name |
Data security kit for digital MFD:AR-FR10 Version S.10 |
IDeal Citiz v2.1.1 Open platform on M7892 B11 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
archived |
not_valid_after |
10.12.2010 |
21.10.2021 |
not_valid_before |
16.03.2004 |
21.10.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0006.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_66.pdf |
st_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_66.pdf |
manufacturer |
Sharp Corporation |
Safran Morpho |
manufacturer_web |
https://sharp-world.com/ |
https://morpho.com |
security_level |
EAL3+ |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
dgst |
9a44d39dec550888 |
f1df360fe7e3a3f4 |
heuristics/cert_id |
JISEC-CC-CRP-C0006 |
ANSSI-CC-2016/66 |
heuristics/cert_lab |
[] |
CEA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ADV_IMP.1, AVA_VAN.5, ADV_ARC.1, ADV_INT.2, AGD_PRE.1, ALC_FLR.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ATE_COV.2, ASE_SPD.1, ASE_OBJ.2, ALC_CMS.5, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
heuristics/extracted_versions |
10 |
2.1.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2017/08, ANSSI-CC-2016/70, ANSSI-CC-2017/59, ANSSI-CC-2017/09 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2017/66, NSCIB-CC-195748-CR, ANSSI-CC-2017/09, ANSSI-CC-2018/27, ANSSI-CC-2017/74, ANSSI-CC-2017/59, ANSSI-CC-2018/22, ANSSI-CC-2019/04, NSCIB-CC-196231-CR, ANSSI-CC-2016/70, ANSSI-CC-2017/08, ANSSI-CC-2017/65 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V2-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0004
- certification_date: 01.01.2004
- claim: EAL4
- enhanced:
- assurance_level: EAL4
- description: PRODUCT DESCRIPTION The data security kit for digital MFD, AR-FR4 version M.20 and AR-FR5 version E.20, is firmware which aims to decrease the risk of document data and image data that is temporarily stored inside of digital MFD from being dosclosed. Digital MFD is business equipment which can be configured by adding, as needed units for copy, image scanning or facsimile functions to printer function unit. The data security kit for digital MFD is provided as an upgrading kit for the firmware of hte MFD.
- evaluation_facility: Mizuho Information & Research Institute, Inc.
- product: Data security kit for digital MFD: AR-FR4 version M.20, AR-FR5 version E.20
- product_type: IT product (digital MFD )
- protection_profile: N/A
- vendor: Sharp Corporation
- expiration_date: 01.03.2013
- supplier: Sharp Corporation
- toe_japan_name: Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version E.20
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0004_it2005.html
- toe_overseas_name: Data security kit for digital MFD:AR-FR4 version M.20,AR-FR5 version E.20
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0879-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V2-2015, BSI-DSZ-CC-0758-2012, BSI-DSZ-CC-0879-V2-2015 |
heuristics/protection_profiles |
{} |
9399bd94f9925b16 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2010-03en.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0006.pdf |
ANSSI-CC-2016_66.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2016/66
- cert_item: IDeal Citiz v2.1.1 Open platform on M7892 B11
- cert_item_version: Version 2.1.1
- cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
- developer: SAFRAN Identity & Security (ex-MORPHO) 18 Chaussée Jules César, 95520 Osny, France INFINEON Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire SAFRAN Identity & Security (ex-MORPHO) 18 Chaussée Jules César, 95520 Osny, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Java Card Protection Profile – Open Configuration Version 3.0, ANSSI-CC-PP-2010/03-M01
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0006: 1
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
- FR:
- ANSSI-CC-2016/66: 15
- ANSSI-CC-PP-2010/03-M01: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 2
- BSI:
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 2
- EAL 7: 1
- EAL2: 2
- EAL5: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_FLR.1: 1
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 2
- Infineon Technologies AG: 1
- Morpho:
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20040526154034+09'00'
- /ModDate: D:20040526154034+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13947
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author:
- /CreationDate:
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
- /Producer: GPL Ghostscript 9.02
- /Subject:
- /Title: ANSSI-CC-2016_66
- pdf_file_size_bytes: 204592
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 14
|
pdf_data/st_filename |
|
anssi_cible_2016_66.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 2
- BSI-DSZ-CC-0879-V2-2015: 2
- FR:
- ANSSI-CC-PP-2010/03-M01: 1
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2010/03-M01: 1
- BSI:
- BSI-CC-PP-0055-2009: 1
- BSI-CC-PP-0056-2009: 1
- BSI-PP-0035: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL5: 9
- EAL5 augmented: 8
- EAL6: 1
- EAL6 augmented: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 8
- ADV_IMP.1: 8
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 8
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 9
- AGD_PRE: 2
- AGD_PRE.1: 5
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 12
- ALC_FLR.1: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 5
- ASE_OBJ.2: 3
- ASE_REQ.1: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 6
- AVA:
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_ARP: 1
- FAU_ARP.1: 22
- FAU_ARP.1.1: 1
- FAU_SAA.1: 3
- FAU_SAS.1: 3
- FCO:
- FCS:
- FCS_CKM: 34
- FCS_CKM.1: 28
- FCS_CKM.1.1: 1
- FCS_CKM.2: 13
- FCS_CKM.2.1: 2
- FCS_CKM.3: 11
- FCS_CKM.3.1: 2
- FCS_CKM.4: 24
- FCS_CKM.4.1: 1
- FCS_COP: 22
- FCS_COP.1: 26
- FCS_COP.1.1: 1
- FCS_RNG.1: 3
- FDP:
- FDP_ACC: 51
- FDP_ACC.1: 16
- FDP_ACC.2: 5
- FDP_ACF: 47
- FDP_ACF.1: 19
- FDP_IFC: 33
- FDP_IFC.1: 16
- FDP_IFC.2: 2
- FDP_IFF: 28
- FDP_IFF.1: 13
- FDP_IFF.1.2: 1
- FDP_ITC: 17
- FDP_ITC.1: 7
- FDP_ITC.2: 12
- FDP_ITT.1: 4
- FDP_RIP: 159
- FDP_RIP.1: 10
- FDP_ROL: 18
- FDP_ROL.1: 2
- FDP_SDI: 1
- FDP_SDI.1: 4
- FDP_SDI.2: 23
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_UIT: 10
- FDP_UIT.1: 2
- FIA:
- FIA_ATD: 13
- FIA_ATD.1: 2
- FIA_UID: 25
- FIA_UID.1: 9
- FIA_UID.2: 1
- FIA_USB: 12
- FIA_USB.1: 3
- FMT:
- FMT_LIM.1: 3
- FMT_LIM.2: 3
- FMT_MSA: 154
- FMT_MSA.1: 14
- FMT_MSA.2: 1
- FMT_MSA.3: 18
- FMT_MTD: 30
- FMT_MTD.1: 2
- FMT_MTD.3: 1
- FMT_SMF: 34
- FMT_SMF.1: 27
- FMT_SMF.1.1: 1
- FMT_SMR: 46
- FMT_SMR.1: 35
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 1
- FPR_UNO.1: 18
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 71
- FPT_FLS.1: 28
- FPT_FLS.1.1: 1
- FPT_ITT.1: 4
- FPT_PHP: 16
- FPT_PHP.3: 8
- FPT_RCV: 45
- FPT_RCV.3: 8
- FPT_RCV.4: 1
- FPT_TDC: 1
- FPT_TDC.1: 11
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_TST.2: 3
- FRU:
- FTP:
- FTP_ITC: 22
- FTP_ITC.1: 8
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.APPLET: 6
- A.DELETION: 1
- A.PRODUCTION: 7
- A.VERIFICATION: 6
- D:
- D.API_DATA: 5
- D.APP_CODE: 8
- D.APP_C_DATA: 6
- D.APP_I_DATA: 7
- D.BIO: 4
- D.COMMAND: 3
- D.CRYPTO: 5
- D.GP_CODE: 3
- D.ISD_KEYS: 5
- D.JCS_CODE: 4
- D.JCS_DATA: 6
- D.PIN: 5
- D.SD_KEYS: 3
- D.SEC_DATA: 8
- O:
- O.ALARM: 23
- O.APPLET: 16
- O.BIO-: 6
- O.BIO-MNGT: 16
- O.CARD-: 4
- O.CARD-MANAGEMENT: 36
- O.CARD_LC: 4
- O.CIPHER: 20
- O.CODE_PKG: 14
- O.DELETION: 15
- O.FIREWALL: 44
- O.GLOBAL_ARRAYS_CONFID: 20
- O.GLOBAL_ARRAYS_INTEG: 11
- O.INSTALL: 16
- O.JAVAOBJECT: 31
- O.KEY-: 10
- O.KEY-MNGT: 19
- O.LOAD: 18
- O.NATIVE: 15
- O.OBJ-DELETION: 10
- O.OPERATE: 36
- O.PIN-MNGT: 23
- O.REALLOCATION: 18
- O.REMOTE: 1
- O.RESOURCES: 24
- O.RND: 1
- O.SCP: 65
- O.SID: 34
- O.TRANSACTION: 19
- OE:
- OE.APPLET: 11
- OE.CARD-MANAGEMENT: 2
- OE.CODE-EVIDENCE: 20
- OE.KEY_GENERATION: 7
- OE.PRODUCTION: 7
- OE.QUOTAS: 6
- OE.SCP: 3
- OE.SECURITY-DOMAINS: 8
- OE.SHARE-CONTROL: 10
- OE.VERIFICATION: 39
- OP:
- OP.ARRAY_ACCESS: 4
- OP.CREATE: 6
- OP.DELETE_APPLET: 4
- OP.DELETE_PCKG: 3
- OP.DELETE_PCKG_APPLET: 3
- OP.INSTANCE_FIELD: 4
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 4
- OP.SET_CARD_STATE: 2
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.KEY_GENERATION: 6
- OSP.QUOTAS: 7
- OSP.SECURITY_DOMAINS: 6
- OSP.SHARE-CONTROL: 6
- OSP.VERIFICATION: 6
- R:
- T:
- T.APP_DATA_INTEGRITY: 6
- T.CONFID-: 1
- T.CONFID-APPLI-DATA: 18
- T.CONFID-JCS-: 1
- T.CONFID-JCS-CODE: 7
- T.CONFID-JCS-DATA: 11
- T.DELETION: 6
- T.EXE-CODE: 11
- T.EXE-CODE-: 1
- T.INSTALL: 7
- T.INTEG-: 3
- T.INTEG-APPLI-: 5
- T.INTEG-APPLI-CODE: 13
- T.INTEG-APPLI-DATA: 24
- T.INTEG-JCS-CODE: 7
- T.INTEG-JCS-DATA: 11
- T.LIFE_CYCLE: 6
- T.NATIVE: 7
- T.OBJ-DELETION: 5
- T.PHYSICAL: 5
- T.RESOURCES: 9
- T.RND: 1
- T.SID: 20
- T.UNAUTH_ACCESS: 6
- T.UNAUTH_CARD_MNGT: 6
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 8
- Infineon Technologies AG: 2
- Morpho:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 3
- HMAC: 1
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 10
- SHA-224: 1
- SHA-256: 1
- SHA-384: 1
- SHA-512: 1
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 2
- Physical Probing: 2
- physical probing: 5
- side channel: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- EC:
- ALG_EC_SVDP_DH: 1
- ALG_EC_SVDP_DHC: 1
- ALG_EC_SVDP_DHC_KDF: 1
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 1
- ALG_EC_SVDP_DH_PLAIN: 1
- misc:
|
pdf_data/st_keywords/javacard_packages |
|
- com:
- com.morpho.sac: 1
- com.morpho.sm: 1
- javacard:
- javacard.framework: 2
- javacard.security: 6
- javacardx:
- javacardx.biometry: 4
- javacardx.crypto: 1
- javacardx.external: 1
- javacardx.framework: 1
- javacardx.security: 1
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- a timeout policy that prevent them from being blocked should a card fails to answer. That point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
- out of scope: 1
|
pdf_data/st_metadata |
|
- /Author: GT903012
- /CreationDate: D:20161019113756+02'00'
- /Creator: PDFCreator Version 1.7.3
- /Keywords:
- /ModDate: D:20161019113756+02'00'
- /Producer: GPL Ghostscript 9.10
- /Subject:
- /Title: 2016_2000021564 - Security Target lite - IDeal Citiz v2.1.1 open platform
- pdf_file_size_bytes: 1128926
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 123
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |