name |
Data Security Kit (E) Software Type III V1.00E |
JavaCard platform for smart card ID-One Cosmo V7.1-s on component ST23YL80C (Standard) |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
01.10.2015 |
01.09.2019 |
not_valid_before |
28.09.2010 |
29.03.2013 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-09en.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0271_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-09en.pdf |
manufacturer |
KYOCERA MITA Corporation |
Oberthur Technologies / STMicroelectronics |
manufacturer_web |
https://www.kyoceramita.com/ |
https://www.oberthur.com/ |
security_level |
EAL3 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
9819cf2673cbe519 |
d3810acb8c40cd35 |
heuristics/cert_id |
JISEC-CC-CRP-C0271 |
ANSSI-CC-2013/09 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 |
ALC_DVS.2, ALC_FLR.1, AVA_VAN.5 |
heuristics/extracted_versions |
1.00 |
7.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0271
- certification_date: 01.09.2010
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0271_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the firmware that controls Multi Function Printer (MFP and henceforth abbreviation) and the ASIC that operates security algorithm after the license of Data Security Kit (E) is applied to the following MFPs that mainly have copy function, scanner function and printer function. - TASKalfa 300i - TASKalfa 300iG - CS 300i - CD 1430/DC 2430 This TOE provides the copy function, the scanner function and the printer function as the basic functions of the MFP by controlling the MFP. In addition, the box function to store the image data is provided. TOE security functionality The TOE provides the following security functions that protect against leakage of the image data stored in HDD during the use of the above-mentioned basic functions. - Image Data Encryption Function - Image Data Overwrite-Erase Function
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc. Evaluation Center
- product: Data Security Kit (E) Software Type III
- product_type: Data protection function in digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0271_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0271_est.pdf
- toe_version: V1.00E
- vendor: KYOCERA MITA Corporation
- expiration_date: 01.10.2015
- supplier: KYOCERA MITA Corporation
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0271_it9268.html
- toe_overseas_name: Data Security Kit (E) Software Type III V1.00E
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0271_erpt.pdf |
ANSSI-CC_2013-09en.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmented ALC_DVS.2, AVA_VAN.5
- cc_version: Common Criteria version 3.1 revision 3
- cert_id: ANSSI-CC-2013/09
- cert_item: JavaCard platform for smart card ID-One Cosmo V7.1-s on component ST23YL80C (Standard
- cert_item_version: JavaCard Platform version: 7.1-s
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: Oberthur Technologies 71-73 rue des Hautes Pâtures 92726 Nanterre Cedex France ST Microelectronics Smartcard IC division 190 avenue Célestin Coq 13106 Rousset France Sponsor Oberthur Technologies 420 rue d’Estienne d’Orves, 92705 Colombes, France
- match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developer\\(s\\)(.+)Evaluation facility(.+)Recognition arrangements']
- ref_protection_profiles: ANSSI-CC-PP-2010/03-M01 [PP JCS] Java Card System – Open Configuration, version 3.0
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0271-01: 1
- Certification No. C0271: 1
|
- FR:
- ANSSI-CC-2009/37: 3
- ANSSI-CC-2013/09: 2
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-: 1
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-PP- 0035-2007: 1
- BSI-PP-0035-: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 5 augmented: 2
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL5 augmented: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CE: 1
- A.LOCATION: 1
- A.NETWORK: 2
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Oberthur:
- Oberthur Technologies: 17
|
pdf_data/report_keywords/eval_facility |
|
- CEA-LETI:
- CEA - LETI: 1
- CEA-LETI: 2
- CESTI:
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- FIPS:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- SCP:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20101215173729+09'00'
- /ModDate: D:20101215173729+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 183890
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2013-09en
- pdf_file_size_bytes: 176305
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
c0271_est.pdf |
ANSSI-CC-cible_2013-09en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- FR:
- ANSSI-CC-2009/37: 2
- ANSSI-CC-2010/01: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03_M01: 2
- BSI:
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4+: 1
- EAL5: 2
- EAL5 augmented: 1
- EAL5+: 3
- EAL6: 2
- EAL6 augmented: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- AGD:
- ALC:
- ALC_DVS: 1
- ALC_DVS.2: 5
- ALC_FLR.1: 2
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FDP_RIP.1: 6
- FDP_RIP.1.1: 1
|
- FAU:
- FAU_ARP.1: 6
- FAU_ARP.1.1: 1
- FAU_STG.2: 2
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCO:
- FCS:
- FCS_CKM: 4
- FCS_CKM.1: 2
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.2.1: 1
- FCS_CKM.3: 1
- FCS_CKM.3.1: 1
- FCS_CKM.4: 2
- FCS_CKM.4.1: 1
- FCS_COP: 4
- FCS_COP.1: 3
- FCS_COP.1.1: 1
- FCS_RNG: 5
- FCS_RNG.1: 5
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC: 12
- FDP_ACC.2: 15
- FDP_ACF: 12
- FDP_ACF.1: 32
- FDP_IFC: 3
- FDP_IFC.1: 4
- FDP_IFC.2: 2
- FDP_IFF: 3
- FDP_IFF.1: 17
- FDP_ITC: 3
- FDP_ITC.1: 3
- FDP_ITC.2: 9
- FDP_RIP: 10
- FDP_RIP.1: 8
- FDP_ROL: 2
- FDP_ROL.1: 5
- FDP_SDI.2: 1
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UIT: 3
- FDP_UIT.1: 4
- FIA:
- FIA_AFL: 10
- FIA_AFL.1: 10
- FIA_ATD: 3
- FIA_ATD.1: 2
- FIA_UAU: 12
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.7: 2
- FIA_UID: 4
- FIA_UID.1: 4
- FIA_UID.2: 1
- FIA_USB: 1
- FIA_USB.1: 3
- FMT:
- FMT_MOF: 2
- FMT_MOF.1: 1
- FMT_MSA: 34
- FMT_MSA.1: 10
- FMT_MSA.2: 4
- FMT_MSA.3: 20
- FMT_MTD: 8
- FMT_MTD.1: 3
- FMT_MTD.2: 2
- FMT_MTD.3: 1
- FMT_REV: 1
- FMT_REV.1: 4
- FMT_SMF: 11
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR: 9
- FMT_SMR.1: 10
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_SMR.2: 6
- FPR:
- FPR_UNO: 6
- FPR_UNO.1: 4
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 5
- FPT_FLS.1: 5
- FPT_FLS.1.1: 2
- FPT_PHP: 2
- FPT_PHP.3: 1
- FPT_RCV: 5
- FPT_RCV.3: 11
- FPT_RCV.4: 1
- FPT_TDC: 2
- FPT_TDC.1: 3
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FRU:
- FTP:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CE: 4
- A.LOCATION: 5
- A.NETWORK: 5
- O:
- OE:
- OE.CE: 3
- OE.LOCATION: 3
- OE.NETWORK: 3
- T:
|
- A:
- A.APPLET: 1
- A.DELETION: 3
- A.VERIFICATION: 1
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 3
- D.APP_I_DATA: 4
- D.ARRAY: 6
- D.BIO: 5
- D.CONFIG: 3
- D.CRYPTO: 4
- D.JCS_CODE: 3
- D.JCS_DATA: 5
- D.JCS_KEYS: 7
- D.NB_REMAINTRYGLB: 1
- D.PIN: 6
- D.SEC_DATA: 7
- D.SENSITIVE_DATA: 2
- O:
- O.ALARM: 1
- O.APPLET: 21
- O.CARD_MANAGEMENT: 4
- O.CIPHER: 2
- O.CODE_PKG: 16
- O.DELETION: 1
- O.FIREWALL: 1
- O.GLOBAL_ARRAYS_CONFID: 1
- O.GLOBAL_ARRAYS_INTEG: 1
- O.INSTALL: 1
- O.JAVAOBJECT: 35
- O.KEY-MNGT: 2
- O.LOAD: 1
- O.NATIVE: 1
- O.OBJ-DELETION: 1
- O.OPERATE: 1
- O.PATCH_LOADING: 2
- O.PIN-MNGT: 2
- O.REALLOCATION: 1
- O.REMOTE: 1
- O.REMOTE_MTHD: 6
- O.REMOTE_OBJ: 10
- O.RESIDENT_APPLICATION: 2
- O.RESOURCES: 1
- O.RMI_SERVICE: 12
- O.ROR: 5
- O.SCP: 6
- O.SECURE_COMPARE: 2
- O.SID: 1
- O.TRANSACTION: 2
- OE:
- OE.CARD_MANAGEMENT: 3
- OE.CODE-EVIDENCE: 2
- OE.SCP: 6
- OE.VERIFICATION: 5
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.FLOW: 1
- OP.GET_ROR: 3
- OP.IMPORT_KEY: 2
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.INVOKE: 3
- OP.JAVA: 5
- OP.LOCAL_STACK_ACCESS: 1
- OP.OPERAND_STACK_ACCESS: 1
- OP.PUT: 4
- OP.RET_RORD: 3
- OP.STATIC_FIELD: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- R:
- T:
- T.CONFID-APPLI-DATA: 1
- T.CONFID-JCS-CODE: 1
- T.CONFID-JCS-DATA: 1
- T.CONFIGURATION: 2
- T.CONF_DATA_APPLET: 2
- T.DELETION: 2
- T.EXE-CODE: 3
- T.EXE-CODE-REMOTE: 1
- T.INSTALL: 1
- T.INTEG-APPLI-CODE: 2
- T.INTEG-APPLI-DATA: 2
- T.INTEG-JCS-CODE: 1
- T.INTEG-JCS-DATA: 1
- T.NATIVE: 1
- T.OBJ-DELETION: 1
- T.PATCH_LOADING: 2
- T.PHYSICAL: 1
- T.RESOURCES: 1
- T.SID: 2
|
pdf_data/st_keywords/vendor |
|
- Oberthur:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 1
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- fault injection: 1
- malfunction: 2
- physical tampering: 3
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- FIPS:
- FIPS PUB 180-3: 2
- FIPS PUB 186-3: 1
- FIPS PUB 197: 5
- FIPS PUB 46-3: 4
- FIPS PUB 81: 6
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC 7816-6: 1
- ISO/IEC 9796-1: 2
- ISO/IEC 9797: 8
- ISO/IEC 9797-1: 1
- NIST:
- PKCS:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.oberthurcs.javacard: 3
- java:
- javacard:
- javacard.crypto: 1
- javacard.framework: 4
- javacard.framework.service: 1
- javacard.security: 4
- javacardx:
- javacardx.crypto: 2
- javacardx.framework.util: 1
- javacardx.rmi: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: KYOCERA MITA Corporation
- /CreationDate: D:20101129105537+09'00'
- /Creator: CubePDF
- /ModDate: D:20101129105537+09'00'
- /Producer: CubePDF
- /Title: Data Security Kit (E) Software Type III Overseas Security Target
- pdf_file_size_bytes: 326068
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 33
|
- /CreationDate: D:20121212172720+02'00'
- /Creator: PDFCreator Version 0.8.1
- /ModDate: D:20130527112124+02'00'
- /Producer: AFPL Ghostscript 8.50
- /Title:
- pdf_file_size_bytes: 888939
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 118
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |