2
- FPT_RCV.1: 2
- FPT_RCV.4: 2
- FPT_TST.1: 2
- FTA:
- FTA_SSL: 1
- FTA_SSL.3: 1
- FTA_SSL.4: 1
- FTA_TSE.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
- NXP:
- NXP: 20
- NXP Semiconductors: 4
|
| pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
- SHA3:
- SHA3-224: 1
- SHA3-256: 1
- SHA3-384: 1
- SHA3-512: 1
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- BSI:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
|
| pdf_data/report_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- out of scope: 1
- proprietary or non-standard algorithms, protocols and implementations: MIFARE and FeliCa, which are out of scope as there are no security claims relating to these. Not all key sizes specified in the [ST] have: 1
|
| pdf_data/report_metadata |
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20210630094656+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, Certification, Zertifizierung, Online-Wahlen, Polyas
- /ModDate: D:20210630095708+02'00'
- /Producer: LibreOffice 6.3
- /Subject: Common Criteria Zertifizierung, POLYAS Core, Version 2.5.0
- /Title: Zertifizierungsreport BSI-DSZ-CC-0862-V2
- pdf_file_size_bytes: 683057
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.commoncriteriaportal.org/cc/, https://www.bsi.bund.de/AIS, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 31
|
|
| pdf_data/st_filename |
0862V2b_pdf.pdf |
NSCIB-CC-2300099-01-ST_Lite_v1.1.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- NL:
- NSCIB-2300083-01: 1
- NSCIB-2300099-01: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V2-2020: 2
- BSI-CC-PP-0104: 3
- BSI-PP-0055: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 2: 4
- EAL 3: 1
- EAL2: 1
- EAL3: 1
|
- EAL:
- EAL4: 2
- EAL5: 14
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMC.3: 2
- ALC_CMS.2: 1
- ALC_CMS.3: 2
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_LCD.1: 2
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 4
- ADV_FSP.1: 1
- ADV_FSP.2: 4
- ADV_FSP.4: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 5
- ADV_INT.2: 1
- ADV_TDS.1: 6
- ADV_TDS.3: 4
- ADV_TDS.4: 2
- AGD:
- AGD_OPE.1: 5
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.4: 2
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 2
- ALC_DVS.2: 5
- ALC_FLR.1: 8
- ALC_LCD.1: 3
- ALC_TAT.1: 6
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 2
- ASE_INT: 2
- ASE_INT.1: 3
- ASE_OBJ.2: 2
- ASE_REQ: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.2: 7
- ATE:
- ATE_COV.1: 3
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 6
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FDP:
- FDP_ACC.1: 8
- FDP_DAU.1: 6
- FDP_DAU.1.1: 1
- FDP_DAU.1.2: 1
- FDP_IFC: 28
- FDP_IFC.1: 12
- FDP_IFF: 42
- FDP_IFF.1: 3
- FDP_IFF.4: 1
- FDP_IFF.5: 8
- FDP_IFF.5.1: 1
- FDP_RIP: 11
- FDP_RIP.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 16
- FDP_UIT: 16
- FIA:
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FIA_USB: 17
- FMT:
- FMT_MSA.3: 3
- FMT_SMR.1: 1
- FMT_SMR.2: 9
- FPR:
- FPR_ANO.1: 6
- FPR_ANO.1.1: 1
- FPR_UNL: 10
- FPR_UNL.1: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_RCV.1: 6
- FPT_RCV.1.1: 1
- FPT_RCV.4: 6
- FPT_RCV.4.1: 1
- FPT_SSL.3: 1
- FPT_SSL.4: 1
- FPT_STM.1: 2
- FPT_TST.1: 5
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTA:
- FTA_SSL.3: 5
- FTA_SSL.3.1: 1
- FTA_SSL.4: 7
- FTA_SSL.4.1: 1
- FTA_TSE.1: 6
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_TRP: 29
- FTP_TRP.1: 8
|
- FAU:
- FAU_ARP.1: 14
- FAU_ARP.1.1: 1
- FAU_GEN: 2
- FAU_SAA.1: 3
- FAU_SAS: 4
- FAU_SAS.1: 8
- FAU_SAS.1.1: 2
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 1
- FCO_NRO.2: 6
- FCO_NRO.2.1: 2
- FCO_NRO.2.2: 1
- FCO_NRO.2.3: 2
- FCS:
- FCS_CKM: 10
- FCS_CKM.1: 24
- FCS_CKM.1.1: 12
- FCS_CKM.2: 6
- FCS_CKM.2.1: 1
- FCS_CKM.3: 4
- FCS_CKM.3.1: 1
- FCS_CKM.4: 13
- FCS_CKM.4.1: 1
- FCS_CKM.5: 7
- FCS_CKM.5.1: 5
- FCS_COP: 12
- FCS_COP.1: 30
- FCS_COP.1.1: 33
- FCS_RNG: 1
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FCS_RNG.2: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 54
- FDP_ACC.1.1: 4
- FDP_ACC.2: 16
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 4
- FDP_ACF: 2
- FDP_ACF.1: 32
- FDP_ACF.1.1: 7
- FDP_ACF.1.2: 8
- FDP_ACF.1.3: 7
- FDP_ACF.1.4: 9
- FDP_DAU.2: 2
- FDP_DAU.2.1: 2
- FDP_ETC.2: 1
- FDP_IFC: 2
- FDP_IFC.1: 46
- FDP_IFC.1.1: 1
- FDP_IFC.2: 24
- FDP_IFC.2.1: 3
- FDP_IFC.2.2: 3
- FDP_IFF: 2
- FDP_IFF.1: 37
- FDP_IFF.1.1: 4
- FDP_IFF.1.2: 5
- FDP_IFF.1.3: 5
- FDP_IFF.1.4: 5
- FDP_IFF.1.5: 5
- FDP_ITC: 2
- FDP_ITC.1: 8
- FDP_ITC.2: 18
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FDP_RIP: 1
- FDP_RIP.1: 56
- FDP_RIP.1.1: 9
- FDP_ROL.1: 10
- FDP_ROL.1.1: 2
- FDP_ROL.1.2: 3
- FDP_SDC: 1
- FDP_SDC.1: 2
- FDP_SDC.1.1: 1
- FDP_SDI.1: 2
- FDP_SDI.2: 6
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UIT: 1
- FDP_UIT.1: 4
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 10
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_API: 3
- FIA_API.1: 2
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_UAU.1: 21
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 3
- FIA_UAU.4: 9
- FIA_UAU.4.1: 2
- FIA_UAU.5: 2
- FIA_UAU.5.1: 2
- FIA_UAU.5.2: 1
- FIA_UAU.6: 2
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 63
- FIA_UID.1.1: 6
- FIA_UID.1.2: 5
- FIA_UID.2: 3
- FIA_UID.2.1: 1
- FIA_USB.1: 5
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 7
- FMT_MSA.1: 73
- FMT_MSA.1.1: 10
- FMT_MSA.2: 4
- FMT_MSA.2.1: 3
- FMT_MSA.3: 67
- FMT_MSA.3.1: 11
- FMT_MSA.3.2: 11
- FMT_MTD.1: 9
- FMT_MTD.1.1: 4
- FMT_MTD.3: 7
- FMT_MTD.3.1: 1
- FMT_REV: 1
- FMT_SAE: 1
- FMT_SAE.1: 1
- FMT_SAE.1.1: 1
- FMT_SMF: 3
- FMT_SMF.1: 73
- FMT_SMF.1.1: 9
- FMT_SMR: 2
- FMT_SMR.1: 92
- FMT_SMR.1.1: 8
- FMT_SMR.1.2: 7
- FPR:
- FPR_UNO.1: 7
- FPR_UNO.1.1: 1
- FPT:
- FPT_ESA: 1
- FPT_ESA.1: 1
- FPT_ESA.1.4: 1
- FPT_FLS.1: 32
- FPT_FLS.1.1: 7
- FPT_ISA: 1
- FPT_ISA.1: 2
- FPT_ISA.1.5: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FPT_RCV.2: 1
- FPT_RCV.3: 2
- FPT_RCV.3.1: 2
- FPT_RCV.3.2: 2
- FPT_RCV.3.3: 2
- FPT_RCV.3.4: 1
- FPT_TCT: 1
- FPT_TCT.1: 1
- FPT_TDC: 1
- FPT_TDC.1: 7
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TIT: 1
- FPT_TIT.1: 1
- FPT_TST.1: 2
- FPT_TST.1.1: 1
- FRU:
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 17
- FTP_ITC.1.1: 2
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TST.1: 1
|
| pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPS-: 1
- A.APPS-PROVIDER: 4
- A.CAP_FILE: 3
- A.DELETION: 1
- A.PROCESS-SEC-IC: 4
- A.TRUSTED-GUESTO: 1
- A.TRUSTED-GUESTOS: 3
- A.USE_DIAG: 5
- A.USE_KEYS: 5
- A.VERIFICATION: 2
- A.VERIFICATION-AU: 1
- A.VERIFICATION-AUTHORITY: 4
- D:
- D.API_DATA: 3
- D.APP_: 1
- D.APP_CODE: 6
- D.APP_C_: 1
- D.APP_C_DATA: 4
- D.APP_I_DATA: 7
- D.APP_KEYS: 9
- D.APSD_KEYS: 5
- D.CARD_: 1
- D.CARD_MNGT_: 1
- D.CARD_MNGT_DATA: 1
- D.CONFIG_ITEM: 7
- D.CRYPTO: 6
- D.ISD_KEYS: 4
- D.JCS_: 1
- D.JCS_CODE: 7
- D.JCS_DATA: 8
- D.PIN: 10
- D.RESTRICTED_: 1
- D.RESTRICTED_MODE_STATE: 1
- D.SEC_DATA: 6
- D.TOE_IDENTIFICATION: 2
- D.TOE_IDENTIFIER: 3
- D.UPDATE_IMAGE: 26
- D.VASD_KEYS: 3
- O:
- O.APPLET: 15
- O.APPLET_CURRENT: 2
- O.APPLET_LOADED: 2
- O.BIO-MNGT: 1
- O.CODE_CAP_: 2
- O.CODE_CAP_FILE: 11
- O.DELETION: 3
- O.EXT-MEM: 1
- O.INSTALL: 2
- O.JAVAOBJECT: 67
- O.LOAD: 3
- O.REMOTE: 1
- O.SENSITIVE_ARRAYS_INTEG: 1
- O.SENSITIVE_RESULTS_INTEG: 1
- OE:
- OE.APPS-PROVIDER: 4
- OE.CAP_FILE: 5
- OE.CARD-: 2
- OE.CARD-MANAGEMENT: 1
- OE.CODE-EVIDENCE: 13
- OE.CONFID-UPDATE-: 2
- OE.CONFID-UPDATE-IMAGE: 2
- OE.KEY-CHANGE: 5
- OE.PROCESS_SEC_: 2
- OE.PROCESS_SEC_IC: 2
- OE.SCP: 12
- OE.SECURITY-: 1
- OE.SECURITY-DOMA: 2
- OE.SECURITY-DOMAINS: 1
- OE.TRUSTED-GUES: 1
- OE.TRUSTED-GUEST: 1
- OE.TRUSTED-GUESTOS: 2
- OE.USE_DIAG: 5
- OE.USE_KEYS: 5
- OE.VERIFICATION: 17
- OE.VERIFICATION-A: 2
- OE.VERIFICATION-AUTHORITY: 2
- OP:
- OP.ARRAY_: 1
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 3
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 2
- OP.CONT_ACCESS: 7
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_: 2
- OP.DELETE_CAP_FILE: 2
- OP.DELETE_CAP_FILE_APPLET: 2
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.MODIFY_: 1
- OP.PUT: 6
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.READ_CONFIG_: 1
- OP.THROW: 5
- OP.TRIGGER_: 1
- OP.TRIGGER_UPDATE: 3
- OP.TYPE_ACCESS: 5
- OP.USE_CONFIG_: 1
- OSP:
- OSP.KEY-CHANGE: 4
- OSP.PROCESS-TOE: 4
- OSP.SECURITY-DOM: 1
- OSP.SECURITY-DOMAINS: 3
- OSP.VERIFICATION: 2
- OT:
- OT.ALARM: 14
- OT.APPLI-AUTH: 8
- OT.ARRAY_VIEWS_: 4
- OT.ARRAY_VIEWS_CONFID: 1
- OT.ARRAY_VIEWS_INTEG: 1
- OT.ATTACK-COUNT: 1
- OT.ATTACK-COUNTE: 1
- OT.ATTACK-COUNTER: 3
- OT.AUTH-LOAD-UPD: 2
- OT.AUTH-LOAD-UPDATE-IMAGE: 3
- OT.CARD-: 3
- OT.CARD-CONFIGUR: 2
- OT.CARD-CONFIGURATION: 3
- OT.CARD-MANAGEM: 16
- OT.CARD-MANAGEMENT: 3
- OT.CIPHER: 4
- OT.COMM_: 5
- OT.COMM_AUTH: 6
- OT.COMM_CONFIDENTIALITY: 3
- OT.COMM_INTEGRITY: 3
- OT.CONFID-UPDATE-: 2
- OT.CONFID-UPDATE-IMAGE: 3
- OT.CONT-DOS: 1
- OT.CONT-PRIV: 1
- OT.CONT-SEP: 1
- OT.CONT_DOS: 4
- OT.CONT_PRIV: 6
- OT.CONT_SEP: 8
- OT.DELETION: 1
- OT.DOMAIN-RIGHTS: 7
- OT.FIREWALL: 10
- OT.GLOBAL_: 6
- OT.GLOBAL_ARRAYS_CONFID: 1
- OT.GLOBAL_ARRAYS_INTEG: 1
- OT.IDENTIFICATION: 5
- OT.INSTALL: 1
- OT.KEY-MNGT: 4
- OT.LOAD: 1
- OT.NATIVE: 6
- OT.OBJ-DELETION: 3
- OT.OPERATE: 20
- OT.PIN-MNGT: 4
- OT.REALLOCATION: 4
- OT.RESOURCES: 5
- OT.RESTRICTED-MO: 3
- OT.RESTRICTED-MODE: 3
- OT.RND: 5
- OT.SCP: 34
- OT.SECURE_AC_: 2
- OT.SECURE_AC_ACTIVATION: 3
- OT.SECURE_LOAD_: 4
- OT.SECURE_LOAD_ACODE: 3
- OT.SENSITIVE_: 2
- OT.SENSITIVE_RESULTS_INTEG: 3
- OT.SID: 8
- OT.TOE_: 2
- OT.TOE_IDENTIFICATION: 3
- OT.TRANSACTION: 4
- R:
- SA:
- SA.ALARM: 2
- SA.CARD-MANAGEM: 1
- SA.CIPHER: 2
- SA.CONFID-APPLI-D: 1
- SA.CONFID-APPLI-DATA: 1
- SA.CONFID-JCS-CO: 1
- SA.CONFID-JCS-CODE: 1
- SA.CONFID-JCS-DAT: 1
- SA.CONFID-JCS-DATA: 1
- SA.CONFID-UPDATE: 1
- SA.CONFID-UPDATE-IMAGE: 1
- SA.CONFIG-APPLET: 1
- SA.CONTEXT-SEPAR: 1
- SA.DELETION: 1
- SA.EXE-APPLI-CODE: 3
- SA.EXE-JCS-CODE: 3
- SA.FIREWALL: 2
- SA.INSTALL: 2
- SA.INTEG-APPLI-CO: 1
- SA.INTEG-APPLI-CODE: 2
- SA.INTEG-APPLI-DA: 1
- SA.INTEG-APPLI-DATA: 2
- SA.INTEG-JCS-CODE: 3
- SA.INTEG-JCS-DATA: 1
- SA.INTEG-UPDATE-I: 1
- SA.INTEG-UPDATE-IMAGE: 1
- SA.KEY-MNGT: 2
- SA.NATIVE: 4
- SA.OBJ-DELETION: 3
- SA.OPERATE: 2
- SA.OSU: 1
- SA.PIN-MNGT: 2
- SA.RESOURCES: 3
- SA.RM: 1
- SA.SCP: 5
- SA.SID: 3
- SA.TRANSACTION: 2
- SA.VERIFICATION: 3
- T:
- T.COM_EXPLOIT: 4
- T.CONFID-: 1
- T.CONFID-APPLI-DA: 1
- T.CONFID-APPLI-DATA: 2
- T.CONFID-CONT: 4
- T.CONFID-JCS-CODE: 3
- T.CONFID-JCS-DATA: 3
- T.CONFID-UPDATE-I: 1
- T.CONFID-UPDATE-IMAGE: 3
- T.CONFIG: 4
- T.CONT-DOS: 4
- T.CONT-SID: 4
- T.DELETION: 2
- T.EXE-CODE: 6
- T.EXE-CODE-REMOTE: 1
- T.EXE-CONT: 4
- T.INSTALL: 2
- T.INTEG-APPLI-: 1
- T.INTEG-APPLI-COD: 2
- T.INTEG-APPLI-CODE: 3
- T.INTEG-APPLI-DATA: 11
- T.INTEG-CODE: 1
- T.INTEG-CONT: 3
- T.INTEG-JCS-CODE: 3
- T.INTEG-JCS-DATA: 3
- T.INTEG-UPDATE-IM: 1
- T.INTEG-UPDATE-IMAGE: 3
- T.INTERRUPT-OSU: 4
- T.LIFE_CYCLE: 4
- T.NATIVE: 3
- T.OBJ-DELETION: 2
- T.PHYSICAL: 2
- T.RESOURCES: 3
- T.RESTRICTED-MOD: 1
- T.RESTRICTED-MODE: 3
- T.RND: 4
- T.SID: 6
- T.UNAUTH-LOAD-UP: 1
- T.UNAUTH-LOAD-UPDATE-IMAGE: 3
- T.UNAUTHORIZED_: 1
- T.UNAUTHORIZED_CARD_MNGT: 3
|
| pdf_data/st_keywords/vendor |
|
- NXP:
- NXP: 466
- NXP Semiconductors: 25
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 26
- AES-: 1
- AES-128: 1
- AES-256: 16
- DES:
- 3DES:
- 3DES: 1
- TDEA: 4
- TDES: 2
- Triple-DES: 4
- TripleDES: 1
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 10
- HMAC: 16
- miscellaneous:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 4
- SHA-384: 3
- SHA-512: 3
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
- CBC:
- CCM:
- CFB:
- CTR:
- ECB:
- GCM:
- OFB:
- XTS:
|
| pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP256r1: 9
- brainpoolP384r1: 9
- brainpoolP512r1: 2
- Curve:
- Edwards:
- NIST:
- Curve P-256: 8
- Curve P-384: 8
- Curve P-521: 8
- NIST P-256: 1
- P-256: 9
- P-384: 8
- P-521: 8
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library ..................................................13: 1
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- Fault Injection: 1
- Physical Tampering: 2
- malfunction: 2
- physical tampering: 2
- SCA:
- DPA: 3
- SPA: 2
- physical probing: 3
- side channel: 2
- side-channel: 1
- timing attack: 1
- timing attacks: 3
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 20: 2
- AIS20: 2
- AIS31: 1
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 2
- CCMB-2017-04-003: 2
- CCMB-2017-04-004: 2
- FIPS:
- FIPS 140-3: 2
- FIPS 186-4: 1
- FIPS 197: 1
- FIPS PUB 186-4: 30
- ICAO:
- ISO:
- RFC:
- RFC 7748: 1
- RFC 8032: 1
- RFC5639: 30
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
- JC3.1: 1
- Java Card 3.1: 2
|
| pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 1
- ALG_AES_BLOCK_128_CBC_NOPAD_STANDARD: 2
- ALG_AES_BLOCK_128_ECB_NOPAD: 1
- ALG_AES_CBC_ISO9797_M1: 1
- ALG_AES_CBC_ISO9797_M2: 1
- ALG_AES_CBC_ISO9797_M2_STANDARD: 1
- ALG_AES_CBC_ISO9797_STANDARD: 1
- ALG_AES_CBC_PKCS5: 1
- ALG_AES_CBC_PKCS7: 2
- ALG_AES_CFB: 1
- ALG_AES_CMAC16: 1
- ALG_AES_CMAC16_STANDARD: 1
- ALG_AES_CMAC8: 1
- ALG_AES_CMAC_128: 1
- ALG_AES_ECB_ISO9797_M1: 1
- ALG_AES_ECB_ISO9797_M2: 1
- ALG_AES_ECB_PKCS5: 1
- ALG_AES_ECB_PKCS7: 2
- ALG_AES_MAC_128_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 1
- ALG_DES_CBC_ISO9797_M2: 1
- ALG_DES_CBC_NOPAD: 1
- ALG_DES_CBC_PKCS5: 1
- ALG_DES_CBC_PKCS7: 1
- ALG_DES_CMAC8: 1
- ALG_DES_ECB_ISO9797_M1: 1
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 1
- ALG_DES_ECB_PKCS5: 1
- ALG_DES_ECB_PKCS7: 1
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC4_ISO9797_M1: 1
- ALG_DES_MAC4_ISO9797_M2: 1
- ALG_DES_MAC4_PKCS5: 1
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 1
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 1
- ALG_DES_MAC8_ISO9797_M1: 1
- ALG_DES_MAC8_ISO9797_M2: 1
- ALG_DES_MAC8_NOPAD: 1
- ALG_DES_MAC8_PKCS5: 1
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 2
- ECDSA:
- ALG_ECDSA_SHA_224: 1
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 1
- ALG_ECDSA_SHA_512: 1
- HMAC:
- ALG_HMAC_SHA_256: 1
- ALG_HMAC_SHA_384: 1
- ALG_HMAC_SHA_512: 1
- RSA:
- ALG_RSA_NOPAD: 1
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 1
- ALG_RSA_SHA_224_PKCS1: 1
- ALG_RSA_SHA_224_PKCS1_PSS: 1
- ALG_RSA_SHA_256_PKCS1: 1
- ALG_RSA_SHA_256_PKCS1_PSS: 1
- ALG_RSA_SHA_384_PKCS1: 1
- ALG_RSA_SHA_384_PKCS1_PSS: 1
- ALG_RSA_SHA_512_PKCS1: 1
- ALG_RSA_SHA_512_PKCS1_PSS: 1
- ALG_RSA_SHA_PKCS1: 1
- SHA:
- ALG_SHA_224: 1
- ALG_SHA_256: 3
- ALG_SHA_384: 3
- ALG_SHA_512: 3
- SHA3:
- ALG_SHA3_224: 1
- ALG_SHA3_256: 1
- ALG_SHA3_384: 1
- ALG_SHA3_512: 1
- curves:
- misc:
- LENGTH_AES_128: 4
- LENGTH_AES_192: 4
- LENGTH_AES_256: 4
- LENGTH_DES3_2KEY: 4
- LENGTH_DES3_3KEY: 4
- LENGTH_EC_FP_128: 2
- LENGTH_EC_FP_160: 1
- LENGTH_EC_FP_192: 2
- LENGTH_EC_FP_224: 2
- LENGTH_EC_FP_256: 3
- LENGTH_EC_FP_384: 1
- LENGTH_EC_FP_528: 2
- LENGTH_RSA_1024: 1
- LENGTH_SHA: 1
- LENGTH_SHA3_224: 1
- LENGTH_SHA3_256: 1
- LENGTH_SHA3_384: 1
- LENGTH_SHA3_512: 1
- LENGTH_SHA_224: 1
- LENGTH_SHA_256: 2
- LENGTH_SHA_384: 1
- LENGTH_SHA_512: 2
- PAD_PKCS1_OAEP: 1
- SIG_CIPHER_AES_CMAC128: 1
- SIG_CIPHER_AES_CMAC16: 1
- SIG_CIPHER_AES_CMAC8: 1
- SIG_CIPHER_DES_CMAC8: 1
- SIG_CIPHER_ECDSA: 1
- SIG_CIPHER_EDDSA: 1
- SIG_CIPHER_EDDSAPH: 1
- SIG_CIPHER_RSA: 1
- TYPE_ACCESS: 5
|
| pdf_data/st_keywords/javacard_packages |
|
- com:
- com.nxp.id.jcopx.security: 1
- java:
- javacard:
- javacard.framework: 2
- javacard.security: 3
- javacardx:
- javacardx.crypto: 1
- javacardx.security: 1
- org:
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /Author: Niels Menke, Kai Reinhard, Melanie Volkamer, Dr. Sönke Maseberg, Florian Heinecke, Ibrahim Rabah, Jan Schirrmacher, Wolfgang Jung, Tobias Pressel
- /CreationDate: D:20210528013617-07'00'
- /Creator: Microsoft Word
- /Keywords: remote Voting, eVoting, Online Wahlen, elektronische Wahlen
- /ModDate: D:20210528013617-07'00'
- /Producer: macOS Version 11.3.1 (Build 20E241) Quartz PDFContext
- /Subject: 1.10
- /Title: Security Target Polyas CORE zu Common Criteria Protection Profile BSI-PP-0037
- pdf_file_size_bytes: 1705361
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
- /Author: NXP B.V.
- /CreationDate: D:20231121133805Z
- /Creator: DITA Open Toolkit 3.3.1
- /Keywords: NXP, ASE, JCOP 8.9, Single Chip Secure Element and NFC Controller, JCOP, Common Criteria, EAL5 augmented
- /Producer: Apache FOP Version 2.3
- /Subject: NXP JCOP 8.9 on SN300 Secure Element
- /Title: Security Target Lite
- pdf_file_size_bytes: 1315962
- pdf_hyperlinks: mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 189
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |