Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PKID ECC Generator v1.1
ISCB-5-RPT-C049-CR-v1a
STARCOS 3.2 QES Version 2.0B
BSI-DSZ-CC-0495-2009
name PKID ECC Generator v1.1 STARCOS 3.2 QES Version 2.0B
category Key Management Systems Products for Digital Signatures
scheme MY DE
not_valid_after 20.11.2018 01.09.2019
not_valid_before 20.11.2013 04.03.2009
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C049-CR-v1a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0495a.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/PKIDECC-ST-v1.0-071013.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0495b.pdf
manufacturer WannaStation.com (M) Sdn Bhd G+D Mobile Security GmbH
manufacturer_web https://www.wannastation.com/ https://www.gi-de.com/de/de/mobile-security/
security_level EAL2 EAL4+, AVA_VLA.4, AVA_MSU.3
dgst ab7d3eefa9027743 b59c5a88ea2e67d4
heuristics/cert_id ISCB-5-RPT-C049-CR-v1a BSI-DSZ-CC-0495-2009
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ADV_LLD.1, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, AVA_VLA.4, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, ADV_HLD.2, AGD_USR.1, ATE_COV.2, ATE_FUN.1, ADV_IMP.1, AVA_MSU.3, ADV_SPM.1, ALC_DVS.1
heuristics/extracted_versions 1.1 3.2, 2.0
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0648-2010
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0456-2009
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0648-2010
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0266-2005, BSI-DSZ-CC-0456-2009, BSI-DSZ-CC-0223-2003, BSI-DSZ-CC-0322-2005, BSI-DSZ-CC-0169-2002
heuristics/scheme_data
  • cert_no: 2013-009-C049
  • certification_date: 20.11.2013
  • developer: WannaStation.com (M) Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Key Management System
    • cert_id: C049
    • certification_date: 20.11.2013
    • developer: Gan Chin Sam WannaStation.com (M) Sdn BhdLot 1109-A, 10th Floor Kelana Parkview Tower,No 1, Jalan SS6/2, Kelana Jaya,47301 Petaling Jaya, Selangor Darul EhsanMALAYSIA URL: http://www.wannastation.com/Email: [email protected]: +603 7885 0977Fax: +603 7885 0979
    • expiration_date: 20.11.2018
    • mutual_recognition: CCRA
    • product: PKID ECC Generator v1.1
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/ISCB-5-RPT-C049-CR-v1a.pdf
    • scope: The Target of Evaluation (TOE) is PKID ECC Generator v1.1, software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID. A user may choose a PKID unique to himself or herself, such as PC/Notebook MAC address, IMEI number and email address. A chosen PKID will become the seed to generate a public and private key through a series of key generation processes. The generated public and private keys are tied to the chosen PKID. Using algorithm based on elliptic curve encryption algorithm, much smaller key size will be used and desirable as it allows the application on PC, smart phones or mobile communication devices for multi-function security applications. The evaluation scope only covers: the generation of the Master Key based on random keystroke input from client organisation. The Master Key will be used to generate the customised PKID ECC Generator specific to that client organisation, and the generation of public and private keys together with the access code, based on the user’s PKID entered manually to the generated customised PKID ECC Generator.Hardware, software like automation Detection Software and operating system, and revocation, destruction and recovery of keys are not covered in the TOE scope. The scope of evaluation covers major security features as follows: Authentication – in order to generate the customised PKID ECC Generator which is specific to the client organisation, authentication is required by the TOE administrator before the Master Key can be imported into the generator. Authentication is also required by the TOE administrator to access the customised PKID ECC Generator before any further action is permitted. Security Management – provides management of TOE security functions during customisation of the PKID ECC generator such as setting the access code for the generated Master Key, management of public and private keys, and management of administrator credential in the customised PKID ECC generator. Cryptographic Support – provides generation of Master Key during customisation of the PKID ECC Generator based on the random keystroke input from client organisation, and generation of public and private keys together with access code, in customised PKID ECC Generator using specified encryption algorithm.
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C049/PKIDECC-ST-v1.0-071013.pdf
    • type: Software that generates public and private keys based on a user definable and recognisable ID of ASCII characters or known as PKID.
  • expiration_date: 20.11.2018
  • level: EAL2
  • product: PKID ECC Generator v1.1
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/96
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0322-2005
heuristics/protection_profiles {} 40002c3611fc465f
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf
pdf_data/report_filename ISCB-5-RPT-C049-CR-v1a.pdf 0495a.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0495-2009
    • cert_item: STARCOS 3.2 QES Version 2.0B
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-5-RPT-C049-CR-v1a: 29
  • DE:
    • BSI-DSZ-CC-0322-2005: 1
    • BSI-DSZ-CC-0456-2009: 4
    • BSI-DSZ-CC-0495-2009: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0006-2002: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 11
  • EAL:
    • EAL 1: 1
    • EAL 4: 7
    • EAL 4 augmented: 2
    • EAL 4+: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 9
    • EAL4 augmented: 1
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 4
    • ATE_IND: 5
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 6
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 7
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.HI_VAD: 1
pdf_data/report_keywords/vendor
  • GD:
    • Giesecke & Devrient: 11
  • Infineon:
    • Infineon: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • HPC:
      • HPC: 2
  • DES:
    • 3DES:
      • TDES: 1
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 83
  • RSA:
    • RSA 2048: 1
    • RSA2048: 1
pdf_data/report_keywords/hash_function
  • RIPEMD:
    • RIPEMD: 1
    • RIPEMD-160: 2
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/report_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/report_keywords/side_channel_analysis
  • other:
    • Reverse engineering: 1
  • FI:
    • malfunction: 1
    • physical tampering: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 28
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • BSI:
    • AIS 20: 2
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 4
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • / m1534a13 SLE66CX360PE / m1536a13 both with RSA2048 V1.4, Version 5, 2007- 11-13, TÜViT (confidential document) 8 specifically • AIS 20, Version 1, 2 December 1999, Funktionalitätsklassen und: 1
    • IT Security of TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 1.3, 2009-01-08, Configuration List STARCOS 3.2 QES V2: 1
    • Target BSI-DSZ-0495-2009, Version 1.0, 08.01.2009, STARCOS 3.2 QES V2.0B, Giesecke & Devrient GmbH (confidential document) [7] Evaluation Technical Report, Version 4, 2009-01-20, STARCOS 3.2 QES 2.0/2.0B, Evaluation Body: 1
    • confidential document) [9] Security Target BSI-DSZ-0495-2009, Version 1.0, 08.01.2009, STARCOS 3.2 QES V2.0B, Giesecke &: 1
pdf_data/report_metadata
  • /Author: ISCB Department
  • /Category: PUBLIC
  • /Caveat: FINAL
  • /Classification: PUBLIC
  • /Company: CyberSecurity Malaysia
  • /CreationDate: D:20131127174041+08'00'
  • /Creator: Acrobat PDFMaker 10.1 for Word
  • /Developer: Wannastation.com (M) Sdn Bhd
  • /Document Type: CR
  • /Identifier: ISCB-5-RPT-C049-CR-v1a
  • /Index: MyCB_TMP_002
  • /Keywords: PKID ECC Generator
  • /ModDate: D:20131127174047+08'00'
  • /Phase: Release
  • /Producer: Adobe PDF Library 10.0
  • /Project Code: C049
  • /Released: 20 November 2013
  • /ST Date: 7 October 2013
  • /ST Title: PKID ECC Generator v1.1 Security Target
  • /ST Version: v1.0
  • /SourceModified: D:20131127094025
  • /Sponsor: Wannastation.com (M) Sdn Bhd
  • /Subject: PKID ECC Generator v1.1
  • /TOE Name: PKID ECC Generator
  • /TOE Version: v1.1
  • /Title: C049 Certification Report
  • /Version: v1a
  • pdf_file_size_bytes: 507839
  • pdf_hyperlinks: mailto:[email protected], http://www.commoncriteriaportal.org/, http://www.cybersecurity.my/mycc
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 29
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090319111933+01'00'
  • /Creator: Writer
  • /Keywords: "BSI-DSZ-CC-0495-2009, Certification, Common Criteria, Giesecke & Devrient GmbH, STARCOS 3.2 QES, Version 2.0B"
  • /ModDate: D:20090319112806+01'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria, Certification
  • /Title: Certification Report BSI-DSZ-CC-0495-2009
  • pdf_file_size_bytes: 395114
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename PKIDECC-ST-v1.0-071013.pdf 0495b.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0322-2005: 2
    • BSI-DSZ-CC-0322-2005-MA-04: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0006-2002: 1
    • BSI-PP-0002-2001: 2
    • BSI-PP-0006-2002: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 4
  • EAL:
    • EAL 4: 21
    • EAL4: 7
    • EAL4 augmented: 2
    • EAL4+: 5
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.3: 1
    • ACM_CAP.4: 2
    • ACM_SCP.2: 3
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 5
  • ADV:
    • ADV_FSP.1: 10
    • ADV_FSP.2: 3
    • ADV_HLD.1: 2
    • ADV_HLD.2: 4
    • ADV_IMP.1: 6
    • ADV_LLD.1: 5
    • ADV_RCR.1: 5
    • ADV_SPM.1: 3
  • AGD:
    • AGD_ADM.1: 10
    • AGD_USR.1: 8
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 2
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 1
    • ATE_FUN.1: 5
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 9
    • AVA_SOF: 1
    • AVA_SOF.1: 3
    • AVA_VLA.4: 10
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 20
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 16
    • FCS_COP.1: 4
  • FDP:
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 14
    • FIA_UAU.2.1: 2
    • FIA_UID.1: 5
  • FMT:
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 2
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 2
    • FCS_CKM.3: 2
    • FCS_CKM.4: 14
    • FCS_COP: 12
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 26
    • FDP_ACF.1: 17
    • FDP_ETC: 5
    • FDP_ETC.1: 3
    • FDP_ITC: 7
    • FDP_ITC.1: 7
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
    • FDP_SDI: 10
    • FDP_SDI.2: 6
    • FDP_UIT: 18
    • FDP_UIT.1: 11
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 3
    • FMT_MSA: 9
    • FMT_MSA.1: 8
    • FMT_MSA.2: 10
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 3
    • FMT_SMR: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 2
    • FPT_FLS: 1
    • FPT_FLS.1: 5
    • FPT_FLS.1.1: 2
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_PHP.3.1: 2
    • FPT_RVM: 1
    • FPT_RVM.1: 8
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TRP: 1
    • FPT_TST: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC: 19
    • FTP_ITC.1: 16
    • FTP_TRP: 9
    • FTP_TRP.1: 8
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CLIENT: 3
    • A.DESTRUCT: 2
    • A.INPUT: 3
    • A.PHY: 3
    • A.REVOKE: 2
    • A.SECURE: 3
  • O:
    • O.AUTH: 6
    • O.CUSTOMIZE: 5
    • O.FUNCTION: 4
    • O.UNIQUE: 4
  • OE:
    • OE.ADMIN: 3
    • OE.CLIENT: 3
    • OE.DESTRUCT: 3
    • OE.INPUT: 3
    • OE.PHY: 3
    • OE.REVOKE: 3
    • OE.SECURE: 3
  • OSP:
    • OSP.ROLE: 3
  • T:
    • T.DUPLICATE: 3
    • T.KEYS: 2
  • A:
    • A.CGA: 3
    • A.SCA: 3
  • OE:
    • OE.HI_VAD: 6
pdf_data/st_keywords/vendor
  • GD:
    • G&D: 8
    • Giesecke & Devrient: 7
  • Infineon:
    • Infineon: 5
    • Infineon Technologies AG: 4
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 3
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 59
  • RSA:
    • RSA 2048: 2
    • RSA2048: 2
pdf_data/st_keywords/hash_function
  • RIPEMD:
    • RIPEMD-160: 2
    • RIPEMD160: 1
  • SHA:
    • SHA2:
      • SHA-2: 3
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 7
  • MAC:
    • MAC: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • physical tampering: 9
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS 3: 103
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS 32: 1
    • AIS20: 1
    • AIS31: 1
  • FIPS:
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 9796-1: 1
    • ISO/IEC 9796-2: 1
  • PKCS:
    • PKCS#1: 3
pdf_data/st_metadata
  • /Author: WannaStation (M) Sdn Bhd
  • /CreationDate: D:20131030112613+08'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20131030112613+08'00'
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1048687
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: Giesecke & Devrient
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20090108190334+01'00'
  • /Creator: Acrobat PDFMaker 7.0 für Word
  • /Keywords: Version 1.0/Status 08.01.2009
  • /ModDate: D:20090108190834+01'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Subject: STARCOS 3.2 QES V2.0B
  • /Title: Security Target
  • pdf_file_size_bytes: 332386
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 72
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different