name |
MX-FR10 Version:C.10 |
Bundesdruckerei Document Application with tamper-evident casing 2.5.1, Firmware Version 1.5.8, TOE Casing Version 0 |
category |
Other Devices and Systems |
Other Devices and Systems |
scheme |
JP |
DE |
status |
archived |
active |
not_valid_after |
31.07.2014 |
19.07.2028 |
not_valid_before |
27.07.2009 |
20.07.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1215c_pdf.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0226_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1215a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0226_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/1215b_pdf.pdf |
manufacturer |
Sharp Corporation |
Bundesdruckerei GmbH |
manufacturer_web |
https://sharp-world.com/ |
https://www.bundesdruckerei.de |
security_level |
EAL3 |
EAL3 |
dgst |
b4bab3db4118c65f |
2ca8cb6f67dcfa4a |
heuristics/cert_id |
JISEC-CC-CRP-C0226 |
BSI-DSZ-CC-1215-2023 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, AGD_OPE.1, AVA_VAN.2, ASE_OBJ.2, ATE_DPT.1, ASE_REQ.2, ALC_DEL.1, ALC_CMC.3, ATE_COV.2, ASE_SPD.1, ALC_CMS.3, ATE_IND.2, ASE_TSS.1, ADV_FSP.3, ADV_TDS.2, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ASE_CCL.1, ASE_ECD.1, ATE_FUN.1, ALC_DVS.1 |
ASE_TSS.1, ASE_CCL.1, ADV_ARC.1, AGD_OPE.1, ASE_INT.1, ADV_TDS.2, ATE_COV.2, ALC_CMC.3, ALC_LCD.1, ATE_FUN.1, ALC_DEL.1, AVA_VAN.5, ASE_REQ.2 |
heuristics/extracted_versions |
10 |
2.5.1, 1.5.8 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
BSI-DSZ-CC-1247-2025 |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1181-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
BSI-DSZ-CC-1247-2025 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1093, BSI-DSZ-CC-1125-2019, BSI-DSZ-CC-1161-2020, BSI-DSZ-CC-1181-2021 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0226
- certification_date: 01.07.2009
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0226_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an “MFD”. One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD or the Flash memory in the MFD, - the erasure function, which overwrites random or constant numbers onto storage areas that store encrypted data, - the confidential file function, which protects image data that a user files with a password so as not to be abused by others, - the network protection function, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR10
- product_type: data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0226_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0226_est.pdf
- toe_version: C.10
- vendor: Sharp Corporation
- expiration_date: 01.07.2014
- supplier: Sharp Corporation
- toe_japan_name: MX-FR10 C.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0226_it8240.html
- toe_overseas_name: MX-FR10 C.10
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
2f40ca96ef4a080e |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0064V2b_pdf.pdf |
pdf_data/cert_filename |
|
1215c_pdf.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /Subject: Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018
- /Title: Certificate BSI-DSZ-CC-1215-2023
- pdf_file_size_bytes: 234391
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
pdf_data/report_filename |
c0226_erpt.pdf |
1215a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cc_security_level: Common Criteria Part 3 conformant EAL 3 valid until: 19 July 2028
- cc_version: PP conformant Common Criteria Part 2 extended
- cert_id: BSI-DSZ-CC-1215-2023
- cert_item: Bundesdruckerei Document Application with tamper-evident casing 2.5.1 Firmware Version 1.5.8, TOE Casing Version 0
- cert_lab: BSI
- developer: Bundesdruckerei GmbH
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
- ref_protection_profiles: Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064- V2-2018, Version: 2.0, 2018-06-06, Federal Office for Information Security (BSI
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0226-01: 1
- Certification No. C0226: 1
|
- DE:
- BSI-DSZ-CC-1181-2021: 3
- BSI-DSZ-CC-1215: 1
- BSI-DSZ-CC-1215-2023: 15
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0064-: 1
- BSI-CC-PP-0064-V2-2018: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 3
- EAL 3: 4
- EAL 4: 1
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
- FAU:
- FIA:
- FIA_API.1: 1
- FIA_UAU.2: 1
- FIA_UAU.4: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 1
- FIA_UID.2: 1
- FMT:
- FMT_MTD: 3
- FMT_SMF.1: 1
- FMT_SMR.1: 1
- FPT:
- FTP:
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 1
- T.REMOTE: 1
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 1
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
- TUV:
- TÜV Informationstechnik: 4
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA224: 1
- SHA256: 8
- SHA384: 5
- SHA512: 1
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
|
- BSI:
- AIS 20: 1
- AIS 32: 1
- AIS 38: 1
- AIS 48: 1
- FIPS:
- FIPS 197: 8
- FIPS PUB 46-3: 2
- FIPS180-4: 8
- FIPS186-2: 6
- FIPS186-4: 1
- FIPS197: 1
- ICAO:
- ISO:
- ISO/IEC 15408: 4
- ISO/IEC 15946-: 6
- ISO/IEC 17065: 2
- ISO/IEC 18045: 4
- ISO/IEC 9797-: 2
- RFC:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- BSI) [9] Configuration list for the TOE, Version 1.43, 2023-04-26, ALC_CMS_DMT- V1.xx.xlsx (confidential document) [10] Guidance documentation for the TOE, Version 1.201, 2023-04-18, VISOTEC® V-ÄNDERUNGSTERMINAL: 1
- Evaluation Technical Report, Version 2, 2023-06-21, BSI-DSZ-CC-1215, TÜV Informationstechnik GmbH (confidential document) [8] Common Criteria Protection Profile for Document Management Terminal DMT-PP: 1
- being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
|
pdf_data/report_metadata |
- /Author: IPA/JISEC
- /Company: IPA
- /CreationDate: D:20110907095030+09'00'
- /Creator: Word 用 Acrobat PDFMaker 8.1
- /Manager: IPA
- /ModDate: D:20110907095111+09'00'
- /Producer: Acrobat Distiller 8.3.0 (Windows)
- /Title: CRP-e
- pdf_file_size_bytes: 317037
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 23
|
- /Author: Federal Office for Information Security
- /Keywords: "Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018"
- /Subject: Common Criteria, Certification, Zertifizierung, Bundesdruckerei GmbH, Common Criteria Protection Profile for Document Management Terminal DMT-PP, BSI-CC-PP-0064-V2-2018
- /Title: Certification Report BSI-DSZ-CC-1215-2023
- pdf_file_size_bytes: 443562
- pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, http://www.commoncriteriaportal.org/cc/, https://www.commoncriteriaportal.org/, https://www.bsi.bund.de/, https://www.bsi.bund.de/zertifizierungsreporte, https://www.bsi.bund.de/AIS, https://www.sogis.eu/, http://www.commoncriteriaportal.org/
- pdf_is_encrypted: False
- pdf_number_of_pages: 29
|
pdf_data/st_filename |
c0226_est.pdf |
1215b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0064-: 1
- BSI-CC-PP-0064-V2-2018: 3
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL3: 1
- EAL4+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.2: 1
- AGD:
- ALC:
- ALC_CMC.3: 1
- ALC_DEL.1: 1
- ALC_LCD.1: 1
- APE:
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
- AVA_VAN.2: 1
- AVA_VAN.5: 2
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM: 17
- FCS_CKM.1: 5
- FCS_CKM.2: 3
- FCS_CKM.4: 12
- FCS_COP: 19
- FCS_COP.1: 5
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 9
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 3
- FDP_ITC.2: 3
- FDP_RIP: 1
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 22
- FIA_AFL.1: 4
- FIA_SOS: 16
- FIA_SOS.1: 2
- FIA_UAU: 44
- FIA_UAU.1: 10
- FIA_UAU.2: 2
- FIA_UAU.7: 2
- FIA_UID: 24
- FIA_UID.1: 10
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 30
- FMT_MTD.1: 4
- FMT_SMF.1: 32
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 16
- FTA:
- FTA_TSE.1: 9
- FTA_TSE.1.1: 1
- FTP:
- FTP_ITC.1: 13
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 15
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_GEN.1: 5
- FAU_GEN.1.1: 3
- FAU_GEN.1.2: 2
- FCS:
- FCS_CKM: 13
- FCS_CKM.1: 15
- FCS_CKM.4: 5
- FCS_CKM.4.1: 1
- FCS_COP: 29
- FCS_COP.1: 25
- FCS_RNG: 3
- FCS_RNG.1: 6
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_RIP.1: 4
- FDP_RIP.1.1: 1
- FIA:
- FIA_API: 1
- FIA_API.1: 6
- FIA_API.1.1: 1
- FIA_UAU.1: 3
- FIA_UAU.2: 6
- FIA_UAU.2.1: 1
- FIA_UAU.4: 5
- FIA_UAU.4.1: 1
- FIA_UAU.5: 4
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6: 4
- FIA_UAU.6.1: 1
- FIA_UID.1: 2
- FIA_UID.2: 6
- FIA_UID.2.1: 1
- FMT:
- FMT_MTD: 22
- FMT_MTD.1: 5
- FMT_SMF.1: 7
- FMT_SMF.1.1: 1
- FMT_SMR.1: 5
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP: 4
- FTP_TRP.1: 3
- FTP_TRP.1.2: 1
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 4
- A.OPERATOR: 4
- O:
- O.FAXTONET: 6
- O.FILTER: 9
- O.MANAGE: 11
- O.REMOVE: 7
- O.RESIDUAL: 7
- O.TRP: 8
- O.USER: 6
- OE:
- OE.CIPHER: 3
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 4
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 5
- T.REMOTE: 3
- T.SPOOF: 4
- T.TAMPER: 3
- T.TAP: 4
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 2
- SHA-256: 5
- SHA-384: 2
- SHA-512: 2
- SHA256: 2
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
- Brainpool:
- brainpoolP224r1: 1
- brainpoolP256r1: 1
- brainpoolP384r1: 1
- brainpoolP512r1: 1
- NIST:
- NIST P-384: 1
- P-256: 2
- P-384: 1
- prime256v1: 2
- secp256r1: 2
- secp384r1: 3
- secp521r1: 1
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 2
- EF.DG1: 2
- EF.DG13: 1
- EF.DG16: 2
- EF.DG2: 1
- EF.DG3: 2
- EF.DG4: 2
- EF.DG5: 1
- EF.SOD: 2
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- FIPS:
- FIPS 180-4: 2
- FIPS 186-2: 1
- FIPS 186-4: 1
- FIPS PUB 197: 1
- FIPS180-4: 3
- FIPS186-2: 2
- FIPS186-4: 3
- FIPS197: 2
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816-4: 1
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /CreationDate: D:20110830153943+09'00'
- /ModDate: D:20110830153943+09'00'
- pdf_file_size_bytes: 327485
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 44
|
- /Author: Alexander Haferland
- /Keywords: CC, ST, Common Criteria, Security Target, Inspection System, PA, eAT, ePass
- /Subject: Security Target
- /Title: Bundesdruckerei Document Application Common Criteria Evaluation
- pdf_file_size_bytes: 1530980
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 91
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |