| name |
SecurePay Platform V4.9.1 |
IDmove v4 on Infineon in EAC with PACE configuration with AA in option OS Commercial Version : 0x 09 08 06 ; OS Unique Identifier : 0x DC 71 (ANSSI-CC-2019/57-R01) |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
MY |
FR |
| status |
active |
active |
| not_valid_after |
16.06.2026 |
18.07.2028 |
| not_valid_before |
16.06.2021 |
18.07.2023 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2019_57-R01fr.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C119-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2019_57-R01fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurePay%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2019_57-R01en.pdf |
| manufacturer |
SecurePay Sdn. Bhd. |
Idemia / Infineon Technologies AG |
| manufacturer_web |
https://www.securepay.my/ |
|
| security_level |
EAL2 |
EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst |
b61f25e372177a5d |
1e34ebbbce73b3ae |
| heuristics/cert_id |
ISCB-5-RPT-C119-CR-v1 |
ANSSI-CC-2019/57-R01 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions |
4.9.1 |
71, 2019, 57, 08, 09, 06 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-1110-V5-2022 |
| heuristics/scheme_data |
- cert_no: 2021-003-C119
- certification_date: 16.06.2021
- developer: SecurePay Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C119
- certification_date: 16.06.2021
- developer: A-3A-13, Blok A, Radia Office,Persiaran Arked, Bukit Jelutong,40150 Shah Alam, Selangor Amir Amir Haris Ahmad ([email protected]) https://www.securepay.my/
- expiration_date: 16.06.2026
- mutual_recognition: CCRA
- product: SecurePay Platform V4.9.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/ISCB-5-RPT-C119-CR-v1.pdf
- scope: The TOE is a software platform as a service whilst installed, configured and deployed on an enterprise cloud environment. The TOE is used by corporate, S_M_E_'s_ _or merchants as a secure payment processing platform for their customers. Users also able to perform e-commerce transaction, sending bills, bulk payments, collections and statutory payments. The TOE is connected to various banks which facilitate same day processing, ensure data integrity, reduces processing discrepancies and faster response time. It is simple, robust, user friendly, scalable, secured and available 24x7.Below are the primary features of the TOE: E-Commerce - Users able to use the TOE as an e-commerce portal and conduct business over the internet. Collection - Users able to create bill form and payment form for their customers Payment Processing - The TOE provides a secure payment processing platform and it is connected to various major banks in Malaysia API integration - Third-party developers able to use and access the TOE via API integrations
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/SecurePay_Security_Target_v1.0.pdf
- type: Other Devices and Systems
- expiration_date: 16.06.2026
- level: EAL2
- product: SecurePay Platform V4.9.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/131
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-1110-V5-2022 |
| heuristics/protection_profiles |
{} |
a33327d40f253f46, b380aabf93b29692 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename |
ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
Certificat-CC-2019_57-R01fr.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
- /CreationDate: D:20210702032620Z00'00'
- /Creator: Word
- /ModDate: D:20210702032620Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 196015
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
- /CreationDate: D:20230720131754+02'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20230720132020+02'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 159428
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
ISCB-5-RPT-C119-CR-v1.pdf |
ANSSI-CC-2019_57-R01fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C119-CR-v1: 31
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 1
- FR:
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012-MA-02: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 2
- BSI-PP-0084-2014: 1
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL2: 2
- EAL5: 1
- EAL6: 1
- EAL7: 1
- ITSEC:
|
| pdf_data/report_keywords/cc_sar |
|
- AGD:
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 1
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 2
- FIA_UAU.6: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CLOUD: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.TIMESTAMP: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES-: 1
- AES-128: 1
- AES-192: 1
- DES:
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- ICAO:
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210624100326Z00'00'
- /Creator: Word
- /ModDate: D:20210624100326Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 952717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
|
| pdf_data/st_filename |
SecurePay Security Target v1.0.pdf |
ANSSI-cible-CC-2019_57-R01en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-1110-V5-2022: 2
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0056: 1
- BSI-PP-0084-2014: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 2
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 4
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 5
- AGD:
- AGD_OPE: 3
- AGD_OPE.1: 6
- AGD_PRE: 7
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_SCT: 2
- ALC_STM: 2
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 4
- ATE_IND.2: 1
- AVA:
- AVA_VAN.3: 1
- AVA_VAN.5: 8
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 13
- FAU_SAS.1.1: 3
- FCS:
- FCS_CKM: 53
- FCS_CKM.1: 21
- FCS_CKM.2: 2
- FCS_CKM.4: 46
- FCS_CKM.4.1: 2
- FCS_COP: 75
- FCS_COP.1: 42
- FCS_RND: 6
- FCS_RND.1: 16
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 32
- FDP_ACC.1: 19
- FDP_ACF: 34
- FDP_ACF.1: 46
- FDP_ACF.1.2: 1
- FDP_IFC.1: 6
- FDP_ITC: 8
- FDP_ITC.1: 12
- FDP_ITC.2: 4
- FDP_RIP.1: 8
- FDP_RIP.1.1: 2
- FDP_UCT: 17
- FDP_UCT.1: 9
- FDP_UIT: 17
- FDP_UIT.1: 16
- FIA:
- FIA_AFL: 10
- FIA_AFL.1: 12
- FIA_API: 17
- FIA_API.1: 12
- FIA_API.1.1: 2
- FIA_SOS.2: 1
- FIA_UAU: 86
- FIA_UAU.1: 14
- FIA_UAU.4: 8
- FIA_UAU.5: 11
- FIA_UAU.6: 12
- FIA_UID: 19
- FIA_UID.1: 17
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 17
- FMT_LIM.1.1: 3
- FMT_LIM.2: 16
- FMT_LIM.2.1: 3
- FMT_MOF: 17
- FMT_MOF.1: 10
- FMT_MSA.1: 2
- FMT_MSA.3: 7
- FMT_MTD: 119
- FMT_MTD.1: 67
- FMT_MTD.3: 6
- FMT_MTD.3.1: 2
- FMT_SMF.1: 19
- FMT_SMF.1.1: 2
- FMT_SMR: 11
- FMT_SMR.1: 12
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 14
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS.1: 9
- FPT_FLS.1.1: 2
- FPT_PHP.3: 10
- FPT_PHP.3.1: 2
- FPT_TST.1: 8
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 14
- FTP_ITC.1: 25
- FTP_TRP.1: 4
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CLOUD: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.TIMESTAMP: 3
- O:
- O.ACC_CONTROL: 1
- O.ACC_CTRL: 4
- O.AUDREC: 3
- O.AUTH: 4
- O.MANAGE: 4
- O.PASSWORD: 3
- O.TOECOM: 4
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 4
- OE.CLOUD: 2
- OE.TIMESTAMP: 3
- T:
- T.AUDREC: 3
- T.NOMGMT: 2
- T.PSWD_CRACKING: 2
- T.UNAUTH: 3
- T.WEB_ATTACK: 3
|
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- STMicroelectronics:
|
- Idemia:
- Infineon:
- Infineon: 17
- Infineon Technologies AG: 2
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 3
- SHA-256: 5
- SHA-384: 3
- SHA-512: 4
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 7
- Physical Tampering: 6
- Physical tampering: 2
- fault injection: 1
- malfunction: 6
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 19
- EF.DG1: 20
- EF.DG13: 2
- EF.DG14: 4
- EF.DG15: 2
- EF.DG16: 19
- EF.DG2: 6
- EF.DG3: 13
- EF.DG4: 13
- EF.DG5: 4
- EF.SOD: 16
|
| pdf_data/st_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 4
- ISO/IEC 18013: 10
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- PKCS:
- RFC:
- SCP:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
- /Author: BOUKYOUD
- /CreationDate: D:20221222173455+01'00'
- /ModDate: D:20221222173455+01'00'
- /Producer: Microsoft: Print To PDF
- /Title: Microsoft Word - FQR 110 9127 Ed6.docx
- pdf_file_size_bytes: 2538578
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
True |
| state/cert/download_ok |
True |
True |
| state/cert/extract_ok |
True |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |