name |
AR-FR12M Version M.20 |
IDeal PASS, version 2.0.1 - Application EAC avec PACE |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
07.10.2013 |
18.01.2026 |
not_valid_before |
11.03.2005 |
16.02.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat%20ANSSI-CC-2017_06-S02.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_06.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0022_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2017_06.pdf |
manufacturer |
Sharp Corporation |
Safran Morpho |
manufacturer_web |
https://sharp-world.com/ |
https://morpho.com |
security_level |
EAL3+, ADV_SPM.1 |
AVA_VAN.5, EAL5+, ALC_DVS.2 |
dgst |
8a35a1a0f9dabc51 |
57873fff24826b74 |
heuristics/cert_id |
JISEC-CC-CRP-C0022-01 |
ANSSI-CC-2017/06 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_ADM.1, ATE_FUN.1, ADV_HLD.2, ALC_DVS.1, ATE_COV.2, AVA_VLA.1, AVA_SOF.1, ATE_DPT.1, ADV_SPM.1, AVA_MCU.1, AVA_MSU.1, ADV_RCR.1, ADV_FSP.1, AGD_USR.1, ATE_IND.2 |
ASE_INT.1, ASE_SPD.1, ASE_CCL.1, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ADV_FSP.5, ASE_REQ.2, ASE_OBJ.2, ASE_TSS.1, AVA_VAN.5, ASE_ECD.1, ALC_CMS.5, ALC_DEL.1, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, ADV_TDS.4, AGD_OPE.1, AGD_PRE.1, ALC_DVS.2, ALC_FLR.1, ALC_TAT.2, ADV_ARC.1, ADV_INT.2 |
heuristics/extracted_versions |
20 |
2.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V2-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0022
- certification_date: 01.03.2005
- claim: EAL3+ ADV_SPM.1
- enhanced:
- assurance_level: EAL3 + ADV_SPM.1
- cert_link: https://www.ipa.go.jp/en/security/c0022_eimg.pdf
- description: PRODUCT DESCRIPTION TOE is a firmware that aims to prevent disclosure of real image data stored temporarily in Mass Storage Device (hereafter referred to as MSD), which are specified for every functional unit configuration of Multi Function Device (hereafter referred to as MFD). TOE is provided as a kit of upgrading firmware of MFD. TOE executes encryption before the real image data are spooled in MSD, when the MFD functions like PCFAX, FAX transmission or FAX receiving are performed. It also clears spool data area in MSD after the jobs like copying, printing, SCAN transmission, PCFAX, FAX transmission or FAX receiving are completed. These encryption function and data erasing function ensure the confidentiality of real image data that are stored temporarily in MSD and counter fraudulent readout of them.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology security center (JEITA ITSC)
- product: AR-FR12M
- product_type: product (Data protection function inside digital MFD)
- report_link: https://www.ipa.go.jp/en/security/c0022_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0022_est.pdf
- toe_version: VERSION M.20
- vendor: Sharp Corporation
- expiration_date: 01.10.2013
- supplier: Sharp Corporation
- toe_japan_name: AR-FR12M VERSION M.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0022_it4028.html
- toe_overseas_name: AR-FR12M VERSION M.20
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
{} |
a33327d40f253f46, b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf |
pdf_data/cert_filename |
|
certificat ANSSI-CC-2017_06-S02.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20210120172407+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210120172407+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 289340
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0022_erpt.pdf |
ANSSI-CC-2017_06.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/06
- cert_item: IDeal PASS, version 2.0.1 - Application EAC with PACE
- cert_item_version: Version 2.0.1
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: SAFRAN Identity & Security (ex-MORPHO) 18 Chaussée Jules César, 95520 Osny, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire SAFRAN Identity & Security (ex-MORPHO) 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document with „ICAO Application”, Extended Access Control with PACE (EAC PP) Version 1.3.2, BSI-CC-PP-0056-V2-2012-MA-02 Machine Readable Travel Document using Standard Inspection Procedure with PACE (PACE PP), Version 1.0, BSI-CC-PP-0068-V2-2011
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0022-01: 1
- Certification No. C0022: 1
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011: 2
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL3: 2
- EAL3 augmented: 1
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL4: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
- Morpho:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 1
- CESTI:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20050518144032+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /Manager: IPA
- /ModDate: D:20050518144205+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /SourceModified: D:20050518054022
- /Title: CRP-C0022-01_e
- pdf_file_size_bytes: 213209
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2017_06
- pdf_file_size_bytes: 134135
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 15
|
pdf_data/st_filename |
c0022_est.pdf |
anssi_cible_2017_06.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0056-V2: 1
- BSI-CC-PP-0056-V2-2012: 2
- BSI-CC-PP-0068-V2-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-CC-PP-0068-V2-2011-MA01: 1
- BSI-PP-0055: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4+: 1
- EAL5: 3
- EAL5 augmented: 2
- EAL5+: 5
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_CAP.3: 4
- ACM_SCP.1: 4
- ADO:
- ADO_DEL.1: 3
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 3
- ADV_HLD.2: 1
- ADV_RCR.1: 4
- ADV_SPM.1: 12
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 4
- ATE_IND.2: 3
- AVA:
- AVA_MCU.1: 1
- AVA_MSU.1: 2
- AVA_SOF.1: 3
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC.1: 7
- ADV_FSP.1: 3
- ADV_FSP.2: 3
- ADV_FSP.4: 1
- ADV_FSP.5: 9
- ADV_IMP.1: 9
- ADV_INT.2: 2
- ADV_TDS.1: 2
- ADV_TDS.3: 4
- ADV_TDS.4: 9
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 6
- AGD_PRE: 3
- AGD_PRE.1: 7
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 2
- ALC_DEL.1: 2
- ALC_DVS.1: 1
- ALC_DVS.2: 10
- ALC_FLR.1: 2
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 4
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 2
- ATE_FUN.1: 6
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 9
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.4: 6
- FCS_COP.1: 15
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 5
- FDP_IFC.1: 1
- FDP_RIP.1: 13
- FDP_RIP.1.1: 1
- FIA:
- FIA_SOS.1: 16
- FIA_SOS.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 20
- FIA_UAU.2.1: 1
- FIA_UAU.7: 15
- FIA_UAU.7.1: 1
- FIA_UID.1: 5
- FIA_UID.2: 15
- FIA_UID.2.1: 1
- FMT:
- FMT_MOF.1: 16
- FMT_MOF.1.1: 1
- FMT_MSA.1: 5
- FMT_MSA.2: 17
- FMT_MSA.2.1: 1
- FMT_MTD.1: 13
- FMT_MTD.1.1: 1
- FMT_RVM.1: 1
- FMT_SMF.1: 15
- FMT_SMF.1.1: 1
- FMT_SMR.1: 16
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 17
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 21
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 55
- FCS_CKM.1: 13
- FCS_CKM.2: 2
- FCS_CKM.4: 40
- FCS_CKM.4.1: 1
- FCS_COP: 93
- FCS_COP.1: 12
- FCS_RND: 7
- FCS_RND.1: 27
- FCS_RND.1.1: 2
- FCS_RNG.1: 2
- FDP:
- FDP_ACC: 19
- FDP_ACC.1: 7
- FDP_ACF: 23
- FDP_ACF.1: 16
- FDP_IFC.1: 3
- FDP_ITC.1: 7
- FDP_ITC.2: 7
- FDP_ITT.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 18
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 16
- FDP_UCT.1: 2
- FDP_UIT: 15
- FDP_UIT.1: 2
- FIA:
- FIA_ACC.1.1: 1
- FIA_AFL: 12
- FIA_AFL.1: 2
- FIA_API: 29
- FIA_API.1: 9
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 123
- FIA_UAU.1: 3
- FIA_UAU.4: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5: 5
- FIA_UAU.6: 2
- FIA_UID: 24
- FIA_UID.1: 5
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 28
- FMT_LIM.1.1: 3
- FMT_LIM.2: 26
- FMT_LIM.2.1: 4
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 125
- FMT_MTD.1: 12
- FMT_MTD.3: 12
- FMT_MTD.3.1: 1
- FMT_SMF.1: 41
- FMT_SMF.1.1: 1
- FMT_SMR: 33
- FMT_SMR.1: 13
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 20
- FPT_EMS.1.1: 5
- FPT_EMS.1.2: 5
- FPT_FLS.1: 16
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP.3: 19
- FPT_PHP.3.1: 1
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 21
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- O.REMOVE: 6
- O.RESIDUAL: 8
- OE:
- OE.ERASEALL: 3
- OE.OPERATE: 3
- T:
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 10
- Infineon Technologies: 1
- Morpho:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 3
- TDES: 6
- Triple-DES: 3
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 3
- SHA-224: 1
- SHA-256: 1
- SHA224: 3
- SHA256: 5
- SHA384: 3
- SHA512: 4
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 9
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 2
- malfunction: 6
- SCA:
- DPA: 2
- Leak-Inherent: 3
- SPA: 1
- physical probing: 4
- side channel: 1
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG13: 1
- EF.DG14: 6
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 14
- EF.DG4: 14
- EF.DG5: 3
- EF.SOD: 6
|
pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
- FIPS:
- ISO:
|
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- FIPS 46-3: 3
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- PKCS:
- PKCS#1: 2
- PKCS#3: 3
- PKCS3: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: SHARP Corporation
- /Company: SHARP Corporation
- /CreationDate: D:20050518145955+09'00'
- /Creator: Word 用 Acrobat PDFMaker 6.0
- /ModDate: D:20050518150808+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Subject: C0022
- /Title: ST
- pdf_file_size_bytes: 664695
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 34
|
- /Author: MOLINS Nicolas (MORPHO)
- /CreationDate: D:20161201162728+01'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20161201162728+01'00'
- /Producer: Microsoft® Word 2013
- pdf_file_size_bytes: 2723287
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 141
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |