name |
EOS-1D Mark II firmware Ver.1.0.1 |
S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
20.12.2010 |
11.12.2024 |
not_valid_before |
01.01.2007 |
11.12.2019 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882V2c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882V2a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0010_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0882V2b_pdf.pdf |
manufacturer |
Canon Inc. |
Samsung Electronics Co., Ltd. |
manufacturer_web |
https://www.canon.com/ |
https://www.samsung.com |
security_level |
EAL2+, ALC_DVS.1 |
AVA_VAN.5, EAL5+, ALC_DVS.2 |
dgst |
b0c543b69416411f |
f97de67112a8125c |
heuristics/cert_id |
JISEC-CC-CRP-C0010 |
BSI-DSZ-CC-0882-V2-2019 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_USR.1, AVA_SOF.1, AVA_VLA.1, ADV_RCR.1, ALC_DVS.1, ATE_COV.1, ADV_FSP.1, ATE_IND.2, ADV_HLD.1, AGD_ADM.1, ATE_FUN.1 |
AGD_OPE.1, ALC_CMS.5, ALC_TAT.2, ASE_ECD.1, ADV_TDS.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ADV_INT.2, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, ADV_FSP.5, ALC_CMC.4, AGD_PRE.1 |
heuristics/extracted_versions |
1.0.1 |
0, 32 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0882-2013 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0719-2011, BSI-DSZ-CC-0801-2012, BSI-DSZ-CC-0720-2011, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009, BSI-DSZ-CC-0882-2013 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0010
- certification_date: 01.08.2004
- claim: EAL2+ ALC_DVS.1
- enhanced:
- assurance_level: EAL2+ALC_DVS.1
- description: PRODUCT DESCRIPTION The product is EOS-1D Mark II digital camera in which the firmware of the digital camera (TOE) was included. Unlike the conventional 35mm film photos, the photos taken by the digital camera have various merits. For example, the photos taken by digital camera do not require development and printing, these photos do no have secular degradation, and these photos are easy to store, search and transmit. On the other hand, because of digitized photos, there are some demerits that digitized photos have the feature that processing and alteration can be easily performed using photo retouch tools. In using the photos taken by the digital camera as the evidence, the integrity of the photos is becoming a big issue. The firmware which is TOE provides the function that generate the verification data, which verify the integrity of the photos taken by EOS-1D Mark II. Please refer to "EOS-1D Mark II" on the following URLs for detail information about the product. (English) http://www.canon.co.jp/Imaging/BeBit-e.html
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
- product: EOS-1D Mark II firmware Ver.1.0.1
- product_type: IT product (Embedded software)
- vendor: Canon Inc.
- expiration_date: 01.07.2011
- revalidations: [frozendict({'date': '2005-11', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023_02.html'})]
- supplier: Canon Inc.
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0010_it4023.html
- toe_japan_name: EOS-1D Mark II firmware Ver.1.0.1
- toe_overseas_link: None
- toe_overseas_name: EOS-1D Mark II N firmware Ver.1.0.1A
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
|
0882V2c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0882-V2-2019: 1
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
- EAL:
- EAL 2: 1
- EAL 5: 2
- EAL 5 augmented: 1
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191216114820+01'00'
- /Creator: Writer
- /Keywords: S3CS9AB, 32-Bit, RISC, Microcontroller, Smart Cards, Samsung
- /ModDate: D:20191216143837+01'00'
- /Producer: LibreOffice 6.2
- /Subject: S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated SoftwarefromSamsung Electronics
- /Title: Certification Report BSI-DSZ-CC-0882-V2-2019
- pdf_file_size_bytes: 289486
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0010_erpt.pdf |
0882V2a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 5 augmented by AVA_VAN.5 and ALC_DVS.2
- cc_version: PP conformant plus product specific extensions Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-0882-V2-2019
- cert_item: S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated Software
- cert_lab: BSI
- developer: Samsung Electronics
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP-0035-2007
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0010-01: 1
- Certification No. C0010: 1
|
- DE:
- BSI-DSZ-CC-0882-2013: 3
- BSI-DSZ-CC-0882-V2-2019: 15
- NL:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
- EAL:
- EAL2: 3
- EAL2 augmented: 2
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 2+: 1
- EAL 4: 1
- EAL 5: 7
- EAL 5 augmented: 3
- EAL 5+: 1
- EAL 6: 1
- EAL5: 1
|
pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 5
- ALC_FLR: 2
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
- TUV:
- TÜV Informationstechnik: 2
- TÜViT: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- physical tampering: 1
- SCA:
- DPA: 1
- SPA: 1
- physical probing: 1
- side-channel: 1
- other:
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 2
- CCIMB-99-033: 2
- FIPS:
- ISO:
|
- BSI:
- AIS 25: 2
- AIS 26: 1
- AIS 31: 3
- AIS 32: 1
- AIS 34: 2
- AIS 35: 2
- AIS 36: 3
- AIS 37: 1
- AIS 38: 1
- AIS 47: 1
- AIS31: 3
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 16] SITE TECHNICAL AUDIT REPORT (STAR), PKL Co., Ltd., Cheonan, Version 4, 02- 12-2019, TÜViT (confidential document) [17] SITE TECHNICAL AUDIT REPORT (STAR), Toppan Photomasks Korea Ltd., Korea Icheon, Version 1: 1
- IC Dedicated Software, BSI-DSZ-CC-0882-V2-2019, Version 2.2, 14-10- 2019, Samsung Electronics (confidential document) [7] Security IC Platform Protection Profile, Version 1.0, 15 June 2007, BSI-CC-PP- 0035-2007 [8: 1
- Report Summary (ETR Summary), BSI-DSZ-CC-0882-V2, S3CS9AB Revision 0, Version 3, 02-12-2019, TÜViT (confidential document) [9] Security Target Lite of S3CS9AB 32-Bit RISC Microcontroller for Smart Cards with specific IC: 1
- TÜViT (confidential document) 21 / 25 Certification Report BSI-DSZ-CC-0882-V2-2019 C. Excerpts from the Criteria For the: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
- evaluation according to AIS 36 for the Product S3CS9AB Revision 0, Version 3, 02-12-2019, TÜViT (confidential document) [11] SC100 Reference Manual, Version 0.0, 15-07-2013, Samsung Electronics [12] S3CS9AB 32-Bit CMOS: 1
|
pdf_data/report_metadata |
- /CreationDate: D:20051222105917+09'00'
- /ModDate: D:20051222105917+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 86516
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 18
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20191216112553+01'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, Samsung, Smartcard, EAL5"
- /ModDate: D:20191216114644+01'00'
- /Producer: LibreOffice 6.2
- /Subject: S3CS9AB 32-Bit RISC Microcontroller for Smart Cards, Revision 0 with specific IC Dedicated SoftwarefromSamsung Electronics
- /Title: Certification Report BSI-DSZ-CC-0882-V2-2019
- pdf_file_size_bytes: 703586
- pdf_hyperlinks: http://www.commoncriteriaportal.org/cc/, https://www.sogis.eu/, https://www.bsi.bund.de/AIS, https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/, http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/zertifizierungsreporte
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
pdf_data/st_filename |
c0010_est.pdf |
0882V2b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL2: 4
- EAL2 augmented: 3
- EAL2+: 1
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL 5: 2
- EAL 5 augmented: 2
- EAL5: 6
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 5
- ADO_IGS.1: 4
- ADV:
- ADV_FSP.1: 12
- ADV_HLD.1: 8
- ADV_RCR.1: 6
- AGD:
- AGD_ADM.1: 9
- AGD_USR.1: 6
- ALC:
- ATE:
- ATE_COV.1: 6
- ATE_FUN.1: 5
- ATE_IND.2: 6
- AVA:
- AVA_SOF.1: 6
- AVA_VLA.1: 4
|
- ADV:
- ADV_ARC.1: 7
- ADV_ARV: 1
- ADV_FSP: 2
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- ADV_VAN: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 2
- AGD_PRE: 1
- AGD_PRE.1: 2
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 2
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 1
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 2
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 4
- FCS_COP: 2
- FCS_COP.1: 11
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 1
- FDP_IFC.1: 1
- FDP_ITC.1: 2
- FMT:
- FMT_MOF.1: 1
- FMT_MSA.2: 6
- FPT:
- FTP:
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 1
- FAU_SAS: 8
- FAU_SAS.1: 12
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM.1: 6
- FCS_CKM.4: 4
- FCS_COP: 8
- FCS_COP.1: 9
- FCS_RNG: 6
- FCS_RNG.1: 15
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 13
- FDP_ACC.1.1: 1
- FDP_ACF: 2
- FDP_ACF.1: 9
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC: 1
- FDP_IFC.1: 18
- FDP_IFC.1.1: 1
- FDP_IFF.1: 3
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_ITT: 1
- FDP_ITT.1: 17
- FDP_ITT.1.1: 1
- FDP_SDI.1: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 24
- FMT_LIM.1.1: 2
- FMT_LIM.2: 28
- FMT_LIM.2.1: 2
- FMT_MSA: 2
- FMT_MSA.1: 9
- FMT_MSA.1.1: 1
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 21
- FPT_FLS.1.1: 1
- FPT_ITT: 1
- FPT_ITT.1: 15
- FPT_ITT.1.1: 1
- FPT_PHP: 3
- FPT_PHP.3: 20
- FPT_PHP.3.1: 1
- FRU:
- FRU_FLT: 1
- FRU_FLT.1: 1
- FRU_FLT.2: 17
|
pdf_data/st_keywords/cc_claims |
- A:
- O:
- OE:
- OE.LOG_TAMER: 2
- OE.LOG_TAMPER: 8
- OE.PHS_TAMPER: 10
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- 3DES:
- 3DES: 6
- TDEA: 1
- Triple-DES: 2
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 24
- malfunction: 11
- physical tampering: 2
- SCA:
- DPA: 3
- Leak-Inherent: 21
- Physical Probing: 4
- Physical probing: 2
- SPA: 2
- physical probing: 9
- side-channel: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- AIS 31: 2
- AIS31: 1
- BSI-AIS31: 3
- CC:
- CCMB-2017-04-001: 3
- CCMB-2017-04-002: 3
- CCMB-2017-04-003: 3
- CCMB-2017-04-004: 3
- FIPS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function: 1
- cryptographic algorithm). The algorithm of the secure hash function (cryptographic algorithm) is out of scope of the strength of function. 6.4 Assurance Measures This section provides the TOE assurance: 1
- out of scope: 1
|
|
pdf_data/st_metadata |
- /CreationDate: D:20051222105245+09'00'
- /ModDate: D:20051222105245+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 106178
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 30
|
- /Author: Junghyun KIM
- /CreationDate: D:20191210200347+09'00'
- /Creator: Microsoft® Word 2016
- /Keywords: Security Lite Target of S3CS9AB
- /ModDate: D:20191210200715+09'00'
- /Producer: Microsoft® Word 2016
- /Subject: Security Lite Target of S3CS9AB
- /Title: Security Lite Target
- pdf_file_size_bytes: 785729
- pdf_hyperlinks: http://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 57
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |