Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
STARCOS 3.4 ID Tachograph version C2
NSCIB-CC-09-11192-CR2
Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
Certificate Number: 2011/72
name STARCOS 3.4 ID Tachograph version C2 Microsoft Exchange Server 2010 SP1 Enterprise (English) 64-bit
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme NL AU
status active archived
not_valid_after 02.09.2025 13.07.2017
not_valid_before 02.09.2010 16.02.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T024%20CR%20SP1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/E14_EAL4_ASE_1.0.pdf
manufacturer G+D Mobile Security GmbH Microsoft Corporation
manufacturer_web https://www.gi-de.com/de/de/mobile-security/ https://www.microsoft.com
security_level ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VAN.5 EAL4+, ALC_FLR.3
dgst 8e597216ef8fc1a9 be0c7f67702ea646
heuristics/cert_id NSCIB-CC-09-11192-CR2 Certificate Number: 2011/72
heuristics/cpe_matches {} cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_10:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_16:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_9:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_18:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_25:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_31:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_23:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_1:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_24:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_2:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_22:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_17:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_15:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_21:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_29:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_11:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_20:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_30:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_4:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_8:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_13:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_5:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_14:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_3:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_26:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_27:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_12:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_28:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_7:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_19:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp3_rollup_6:*:*:*:*:*:*, cpe:2.3:a:microsoft:exchange_server:2010:sp2:*:*:*:*:*:*
heuristics/related_cves {} CVE-2018-8151, CVE-2000-0216, CVE-2019-0817, CVE-2016-0138, CVE-1999-1322, CVE-2019-1136, CVE-2018-8302, CVE-2017-8621, CVE-2021-26858, CVE-2018-8154, CVE-2021-26857, CVE-2014-6319, CVE-2019-0724, CVE-2018-0940, CVE-2018-0924, CVE-2020-0688, CVE-2013-5072, CVE-2012-4791, CVE-2019-1084, CVE-2013-0418, CVE-2020-17144
heuristics/extracted_sars ALC_DVS.2, ATE_COV.2, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ADV_TDS.3, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.4 2010, 64
heuristics/report_references/directly_referencing ANSSI-CC-2009/24 {}
heuristics/report_references/indirectly_referencing ANSSI-CC-2009/24, ANSSI-CC-2008/10, ANSSI-CC-2009/22, ANSSI-CC-2009/10 {}
heuristics/scheme_data
maintenance_updates
pdf_data/report_filename Certification_Report_NSCIB-CC-09-11192-CR2.pdf EFS-T024 CR SP1.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-2009/24: 1
  • NL:
    • NSCIB-09-11192: 1
    • NSCIB-CC-09-11192: 3
    • NSCIB-CC-09-11192-CR: 1
    • NSCIB-CC-09-11192-CR2: 16
  • AU:
    • Certificate Number: 2011/72: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 1
    • EAL5+: 1
    • EAL7: 1
  • EAL:
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP: 4
    • ADV_FSP.4: 1
    • ADV_IMP.2: 3
    • ADV_TDS: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.5: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.2: 3
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 3
  • ALC:
    • ALC_FLR.3: 9
pdf_data/report_keywords/vendor
  • GD:
    • G&D: 2
    • Giesecke & Devrient: 5
  • Microsoft:
    • Microsoft: 29
    • Microsoft Corporation: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 7
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2010-3332: 3
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • DPA: 2
    • SPA: 3
  • other:
    • JIL: 2
pdf_data/report_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC24036RCU: 3
    • ATMEL ATV4/ATV4: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS 3: 25
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
pdf_data/report_metadata
  • /CreationDate: D:20100903105626+02'00'
  • /Creator: pdfFactory Pro www.pdffactory.com
  • /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
  • /Title: Certification Report NSCIB-CC-09-11192-CR2.pdf
  • pdf_file_size_bytes: 195336
  • pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 17
pdf_data/st_filename GDM_STA34_TACHO_ASE_Lite.pdf E14_EAL4_ASE_1.0.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4+: 1
    • EAL 5: 2
    • EAL4: 10
    • EAL4 augmented: 5
    • EAL5: 2
    • EAL5+: 2
  • ITSEC:
    • ITSEC E3 high: 1
  • EAL:
    • EAL4: 11
    • EAL4 augmented: 4
    • EAL4+: 2
pdf_data/st_keywords/cc_sar
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 2
    • ADO_IGS: 1
    • ADO_IGS.1: 1
    • ADO_IGS.2: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.2: 12
    • ADV_SPM.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.5: 2
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 3
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 1
    • AVA_VAN.5: 11
    • AVA_VLA.4: 4
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT: 2
    • ASE_INT.1: 2
    • ASE_OBJ: 2
    • ASE_OBJ.2: 2
    • ASE_REQ: 2
    • ASE_REQ.2: 2
    • ASE_SPD: 2
    • ASE_SPD.1: 2
    • ASE_TSS: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_DAU.1.1: 4
    • FAU_GEN.1: 3
    • FAU_SAA.1: 4
    • FAU_SAA.1.1: 3
    • FAU_SAA.1.2: 1
  • FCO:
    • FCO_NRO: 1
    • FCO_NRO.1: 3
    • FCO_NRO.1.1: 3
    • FCO_NRO.1.2: 1
    • FCO_NRO.1.3: 3
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 5
    • FCS_COP: 1
    • FCS_COP.1: 10
    • FCS_COP.1.1: 8
    • FCS_RND.1: 3
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 4
    • FDP_ACC.2: 5
    • FDP_ACC.2.1: 5
    • FDP_ACC.2.2: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 2
    • FDP_DAU.1: 4
    • FDP_DAU.1.2: 3
    • FDP_ETC: 1
    • FDP_ETC.1: 2
    • FDP_ETC.1.1: 4
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 4
    • FDP_ETC.2.1: 4
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 3
    • FDP_ETC.2.4: 2
    • FDP_IFC.1: 5
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITC.1.1: 5
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 4
    • FDP_ITC.2: 1
    • FDP_RIP: 1
    • FDP_RIP.1: 2
    • FDP_RIP.1.1: 4
    • FDP_SDI: 1
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 4
    • FDP_SDI.2.2: 2
  • FIA:
    • FIA_AFL: 3
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 5
    • FIA_AFL.1.2: 3
    • FIA_ATD: 1
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 4
    • FIA_UAU: 1
    • FIA_UAU.1: 3
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.3.1: 4
    • FIA_UAU.3.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 4
    • FIA_UID: 2
    • FIA_UID.1: 5
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 1
    • FIA_USB: 1
    • FIA_USB.1: 2
    • FIA_USB.1.1: 4
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 4
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 2
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 4
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 3
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 4
    • FMT_SMF.1: 4
    • FMT_SMR: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 2
    • FPR_UNO.1.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 4
    • FPT_PHP: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 4
    • FPT_TDC: 2
    • FPT_TDC.1: 1
    • FPT_TDC.1.1: 4
    • FPT_TDC.1.2: 2
    • FPT_TST: 2
    • FPT_TST.1: 3
    • FPT_TST.1.1: 4
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 3
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 1
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 3
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 3
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 7
    • FDP_ACF: 24
    • FDP_ACF.1: 5
    • FDP_IFC: 39
    • FDP_IFC.1: 12
    • FDP_IFF: 70
    • FDP_IFF.1: 10
  • FIA:
    • FIA_ATD.1: 3
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 2
    • FIA_UID.2: 4
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA: 62
    • FMT_MSA.1: 28
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
pdf_data/st_keywords/cc_claims
  • O:
    • O.CLON: 1
    • O.DEV: 1
    • O.DEV_DIS_ES: 4
    • O.DLV_AUDIT: 1
    • O.DLV_DATA: 1
    • O.DLV_PROTECT: 1
    • O.DLV_RESP: 1
    • O.FLAW: 1
    • O.INIT_ACS: 3
    • O.MOD_MEMORY: 1
    • O.OPERATE: 1
    • O.RND: 1
    • O.SOFT_DLV: 3
    • O.TAMPER_ES: 2
    • O.TEST_OPERATE: 1
    • O.USE_DIAG: 1
  • OT:
    • OT.PERSONALIZATION: 1
    • OT.TAMPER_ES: 13
  • T:
    • T.CLON: 2
    • T.DIS_DEL: 2
    • T.DIS_INFO: 2
    • T.DIS_TEST_ES: 1
    • T.MOD: 1
    • T.MOD_DEL: 2
    • T.MOD_EXE: 4
    • T.MOD_LOAD: 4
    • T.MOD_SHARE: 4
    • T.MOD_SOFT: 2
    • T.RND: 1
    • T.T: 2
    • T.T_CMD: 4
    • T.T_ES: 4
    • T.T_TOOLS: 1
  • A:
    • A.BLOCKLIST: 2
    • A.COM_PROT: 2
    • A.INSTALL: 2
    • A.NO_EVIL_ADM: 1
    • A.NO_EVIL_ADMIN: 1
    • A.PHYS_PROTECT: 2
    • A.PLATFORM: 2
  • O:
    • O.CONBLK: 6
    • O.DAC: 14
    • O.MAIL_FLOW: 5
    • O.REDUCE_SPAM: 6
    • O.RESTDIST: 7
    • O.WIPE: 5
  • OE:
    • OE.BLOCKLIST: 2
    • OE.COM_PROT: 2
    • OE.INSTALL: 3
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 18
  • OSP:
    • OSP.MAIL_FLOW: 3
    • OSP.WIPE: 3
  • T:
    • T.AUTH_DAC: 5
    • T.DL_MISUSE: 4
    • T.SPAM: 7
    • T.UNAUTHUSE: 2
    • T.UNAUTH_DAC: 3
pdf_data/st_keywords/vendor
  • GD:
    • Giesecke & Devrient: 7
  • Microsoft:
    • Microsoft: 10
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3-DES: 6
      • 3DES: 1
    • DES:
      • DES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 16
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 2
    • physical tampering: 1
  • SCA:
    • Leak-Inherent: 2
    • side channel: 1
    • timing attacks: 1
  • other:
    • JIL: 6
pdf_data/st_keywords/device_model
  • ATMEL:
    • ATMEL AT90SC24036RCU: 8
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 88
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2006-09-001: 2
    • CCMB-2007-09-002: 2
    • CCMB-2007-09-003: 2
    • CCMB-2007-09-004: 2
  • ISO:
    • ISO/IEC 7816-8: 1
    • ISO/IEC 9796-2: 1
    • ISO/IEC 9798-3: 2
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
  • RFC:
    • RFC 2821: 9
    • RFC 2822: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the device on receipt of the command is dependent on the platform and configuration and considered out of scope. 4.3 Security objectives for the IT environment Identifier Objective statements OE.PLATFORM The: 1
pdf_data/st_metadata
  • /Author: CSRD22/stut
  • /Comments: Open
  • /Company: GuD
  • /CreationDate: D:20100629134954+02'00'
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 2.0 / Status 29.06.2010
  • /ModDate: D:20100629134956+02'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Subject: Security Target Lite STARCOS 3.4 ID Tachograph C2
  • /Title: Security Target Lite STARCOS 3.4 ID Tachograph C2
  • pdf_file_size_bytes: 475709
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 70
  • /Author: Aaron Doggett (stratsec)
  • /CreationDate: D:20101223114445+11'00'
  • /Creator: Microsof Word 2010
  • /ModDate: D:20101223114445+11'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: EAL4 Security Target
  • /Title: Exchange 2010
  • pdf_file_size_bytes: 861830
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 66
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different