| name |
ACOS-IDv4.1 eMRTD (A) BAC Configuration (version 4.1 eMRTD (A)) ( ANSSI-CC-2025/15) |
MOzART Command Center Web Portal v1.1 |
| category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
Other Devices and Systems |
| scheme |
FR |
MY |
| status |
active |
active |
| not_valid_after |
30.03.2030 |
26.07.2026 |
| not_valid_before |
30.03.2025 |
26.07.2021 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2025_15fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C117-CERTIFICATE-V1_.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_15fr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C117-CR-v1.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2025_15en.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Mozart%20Command%20Center%20Web%20Portal%20Security%20Target%20v1.26.pdf |
| manufacturer |
Austria Card plastikkarten und Ausweissysteme Gmbh |
Certis CISCO Security Pte Ltd (Certis) |
| manufacturer_web |
https://www.austriacard.at/ |
https://www.certisgroup.com/ |
| security_level |
EAL4+, ALC_CMC.5, ALC_TAT.2, ADV_INT.2, ADV_FSP.5, ATE_DPT.3, ALC_DVS.2, ADV_TDS.4, ALC_FLR.1 |
EAL2 |
| dgst |
9283463b43afd3d4 |
d297d3b91330b408 |
| heuristics/cert_id |
ANSSI-CC-2025/15 |
ISCB-5-RPT-C117-CR-v1 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ADV_TDS.4, ASE_COMP.1, ALC_DVS.2, ALC_CMS.5, ATE_DPT.3, ADV_FUN.1, ALC_CMC.5, AVA_VAN.5, ALC_FLR.1, ADV_FSP.5, ADV_ARC.1, ADV_INT.2, ALC_TAT.2, ADV_IMP.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
4.1 |
1.1 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
BSI-DSZ-CC-1229-V2-2024 |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
BSI-DSZ-CC-1229-2024, BSI-DSZ-CC-1229-V2-2024 |
{} |
| heuristics/scheme_data |
|
- cert_no: 2021-006-C117
- certification_date: 26.07.2021
- developer: Certis CISCO Security Pte Ltd
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C117
- certification_date: 26.07.2021
- developer: 20 Jalan AfifiSingapore 409179 T: +65 6747 2888F: +65 6744 0039Email: [email protected]: +65 6856 8799 https://www.certisgroup.com
- expiration_date: 26.07.2026
- mutual_recognition: CCRA
- product: MOzART Command Center Web Portal v1.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/ISCB-5-RPT-C117-CR-v1.pdf
- scope: The Target of Evaluation (TOE) is a web-based application portal called the MOzART Command Center Web Portal (MOzART CC) which provides TOE users means of monitoring, operating, managing and administering physical security incidents through the Intranet (private network). The MOzART CC allows consumers to have a “one-to-all” control over many integrated physical security appliances such as fire alarm triggers, surveillance cameras, parameter sensors and entry alarm triggers around a designated premise. All modules/functions on the same private network related to the querying of live data, feeds by the third-party APIs (supporting non-TOE software) and displayed by the TOE will not require Internet connection. The MOzART CC is a highly sophisticated Command Center, acting as the user interface for TOE users (in their respective roles as an operator, supervisor or administrator) to monitor events, operate cases, manage cases, and administer the MOzART CC itself.
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C117/Mozart_Command_Center_Web_Portal_Security_Target_v1.26.pdf
- type: A collection of appliances that form a security infrastructure for an enterprise network
- expiration_date: 26.07.2026
- level: EAL2
- product: MOzART Command Center Web Portal v1.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/129
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
BSI-DSZ-CC-1229-V2-2024 |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
BSI-DSZ-CC-1229-V2-2024 |
{} |
| heuristics/protection_profiles |
60455fc9564e2545 |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
{} |
| pdf_data/cert_filename |
Certificat-CC-2025_15fr.pdf |
ISCB-5-CERT-C117-CERTIFICATE-V1_.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- ALC_TAT.2: 1
- ATE:
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20250403163926+02'00'
- /Creator: Microsoft® Word 2019
- /Keywords:
- /ModDate: D:20250403173128+02'00'
- /Producer: Microsoft® Word 2019
- pdf_file_size_bytes: 147372
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
- /CreationDate: D:20210805090328Z00'00'
- /Creator: Word
- /ModDate: D:20210805090328Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 220295
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
ANSSI-CC-2025_15fr.pdf |
ISCB-5-RPT-C117-CR-v1.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1229-V2-2024: 2
- FR:
|
- MY:
- ISCB-5-RPT-C117-CR-v1: 37
|
| pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-PP-0055-2009: 1
- BSI-PP-0084-2014: 1
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- ALC_TAT.2: 1
- ATE:
- AVA:
|
|
| pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FAU_GEN.1: 36
- FAU_GEN.2: 10
- FDP:
- FDP_ACC.1: 26
- FDP_ACF.1: 8
- FIA:
- FIA_AFL.1: 3
- FIA_ATD.1: 8
- FIA_SOS.1: 5
- FIA_UAU.1: 1
- FIA_UAU.5: 3
- FIA_UID.1: 1
- FTP:
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATOR: 1
- A.DDOS: 1
- A.MALWARE: 1
- A.PHYSICAL_ENVIRONMENT: 1
- A.THIRDPARTY: 1
- A.TIMESTAMP: 1
|
| pdf_data/report_keywords/vendor |
- Infineon:
- Infineon Technologies AG: 1
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
- /CreationDate: D:20210805054112Z00'00'
- /Creator: Word
- /ModDate: D:20210805054112Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 901437
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
| pdf_data/st_filename |
ANSSI-cible-CC-2025_15en.pdf |
Mozart Command Center Web Portal Security Target v1.26.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
- DE:
- BSI-DSZ-CC-1229-V2-2024: 2
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0055-2009: 3
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0084-2014: 2
- BSI-PP-0002-2001: 1
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 6+: 1
- EAL4: 16
- EAL4 augmented: 2
- EAL4+: 1
- EAL6: 1
- EAL6 augmented: 1
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.5: 6
- ADV_FUN.1: 1
- ADV_IMP.1: 3
- ADV_INT.1: 1
- ADV_INT.2: 4
- ADV_TDS.1: 2
- ADV_TDS.4: 6
- ALC:
- ALC_CMS.5: 5
- ALC_DVS.2: 5
- ALC_FLR.1: 6
- ALC_TAT.1: 1
- ALC_TAT.2: 5
- APE:
- ASE:
- ASE_CCL: 2
- ASE_COMP.1: 1
- ASE_ECD: 3
- ASE_INT: 2
- ASE_OBJ: 2
- ASE_REQ: 2
- ASE_SPD: 2
- ATE:
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 1
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 3
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 6
- FAU_SAS.1: 13
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 28
- FCS_CKM.1: 35
- FCS_CKM.1.1: 1
- FCS_CKM.2: 4
- FCS_CKM.4: 42
- FCS_CKM.4.1: 1
- FCS_COP: 76
- FCS_COP.1: 13
- FCS_RND: 7
- FCS_RND.1: 16
- FCS_RND.1.1: 2
- FCS_RNG: 1
- FDP:
- FDP_ACC.1: 20
- FDP_ACC.2: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 4
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 5
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_ITT.1: 1
- FDP_SDI.2: 1
- FDP_UCT.1: 11
- FDP_UIT.1: 10
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 9
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 3
- FIA_API: 13
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 4
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 15
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 4
- FIA_UAU.6: 14
- FIA_UAU.6.1: 1
- FIA_UID: 1
- FIA_UID.1: 13
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 26
- FMT_LIM.1.1: 2
- FMT_LIM.2: 22
- FMT_LIM.2.1: 4
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 31
- FMT_MTD.1: 8
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR.1: 25
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPT:
- FPT_FLS.1: 18
- FPT_FLS.1.1: 1
- FPT_ITT.1: 1
- FPT_PHP: 1
- FPT_PHP.3: 15
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 15
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FRU:
- FTP:
- FTP_ITC.1: 7
- FTP_TRP.1: 5
|
- FAU:
- FAU_GEN.1: 9
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 7
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 10
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FPT:
- FTP:
- FTP_TRP.1: 7
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- O:
- O.AES: 1
- O.AES-CMAC: 1
- O.ECC: 1
- O.FFC: 1
- O.RND: 1
- O.RSA: 1
- O.TDES: 1
- O.TDES-RMAC: 1
- OE:
|
- A:
- A.ADMINISTRATOR: 4
- A.DDOS: 4
- A.MALWARE: 3
- A.PHYSICAL_ENVIRONMENT: 4
- A.THIRDPARTY: 3
- A.TIMESTAMP: 3
- O:
- O.SEC_ACCESS: 5
- O.SEC_AUTHENTICATE: 5
- O.SEC_COMMUNICATION: 5
- OE:
- OE.ADMINISTRATOR: 3
- OE.ANTI_DDOS: 3
- OE.ANTI_MALWARE: 3
- OE.SAFE_PHYSICAL_ENV: 3
- OE.SYN_TIMESTAMP: 3
- OE.THIRDPARTY: 3
- T:
- T.BROKEN_AUTH: 4
- T.INTERCEPTION: 4
- T.UNAUTHORIZED_ACCESS: 3
|
| pdf_data/st_keywords/vendor |
- Infineon:
- Infineon: 14
- Infineon Technologies AG: 1
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
- TLS:
- SSL:
- TLS:
- TLS: 2
- TLS 1.2: 4
- TLSv1.2: 1
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 4
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 8
- physical tampering: 1
- SCA:
- DPA: 2
- Leak-Inherent: 1
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
|
| pdf_data/st_keywords/technical_report_id |
- BSI:
- BSI TR-03110: 1
- BSI TR-03111: 2
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
- EF:
- EF.COM: 9
- EF.DG1: 28
- EF.DG13: 4
- EF.DG14: 2
- EF.DG15: 3
- EF.DG16: 26
- EF.DG2: 10
- EF.DG3: 8
- EF.DG4: 8
- EF.DG5: 8
- EF.SOD: 9
|
|
| pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 180-215: 1
- FIPS 197: 3
- FIPS 46-3: 2
- FIPS PUB 46-3: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 18013: 8
- ISO/IEC 18033-3: 1
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-3: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-8: 1
- ISO/IEC 7816-9: 1
- ISO/IEC 9796-2: 2
- ISO/IEC14443: 2
- ISO/IEC7816-3: 1
- RFC:
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope: 2
- physical scope of the TOE boxed in dotted lines. Both Video Stream and API Services are deemed as out of scope. All hardware appliances/devices, software components and integrated third‐party physical security: 1
- to the integrated third‐party APIs which feeds data to the TOE. The following are categorized as out of scope from the selected TOE: Database server web application server application server The table: 1
|
| pdf_data/st_metadata |
- /Author: [email protected]
- /CreationDate: D:20250114102310+01'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20250114102310+01'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 1697647
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
- /Author:
- /CreationDate: D:20210630170155+08'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20210721081156+08'00'
- /Producer: Acrobat Distiller 10.1.16 (Windows)
- /Title:
- pdf_file_size_bytes: 955878
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |