name |
nShield5s Hardware Security Module Version 13.5.1 |
Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software 8.0.1-02 |
category |
Products for Digital Signatures |
Access Control Devices and Systems |
scheme |
SG |
JP |
status |
active |
archived |
not_valid_after |
24.09.2029 |
13.02.2022 |
not_valid_before |
24.09.2024 |
13.02.2017 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20CC%20Certificate.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_eimg.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20Certificate%20Report.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20[ST]%20nShield5s%20HSM%20Security%20Target%20(SCCS%20certification)-v12.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0536_est.pdf |
manufacturer |
Entrust, Inc. |
Hitachi, Ltd. |
manufacturer_web |
https://www.entrust.com |
https://www.hitachi.com/ |
security_level |
EAL4+, AVA_VAN.4, ALC_FLR.2 |
EAL2+, ALC_FLR.1 |
dgst |
aa3ed16ed6a5ff2f |
bd28ac0feda9039e |
heuristics/cert_id |
CSA_CC_23004 |
JISEC-CC-CRP-C0536 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ALC_FLR.2, AVA_VAN.4 |
ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
13.5.1 |
8.0.1 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
- cert_id: JISEC-CC-CRP-C0536
- certification_date: 01.02.2017
- claim: EAL2+ALC_FLR.1
- enhanced:
- assurance_level: EAL2 Augmented with ALC_FLR.1
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0536_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is Hitachi Device Manager software and Hitachi Tiered Storage Manager software. The TOE has functionality to manage the input or modification of information that expresses a storage system configuration (abbreviated hereafter to storage resource information). TOE security functionality The TOE provides the following security functionality: - Identification/authentication functionality(The TOE also makes it possible to use external authentication functionality provided by external authentication servers, and to use functionality for linking with external authentication groups.) - Access control functionality for storage resource information and for warning banner information - Warning banner functionality
- evaluation_facility: Mizuho Information & Research Institute, Inc. Information Security Evaluation Office
- product: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software
- product_type: Access Control Device and Systems
- report_link: https://www.ipa.go.jp/en/security/c0536_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0536_est.pdf
- toe_version: 8.0.1-02
- vendor: Hitachi, Ltd.
- expiration_date: 01.03.2022
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0536_it5576.html
- toe_overseas_name: Hitachi Device Manager Software, Hitachi Tiered Storage Manager Software8.0.1-02
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
ee319f4a624019b0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf |
{} |
pdf_data/cert_filename |
[CER] nShield5s Hardware Security Module CC Certificate.pdf |
c0536_eimg.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
- EAL:
- EAL 2: 1
- EAL 4: 1
- EAL 4 augmented: 1
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 1
- SGS Brightsight: 1
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20241024132025+08'00'
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-02-18T04:59:28Z
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: 26421bad-f606-455a-bac1-5073c97e8805
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2021-08-12T02:02:37.1377634Z
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
- /ModDate: D:20241024132027+08'00'
- pdf_file_size_bytes: 389969
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20170911161211+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /ModDate: D:20170911161350+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title:
- pdf_file_size_bytes: 453124
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
[CER] nShield5s Hardware Security Module Certificate Report.pdf |
c0536_erpt.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
- JP:
- CRP-C0536-01: 1
- Certification No. C0536: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL 4: 2
- EAL 4 augmented: 2
- EAL4+: 1
|
- EAL:
- EAL2: 4
- EAL2 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
- FPT:
- FPT_PHP.1: 1
- FPT_PHP.3: 1
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 1
- A.CLIENTS: 1
- A.NETWORKS: 1
- A.PASSWORD: 1
- A.PHYSICAL: 2
- A.SECURE_CHANNEL: 1
- A.SRV_MGMT: 1
- T:
- T.ILLEGAL_ACCESS: 1
- T.UNAUTHORISED_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- BrightSight:
- SGS:
- SGS: 2
- SGS Brightsight: 2
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
- SCA:
- side channel: 1
- side-channels: 1
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-004: 1
- CCMB-2018-04-003: 1
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
- NIST:
|
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20241025095332+08'00'
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_ContentBits: 0
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Enabled: true
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Method: Privileged
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_Name: Sensitive Normal
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SetDate: 2022-08-02T09:37:22Z
- /MSIP_Label_153db910-0838-4c35-bb3a-1ee21aa199ac_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_ActionId: eb99f75e-9f8d-4433-96f7-1bbac9f1e82f
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Application: Microsoft Azure Information Protection
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Enabled: True
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Extended_MSFT_Method: Manual
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Name: RESTRICTED
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_Owner: [email protected]
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SetDate: 2020-11-20T03:35:11.8228409Z
- /MSIP_Label_cb51e0fc-1c37-41ff-9297-afacea94f5a0_SiteId: 0b11c524-9a1c-4e1b-84cb-6336aefc2243
- /ModDate: D:20241025095339+08'00'
- pdf_file_size_bytes: 441046
- pdf_hyperlinks: https://www.csa.gov.sg/our-programmes/certification-and-labelling-schemes/singapore-common-criteria-scheme/product-list, https://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 23
|
- /CreationDate: D:20171211090255+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20171211090339+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 207872
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
pdf_data/st_filename |
[DD] [ST] nShield5s HSM Security Target (SCCS certification)-v12.pdf |
c0536_est.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL2: 8
- EAL2 augmented: 3
|
pdf_data/st_keywords/cc_sar |
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ALC_FLR.1: 7
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 8
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG.1: 1
- FAU_STG.2: 3
- FAU_STG.2.1: 1
- FAU_STG.2.2: 1
- FAU_STG.2.3: 1
- FCS:
- FCS_CKM.1: 9
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 9
- FCS_CKM.4.1: 1
- FCS_COP.1: 7
- FCS_COP.1.1: 1
- FCS_RNG: 7
- FCS_RNG.1: 5
- FDP:
- FDP_ACC: 10
- FDP_ACC.1: 10
- FDP_ACF: 9
- FDP_ACF.1: 12
- FDP_IFC: 6
- FDP_IFC.1: 7
- FDP_IFF: 4
- FDP_IFF.1: 7
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 3
- FDP_RIP.1.1: 1
- FDP_SDI.1: 1
- FDP_SDI.2: 4
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_AFL.1: 3
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.6: 2
- FIA_UID.1: 11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA: 16
- FMT_MSA.1: 5
- FMT_MSA.3: 9
- FMT_MTD: 7
- FMT_MTD.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 17
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_FLS.1: 4
- FPT_FLS.1.1: 1
- FPT_PHP.1: 3
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 3
- FPT_PHP.3.1: 1
- FPT_STM.1: 5
- FPT_STM.1.1: 1
- FPT_TST_EXT.1: 7
- FPT_TST_EXT.1.1: 1
- FTP:
|
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 6
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD: 1
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 9
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 6
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 8
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 1
- FMT_MTD.1: 9
- FMT_MTD.1.1: 1
- FMT_SMF: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR: 1
- FMT_SMR.1: 12
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTA:
- FTA_TAB: 1
- FTA_TAB.1: 7
- FTA_TAB.1.1: 1
|
pdf_data/st_keywords/cc_claims |
|
- A:
- A.ADMINISTRATORS: 4
- A.CLIENTS: 3
- A.NETWORKS: 3
- A.PASSWORD: 4
- A.PHYSICAL: 4
- A.SECURE_CHANNEL: 3
- A.SRV_MGMT: 4
- O:
- O.BANNER: 6
- O.MGMT: 9
- O.PASSWORD: 7
- T:
- T.ILLEGAL_ACCESS: 4
- T.UNAUTHORISED_ACCESS: 3
|
pdf_data/st_keywords/vendor |
|
- Microsoft:
- Microsoft: 3
- Microsoft Corporation: 4
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- DES:
- constructions:
- miscellaneous:
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- MD:
- RIPEMD:
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 3
- SHA-384: 2
- SHA-512: 2
- SHA3:
- SHA3-224: 2
- SHA3-256: 2
- SHA3-384: 2
- SHA3-512: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- Edwards:
- NIST:
- B-163: 3
- B-283: 6
- B-409: 6
- B-571: 6
- K-163: 3
- K-283: 6
- K-409: 6
- K-571: 6
- NIST B-233: 6
- NIST K-233: 6
- NIST P-224: 6
- P-192: 6
- P-224: 6
- P-256: 12
- P-384: 12
- P-521: 12
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- Malfunction: 1
- physical tampering: 2
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 140-3: 2
- FIPS 180-4: 1
- FIPS 186-4: 2
- FIPS 197: 5
- FIPS 198-1: 1
- FIPS 202: 2
- ISO:
- NIST:
- NIST SP 800-22: 1
- SP 800-108: 1
- SP 800-38A: 1
- SP 800-38B: 1
- SP 800-38C: 1
- SP 800-38D: 1
- SP 800-38F: 1
- SP 800-56A: 2
- SP 800-67: 1
- SP 800-90A: 1
- SP 800-90B: 1
- PKCS:
- RFC:
- RFC 8017: 1
- RFC2612: 1
- RFC6979: 1
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Entrust
- /CreationDate: D:20240424161653+02'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20240424161653+02'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 6749388
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 73
|
- /CreationDate: D:20171130192201+09'00'
- /Creator: Microsoft® Word 2016
- /ModDate: D:20171130192201+09'00'
- /Producer: Microsoft® Word 2016
- pdf_file_size_bytes: 1103262
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 64
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
True |
state/cert/download_ok |
True |
True |
state/cert/extract_ok |
True |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |