name |
IPCOM EX Series Firmware Security Component V1.0.00 |
CardOS DI V5.3 EAC/PACE Version 1.0 |
category |
Boundary Protection Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
07.01.2013 |
23.06.2021 |
not_valid_before |
22.03.2007 |
23.06.2016 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/c0088_ecvr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0967a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/ |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0967b_pdf.pdf |
manufacturer |
Fujitsu Limited |
Atos IT Solutions and Services GmbH |
manufacturer_web |
|
https://www.de.atos.net |
security_level |
EAL1 |
EAL4+, AVA_VAN.5, ATE_DPT.2, ALC_DVS.2 |
dgst |
a9d6e88aae2b318f |
85a1d2f13e1c4fe8 |
heuristics/cert_id |
JISEC-CC-CRP-C0088 |
BSI-DSZ-CC-0967-2016 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
{} |
ALC_FLR.1, ASE_TSS.2, AGD_OPE.1, APE_SPD.1, ALC_CMS.5, ASE_ECD.1, ADV_FSP.4, APE_OBJ.2, ADV_TDS.3, ALC_TAT.3, APE_CCL.1, ALC_DEL.1, ALC_CMC.5, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ASE_INT.1, ASE_OBJ.2, APE_INT.1, ATE_IND.3, ASE_CCL.1, ASE_REQ.2, APE_ECD.1, APE_REQ.2, ADV_SPM.1, AVA_VAN.5, ALC_LCD.2, ALC_DVS.2, AGD_PRE.1, ADV_INT.3, ATE_FUN.2, ATE_COV.3, ADV_FUN.1, ATE_DPT.2 |
heuristics/extracted_versions |
1.0.00 |
5.3, 1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-0968-2016 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0968-2016, BSI-DSZ-CC-0782-V2-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-0968-2016, BSI-DSZ-CC-0967-2016 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0967-2016, BSI-DSZ-CC-0968-2016, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V2-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0088
- certification_date: 01.03.2007
- claim: EAL1
- enhanced:
- assurance_level: EAL1
- cc_version: 2.3
- description: PRODUCT DESCRIPTION This product is the embedded firmware of firewall appliance that provides the following functions. - IP packet filtering - Operational assistance - Configuration These functions shield the traffic resources on internal network from threats of illegal access and keep the advantage that resources on external network can be used. This product is previously installed as a firmware of following appliances of Fujitsu Limited. - IPCOM EX1000 SC - IPCOM EX1200 SC - IPCOM EX2000 SC - IPCOM EX1000 LB - IPCOM EX1200 LB - IPCOM EX2000 LB
- evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
- product: IPCOM EX Series Firmware Security Component
- product_type: IT Product (Firewall)
- toe_version: V1.0.00
- vendor: Fujitsu Limited
- expiration_date: 01.03.2013
- revalidations: [frozendict({'date': '2007-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105_01.html'})]
- supplier: Fujitsu Limited
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105.html
- toe_japan_name: IPCOM EX Series Firmware Security Component V1.0.00
- toe_overseas_link: None
- toe_overseas_name: IPCOM EX Series Firmware Security Component V1.1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0782-V2-2015 |
heuristics/protection_profiles |
{} |
a33327d40f253f46 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0088_ecvr.pdf |
0967a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 4 augmented by ALC_DVS.2, ATE_DPT.2, AVA_VAN.5 SOGIS Recognition Agreement
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0967-2016
- cert_item: CardOS DI V5.3 EAC/PACE Version 1.0
- cert_lab: BSI
- developer: Atos IT Solutions and Services GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Machine Readable Travel Document with "ICAO Application" Extended Access Control with PACE, Version 1.3.2, 5 December 2012, BSI-CC-PP-0056-V2-2012-MA-02
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- Certification No. C0088: 1
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 7
- BSI-DSZ-CC-0967-2016: 21
- BSI-DSZ-CC-0968-2016: 1
- BSI-DSZ-CC-S-0056-2015: 2
- BSI-DSZ-CC-S-0057-2015: 2
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 5
- BSI-CC-PP-0068-V2-2011: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 7
- EAL 2: 7
- EAL 3: 4
- EAL 4: 10
- EAL 4 augmented: 3
- EAL 5: 9
- EAL 5+: 1
- EAL 6: 4
- EAL 7: 4
- EAL5: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 2
- ADV_FSP.5: 1
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 1
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 2
- ADV_TDS.4: 1
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 3
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 2
- ALC_CMS.5: 2
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 6
- ALC_FLR: 3
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 2
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 2
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 6
- ATE_DPT.3: 1
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 1
|
- TUV:
- TÜV Informationstechnik: 3
- TÜViT: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- BSI:
- AIS 20: 1
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 35: 1
- AIS 36: 3
- AIS 38: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- Report Summary (ETR Summary) CardOS DI V5.3 EAC/PACE Version 1.0, TÜV Informationstechnik GmbH (confidential document) [8] Protection Profile Machine Readable Travel Document with "ICAO Application" Extended Access: 1
- Version 1.0' and 'CardOS DI V5.3 EAC/PACE Version 1.0 (BAC)', Atos IT Solutions and Services GmbH (confidential document) [11] Guidance documentation for the TOE, Version 05/2014, CardOS V5.3 Chipcard Operating System: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20070323205356+09'00'
- /ModDate: D:20070323205356+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 13167
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20160706085250+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Atos IT Solutions and Services GmbH, CardOS DI V5.3, EAC, PACE, MRTD, Reisepass"
- /ModDate: D:20160706085825+02'00'
- /Producer: LibreOffice 4.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0967-2016
- pdf_file_size_bytes: 1242671
- pdf_hyperlinks: https://www.bsi.bund.de/AIS, http://www.sogisportal.eu/, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
|
0967b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0782-V2-2015: 4
- BSI-DSZ-CC-967: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-110: 1
- BSI-CC-PP- 0068-V2-2011: 3
- BSI-CC-PP-0035-2007: 4
- BSI-CC-PP-0055: 1
- BSI-CC-PP-0055-: 2
- BSI-CC-PP-0055-110: 10
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0056-V2-2012-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 4
- BSI-CC-PP-0068-: 2
- BSI-CC-PP-0068-V2: 1
- BSI-CC-PP-0068-V2-: 2
- BSI-CC-PP-0068-V2-2011: 39
- BSI-CC-PP-0071: 1
- BSI-CC-PP-0071-2012: 2
- BSI-PP- 0056-V2-2012-132: 1
- BSI-PP-0035: 5
- BSI-PP-0056-: 1
- BSI-PP-0056-V2-: 2
- BSI-PP-0056-V2-2012-132: 29
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 10
- EAL4 augmented: 2
- EAL6: 2
- EAL6 augmented: 2
- EAL6+: 1
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 3
- ADV_FSP.4: 1
- ADV_FUN.1: 1
- ADV_IMP.1: 1
- ADV_TDS.3: 2
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 2
- ALC:
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR.1: 1
- APE:
- ASE:
- ASE_CCL: 8
- ASE_ECD: 9
- ASE_INT: 11
- ASE_OBJ: 13
- ASE_REQ: 50
- ASE_SPD: 18
- ASE_TSS: 20
- ATE:
- AVA:
- AVA_VAN.3: 2
- AVA_VAN.5: 5
|
pdf_data/st_keywords/cc_sfr |
|
- FAU:
- FAU_GEN: 2
- FAU_SAS: 8
- FAU_SAS.1: 14
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 227
- FCS_CKM.1: 24
- FCS_CKM.2: 16
- FCS_CKM.4: 64
- FCS_CKM.4.1: 1
- FCS_COP: 165
- FCS_COP.1: 24
- FCS_RND: 8
- FCS_RND.1: 26
- FCS_RND.1.1: 2
- FCS_RNG: 2
- FCS_RNG.1: 1
- FDP:
- FDP_ACC: 12
- FDP_ACC.1: 7
- FDP_ACF: 17
- FDP_ACF.1: 29
- FDP_IFC.1: 3
- FDP_ITC.1: 18
- FDP_ITC.2: 16
- FDP_ITT.1: 1
- FDP_RIP: 1
- FDP_RIP.1: 15
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 1
- FDP_UCT: 8
- FDP_UCT.1: 1
- FDP_UIT: 8
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 10
- FIA_AFL.1: 2
- FIA_API: 31
- FIA_API.1: 8
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 83
- FIA_UAU.1: 4
- FIA_UAU.4: 2
- FIA_UAU.5: 16
- FIA_UAU.6: 2
- FIA_UID: 18
- FIA_UID.1: 7
- FMT:
- FMT_LIM: 7
- FMT_LIM.1: 24
- FMT_LIM.1.1: 3
- FMT_LIM.2: 20
- FMT_LIM.2.1: 4
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 87
- FMT_MTD.1: 10
- FMT_MTD.3: 11
- FMT_MTD.3.1: 1
- FMT_SMF.1: 35
- FMT_SMF.1.1: 1
- FMT_SMR: 26
- FMT_SMR.1: 16
- FPT:
- FPT_EMS: 8
- FPT_EMS.1: 22
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS.1: 7
- FPT_FLS.1.1: 1
- FPT_PHP.3: 8
- FPT_PHP.3.1: 1
- FPT_TST.1: 14
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_TST.2: 1
- FRU:
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 6
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 14
- Infineon Technologies AG: 2
- NXP:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 10
- TDES: 31
- Triple-DES: 10
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
- ECC:
- FF:
- DH:
- DH: 10
- Diffie-Hellman: 19
- DSA:
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 14
- SHA-224: 7
- SHA-256: 8
- SHA-384: 7
- SHA-512: 6
|
pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 3
- Key agreement: 1
- MAC:
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- Curve P-224: 1
- Curve P-256: 1
- Curve P-384: 1
- P-224: 3
- P-256: 3
- P-384: 3
- secp224r1: 1
- secp256r1: 2
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 6
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- SCA:
- DPA: 3
- Leak-Inherent: 2
- SPA: 2
- physical probing: 5
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 3
- EF.DG1: 11
- EF.DG13: 1
- EF.DG14: 6
- EF.DG15: 5
- EF.DG16: 9
- EF.DG2: 5
- EF.DG3: 15
- EF.DG4: 15
- EF.DG5: 3
- EF.SOD: 10
|
pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- ICAO:
- ISO:
- ISO/IEC 11770-3: 1
- ISO/IEC 14443: 6
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC 9796-2: 2
- PKCS:
- RFC:
- RFC 2631: 1
- RFC 5639: 1
- RFC3369: 1
- RFC3447: 7
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
- /Author: Atos IT Solutions and Services GmbH
- /CreationDate: D:20160421104334+02'00'
- /Creator: Writer
- /Keywords: Common Criteria, CardOS, ASE, EAC, PACE, AA
- /ModDate: D:20160421114844+02'00'
- /Producer: LibreOffice 5.1
- /Subject: Security Target
- /Title: Security Target 'CardOS DI V5.3 EAC/PACE Version 1.0', Rev. 2.01, Edition 04/2016
- pdf_file_size_bytes: 610951
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 129
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
False |
True |
state/st/download_ok |
False |
True |
state/st/extract_ok |
False |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |