name |
STARCOS 3.4 ID Tachograph version C2 |
Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit User Interface: 4030-20G0-05-00 Network Module: 4030-A0G0-03-00 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Multi-Function Devices |
scheme |
NL |
JP |
status |
active |
archived |
not_valid_after |
02.09.2025 |
28.12.2010 |
not_valid_before |
02.09.2010 |
03.08.2004 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification_Report_NSCIB-CC-09-11192-CR2.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/GDM_STA34_TACHO_ASE_Lite.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0011_est.pdf |
manufacturer |
G+D Mobile Security GmbH |
Konica Minolta Business Technologies, Inc |
manufacturer_web |
https://www.gi-de.com/de/de/mobile-security/ |
https://www.konicaminolta.com/ |
security_level |
ADV_IMP.2, EAL4+, ALC_DVS.2, AVA_VAN.5 |
EAL3 |
dgst |
8e597216ef8fc1a9 |
f7d41e1f69ac3e28 |
heuristics/cert_id |
NSCIB-CC-09-11192-CR2 |
JISEC-CC-CRP-C0011-01 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_DVS.2, ATE_COV.2, ALC_TAT.1, ATE_DPT.2, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ADV_TDS.3, AVA_VLA.4, ADV_FSP.4, ATE_IND.2, ADV_SPM.1, AVA_MSU.3 |
ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, AVA_MSU.1, ATE_DPT.1, AVA_SOF.1 |
heuristics/extracted_versions |
3.4 |
00, 05, 03, 4030 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
ANSSI-CC-2009/24 |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2009/24, ANSSI-CC-2008/10, ANSSI-CC-2009/22, ANSSI-CC-2009/10 |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0011
- certification_date: 01.08.2004
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0011_eimg.pdf
- description: PRODUCT DESCRIPTION Multi Function Peripheral (MFP) is IT machine for office work which is composed by selecting and combining each function such as copy, print, scan, FAX. This TOE* consists of "User Interface" and "Network Module" which are the software components carrying out the operation control processing, from the operation panel and a client PC in the control software of Di3510 series/Di3510f series MFP. This security function protects the high confidential document data that is spooled in MFP from exposing by using the specific function. That specific function is the Locked Print function which accepts printing only when the set-up password and input password from the panel are matched and the User Box function which controls the access to the user box. * Japan: Di3510 shirizu/ Di3510f shirizu Multi Function Peripheral Security Kit, Aboard:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit are the same products with different name.
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: Japan :Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit Abroad:Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit
- product_type: IT Product (data protection function in digital MFD)
- protection_profile: Not available
- report_link: https://www.ipa.go.jp/en/security/c0011_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0011_est.pdf
- toe_version: User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.01.2011
- supplier: Konica Minolta business technologies,inc.
- toe_japan_name: Di3510 shirizu / Di3510f shirizu Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0011_it4021.html
- toe_overseas_name: Di3510 Series/Di3510f Series Multi Function Peripheral Security Kit (User Interface : 4030-20G0-05-00 Network Module : 4030-A0G0-03-00)
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
{} |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
Certification_Report_NSCIB-CC-09-11192-CR2.pdf |
c0011_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- NL:
- NSCIB-09-11192: 1
- NSCIB-CC-09-11192: 3
- NSCIB-CC-09-11192-CR: 1
- NSCIB-CC-09-11192-CR2: 16
|
- JP:
- CRP-C0011-01: 1
- Certification No. C011: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 4+: 1
- EAL4: 1
- EAL5+: 1
- EAL7: 1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP: 4
- ADV_FSP.4: 1
- ADV_IMP.2: 3
- ADV_TDS: 2
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 2
- ALC_DVS.2: 3
- ALC_TAT.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ACCESS-CHECK: 1
- A.ADMIN: 1
- A.AUTH: 1
- A.HDD: 1
- A.NETWORK: 1
- A.PHYSICAL: 1
- A.SERVICE: 1
- A.SESSION: 1
- T:
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-USER-BOX: 1
|
pdf_data/report_keywords/vendor |
- GD:
- G&D: 2
- Giesecke & Devrient: 5
|
|
pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
- ATMEL:
- ATMEL AT90SC24036RCU: 3
- ATMEL ATV4/ATV4: 1
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- ISO:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20100903105626+02'00'
- /Creator: pdfFactory Pro www.pdffactory.com
- /Producer: pdfFactory Pro 3.22 (Windows XP Professional Dutch)
- /Title: Certification Report NSCIB-CC-09-11192-CR2.pdf
- pdf_file_size_bytes: 195336
- pdf_hyperlinks: http://www.commoncriteriaportal.org, mailto:[email protected]
- pdf_is_encrypted: True
- pdf_number_of_pages: 17
|
- /CreationDate: D:20050823120725+09'00'
- /ModDate: D:20050823120725+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 197148
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 27
|
pdf_data/st_filename |
GDM_STA34_TACHO_ASE_Lite.pdf |
c0011_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 4: 4
- EAL 4+: 1
- EAL 5: 2
- EAL4: 10
- EAL4 augmented: 5
- EAL5: 2
- EAL5+: 2
- ITSEC:
|
|
pdf_data/st_keywords/cc_sar |
- ADO:
- ADO_DEL: 1
- ADO_DEL.2: 2
- ADO_IGS: 1
- ADO_IGS.1: 1
- ADO_IGS.2: 2
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.4: 1
- ADV_IMP.2: 12
- ADV_SPM.1: 1
- ADV_TDS.3: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.5: 2
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 6
- ALC_LCD.1: 2
- ALC_TAT.1: 2
- ATE:
- ATE_COV.2: 1
- ATE_DPT.2: 3
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
- AVA_MSU.3: 1
- AVA_VAN.5: 11
- AVA_VLA.4: 4
|
- ACM:
- ACM_CAP.3: 2
- ACM_SCP.1: 2
- ADO:
- ADO_DEL.1: 2
- ADO_IGS.1: 2
- ADV:
- ADV_FSP.1: 2
- ADV_HLD.2: 2
- ADV_RCR.1: 2
- AGD:
- AGD_ADM.1: 2
- AGD_USR.1: 2
- ALC:
- ATE:
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_DPT.1: 2
- ATE_FUN.1: 2
- ATE_IND.2: 2
- AVA:
- AVA_MSU.1: 2
- AVA_SOF.1: 2
- AVA_VLA.1: 2
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_DAU.1.1: 4
- FAU_GEN.1: 3
- FAU_SAA.1: 4
- FAU_SAA.1.1: 3
- FAU_SAA.1.2: 1
- FCO:
- FCO_NRO: 1
- FCO_NRO.1: 3
- FCO_NRO.1.1: 3
- FCO_NRO.1.2: 1
- FCO_NRO.1.3: 3
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 3
- FCS_CKM.2: 5
- FCS_CKM.2.1: 4
- FCS_CKM.4: 9
- FCS_CKM.4.1: 5
- FCS_COP: 1
- FCS_COP.1: 10
- FCS_COP.1.1: 8
- FCS_RND.1: 3
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 4
- FDP_ACC.2: 5
- FDP_ACC.2.1: 5
- FDP_ACC.2.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 4
- FDP_ACF.1.1: 6
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 4
- FDP_ACF.1.4: 2
- FDP_DAU.1: 4
- FDP_DAU.1.2: 3
- FDP_ETC: 1
- FDP_ETC.1: 2
- FDP_ETC.1.1: 4
- FDP_ETC.1.2: 1
- FDP_ETC.2: 4
- FDP_ETC.2.1: 4
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 3
- FDP_ETC.2.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.1.1: 5
- FDP_ITC.1.2: 1
- FDP_ITC.1.3: 4
- FDP_ITC.2: 1
- FDP_RIP: 1
- FDP_RIP.1: 2
- FDP_RIP.1.1: 4
- FDP_SDI: 1
- FDP_SDI.2: 2
- FDP_SDI.2.1: 4
- FDP_SDI.2.2: 2
- FIA:
- FIA_AFL: 3
- FIA_AFL.1: 2
- FIA_AFL.1.1: 5
- FIA_AFL.1.2: 3
- FIA_ATD: 1
- FIA_ATD.1: 3
- FIA_ATD.1.1: 4
- FIA_UAU: 1
- FIA_UAU.1: 3
- FIA_UAU.1.1: 4
- FIA_UAU.1.2: 1
- FIA_UAU.3: 2
- FIA_UAU.3.1: 4
- FIA_UAU.3.2: 2
- FIA_UAU.4: 2
- FIA_UAU.4.1: 4
- FIA_UID: 2
- FIA_UID.1: 5
- FIA_UID.1.1: 4
- FIA_UID.1.2: 1
- FIA_USB: 1
- FIA_USB.1: 2
- FIA_USB.1.1: 4
- FIA_USB.1.2: 2
- FIA_USB.1.3: 4
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 2
- FMT_MOF.1.1: 4
- FMT_MSA: 1
- FMT_MSA.1: 5
- FMT_MSA.1.1: 4
- FMT_MSA.2: 6
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 4
- FMT_MSA.3.2: 2
- FMT_MTD: 1
- FMT_MTD.1: 3
- FMT_MTD.1.1: 4
- FMT_SMF.1: 4
- FMT_SMR: 1
- FMT_SMR.1: 6
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 2
- FPR_UNO.1.1: 4
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 9
- FPT_FLS.1.1: 4
- FPT_PHP: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 4
- FPT_TDC: 2
- FPT_TDC.1: 1
- FPT_TDC.1.1: 4
- FPT_TDC.1.2: 2
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 4
- FPT_TST.1.2: 2
- FPT_TST.1.3: 3
- FRU:
- FTP:
- FTP_ITC: 1
- FTP_ITC.1: 3
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
|
- FDP:
- FDP_ACC.1: 26
- FDP_ACC.1.1: 2
- FDP_ACF.1: 22
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 2
- FIA:
- FIA_AFL.1: 47
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_SOS.1: 39
- FIA_SOS.1.1: 4
- FIA_UAU.1: 16
- FIA_UAU.2: 68
- FIA_UAU.2.1: 4
- FIA_UAU.6: 13
- FIA_UAU.6.1: 1
- FIA_UAU.7: 19
- FIA_UAU.7.1: 1
- FIA_UID: 1
- FIA_UID.1: 28
- FIA_UID.2: 57
- FIA_UID.2.1: 4
- FMT:
- FMT_MOF.1: 15
- FMT_MOF.1.1: 1
- FMT_MSA.1: 16
- FMT_MSA.1.1: 1
- FMT_MSA.3: 23
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MTD.1: 52
- FMT_MTD.1.1: 5
- FMT_RVM.1.1: 1
- FMT_SMF.1: 39
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 73
- FMT_SMR.1.1: 4
- FMT_SMR.1.2: 4
- FMT_SMT.1: 1
- FPT:
- FPT_RVM: 1
- FPT_RVM.1: 23
- FPT_SEP: 1
- FPT_SEP.1: 28
- FPT_SEP.1.1: 1
- FPT_SEP.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.CLON: 1
- O.DEV: 1
- O.DEV_DIS_ES: 4
- O.DLV_AUDIT: 1
- O.DLV_DATA: 1
- O.DLV_PROTECT: 1
- O.DLV_RESP: 1
- O.FLAW: 1
- O.INIT_ACS: 3
- O.MOD_MEMORY: 1
- O.OPERATE: 1
- O.RND: 1
- O.SOFT_DLV: 3
- O.TAMPER_ES: 2
- O.TEST_OPERATE: 1
- O.USE_DIAG: 1
- OT:
- OT.PERSONALIZATION: 1
- OT.TAMPER_ES: 13
- T:
- T.CLON: 2
- T.DIS_DEL: 2
- T.DIS_INFO: 2
- T.DIS_TEST_ES: 1
- T.MOD: 1
- T.MOD_DEL: 2
- T.MOD_EXE: 4
- T.MOD_LOAD: 4
- T.MOD_SHARE: 4
- T.MOD_SOFT: 2
- T.RND: 1
- T.T: 2
- T.T_CMD: 4
- T.T_ES: 4
- T.T_TOOLS: 1
|
- A:
- A.ACCESS-CHECK: 3
- A.ADMIN: 2
- A.AUTH: 3
- A.HDD: 2
- A.NETWORK: 3
- A.PHYSICAL: 2
- A.SERVICE: 3
- A.SESSION: 2
- O:
- O.ACCESS-ADMIN: 8
- O.ACCESS-SERVICE: 7
- O.ACCESS-USE-BOX: 1
- O.ACCESS-USER-BOX: 3
- O.ACESS-ADMIN: 2
- OE:
- OE.ACCESS-: 1
- OE.ACCESS-SECURE-PRINT: 5
- OE.SECURE-PRINT-QUALITY: 5
- T:
- T.ACCESS-SECURE-PRINT: 3
- T.ACCESS-USER-BOX: 2
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 2
- side channel: 1
- timing attacks: 1
- other:
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- ISO:
- ISO/IEC 7816-8: 1
- ISO/IEC 9796-2: 1
- ISO/IEC 9798-3: 2
- PKCS:
- RFC:
|
- CC:
- CCIMB-99-032: 2
- CCIMB-99-033: 2
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
- ConfidentialDocument:
- the MFP is considered temporary data that is stored to maintain security during the printing of a confidential document. In other words, this data is not intended to be stored in the MFP for a long period of time, and: 1
|
pdf_data/st_metadata |
- /Author: CSRD22/stut
- /Comments: Open
- /Company: GuD
- /CreationDate: D:20100629134954+02'00'
- /Creator: Acrobat PDFMaker 7.0 für Word
- /Keywords: Version 2.0 / Status 29.06.2010
- /ModDate: D:20100629134956+02'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /Subject: Security Target Lite STARCOS 3.4 ID Tachograph C2
- /Title: Security Target Lite STARCOS 3.4 ID Tachograph C2
- pdf_file_size_bytes: 475709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 70
|
- /CreationDate: D:20050823121328+09'00'
- /ModDate: D:20050823121328+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 409164
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 78
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |