| name |
SecurePay Platform V4.9.1 |
EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100 |
| category |
Other Devices and Systems |
Other Devices and Systems |
| scheme |
MY |
CA |
| status |
active |
archived |
| not_valid_after |
16.06.2026 |
15.05.2017 |
| not_valid_before |
16.06.2021 |
09.08.2011 |
| cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
|
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C119-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v20-cert-eng.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SecurePay%20Security%20Target%20v1.0.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-vnx-v20-sec-eng.pdf |
| manufacturer |
SecurePay Sdn. Bhd. |
EMC Corporation |
| manufacturer_web |
https://www.securepay.my/ |
https://www.emc.com/ |
| security_level |
EAL2 |
ALC_FLR.2, EAL3+ |
| dgst |
b61f25e372177a5d |
5971db1acc95e3a9 |
| heuristics/cert_id |
ISCB-5-RPT-C119-CR-v1 |
383-4-181 |
| heuristics/cert_lab |
[] |
CANADA |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ALC_CMS.2, AGD_OPE.1, ATE_COV.1, ASE_CCL.1, ADV_ARC.1, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ADV_FSP.2, AGD_PRE.1, ALC_CMC.2, ASE_TSS.1, ASE_REQ.2, ASE_OBJ.2 |
ALC_DEL.1, ATE_FUN.1, ASE_INT.1, ADV_FSP.3, AGD_OPE.1, ASE_CCL.1, ADV_ARC.1, ATE_COV.2, AVA_VAN.2, ASE_SPD.1, ATE_IND.2, ATE_DPT.1, ADV_TDS.2, ASE_ECD.1, ALC_CMS.3, AGD_PRE.1, ALC_DVS.1, ASE_TSS.1, ALC_FLR.2, ASE_REQ.2, ALC_CMC.3, ALC_LCD.1, ASE_OBJ.2 |
| heuristics/extracted_versions |
4.9.1 |
2.0 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- cert_no: 2021-003-C119
- certification_date: 16.06.2021
- developer: SecurePay Sdn. Bhd.
- enhanced:
- assurance_level: EAL2
- category: Other Devices and Systems
- cert_id: C119
- certification_date: 16.06.2021
- developer: A-3A-13, Blok A, Radia Office,Persiaran Arked, Bukit Jelutong,40150 Shah Alam, Selangor Amir Amir Haris Ahmad ([email protected]) https://www.securepay.my/
- expiration_date: 16.06.2026
- mutual_recognition: CCRA
- product: SecurePay Platform V4.9.1
- report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/ISCB-5-RPT-C119-CR-v1.pdf
- scope: The TOE is a software platform as a service whilst installed, configured and deployed on an enterprise cloud environment. The TOE is used by corporate, S_M_E_'s_ _or merchants as a secure payment processing platform for their customers. Users also able to perform e-commerce transaction, sending bills, bulk payments, collections and statutory payments. The TOE is connected to various banks which facilitate same day processing, ensure data integrity, reduces processing discrepancies and faster response time. It is simple, robust, user friendly, scalable, secured and available 24x7.Below are the primary features of the TOE: E-Commerce - Users able to use the TOE as an e-commerce portal and conduct business over the internet. Collection - Users able to create bill form and payment form for their customers Payment Processing - The TOE provides a secure payment processing platform and it is connected to various major banks in Malaysia API integration - Third-party developers able to use and access the TOE via API integrations
- status: Valid
- target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C119/SecurePay_Security_Target_v1.0.pdf
- type: Other Devices and Systems
- expiration_date: 16.06.2026
- level: EAL2
- product: SecurePay Platform V4.9.1
- recognition: CCRA
- url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/certified-products-and-systems-5/submission-view/131
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
ISCB-5-CERT-C119-CERTIFICATE-v1.pdf |
|
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
ISCB-5-RPT-C119-CR-v1.pdf |
emc-vnx-v20-cert-eng.pdf |
| pdf_data/report_frontpage |
|
- CA:
- cert_id: 383-4-181-CR
- cert_lab: CANADA
|
| pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-5-RPT-C119-CR-v1: 31
|
- CA:
- 383-4-181: 1
- 383-4-181-CR: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 3: 4
- EAL 3 augmented: 1
- EAL 3+: 3
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 2
- FAU_SAR.1: 3
- FDP:
- FDP_ACC.1: 2
- FDP_ACF.1: 2
- FIA:
- FIA_ATD.1: 2
- FIA_SOS.1: 2
- FIA_UAU.1: 2
- FIA_UAU.2: 2
- FIA_UAU.6: 2
- FMT:
- FMT_MSA.1: 2
- FMT_MSA.3: 1
- FMT_MTD.1: 2
- FMT_SMF.1: 2
- FMT_SMR.1: 2
- FTP:
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.CLOUD: 1
- A.NOEVIL: 1
- A.NOTRST: 1
- A.TIMESTAMP: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20210624100326Z00'00'
- /Creator: Word
- /ModDate: D:20210624100326Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H524) Quartz PDFContext
- pdf_file_size_bytes: 952717
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 32
|
- /AM_ACPP_Date: [dd month yyyy]
- /AM_ACPP_Doc#: [AM_AMCPP_Doc#]
- /AM_ACPP_Title: Assurance Continuity Program Plan (ACPP)
- /AM_ACPP_Version: [AM_AMCPP_Version]
- /AM_IAR_Date: [dd month yyyy]
- /AM_IAR_Doc#: [AM_IAR_Doc#]
- /AM_IAR_Title: Assurance Maintenace Impact Analysis Report
- /AM_IAR_Version: [AM_IAR_Version]
- /AM_ST Date: [dd month yyyy]
- /AM_ST Title: [AM_ST Title]
- /AM_ST Version: [AM_ST Version]
- /AM_TOE: [AM_TOE]
- /AM_TOE Short: [AM_TOE Short]
- /AM_TOE Version: [AM_TOE Version]
- /Author: sjackson
- /CC Version: 3.1R3
- /CC date: July 2009
- /CEM Version: 3.1R3
- /CEM date: July 2009
- /CR_Date: TBD
- /CR_Version: 1.0
- /Client City: Hopkinton
- /Client Country: USA
- /Client Full Name: EMC Corporation
- /Client Postal Code: 01748
- /Client Short Name: EMC
- /Client State: MA
- /Client Street: 171 South Street
- /Comments: PCR Template Version 0.1-EWA-C (for CC 3.1)
- /Company: Hewlett-Packard
- /CreationDate: D:20110908103844-04'00'
- /Creator: Acrobat PDFMaker 10.0 for Word
- /Developer Long Name: EMC Corporation
- /Developer Short Name: EMC
- /EAL Level: 3+
- /EAL Level Base: 3
- /EAL Level Text: 3 augmented
- /EAL Long: EAL 3 Augmented
- /EAL Short: EAL 3+
- /ER Document Date: 15 November 2010
- /ER Version: Version 1.0
- /ETPlan_Doc#: 1685-000-D003
- /ETPlan_Title: Evaluation Test Plan
- /ETPlan_Version: 1.0
- /ETPlan_date: 8 July 2011
- /ETProcRes_Date: TBD
- /ETProcRes_Doc#: 1685-000-D005
- /ETProcRes_Title: Evaluation Test Results
- /ETProcRes_Version: 0.1
- /ETProc_Date: 8 July 2011
- /ETProc_Doc#: 1685-000-D004
- /ETProc_Title: Evaluation Test Procedures and Test Resulta
- /ETProc_Version: 1.0
- /ETReport_Date: 11 July 2011
- /ETReport_Doc#: 1685-000-D002
- /ETReport_Title: Evaluation Technical Report
- /ETReport_TitleShort: ETR
- /ETReport_Version: 0.4
- /EWP_Date: 15 December 2010
- /EWP_Doc#: 1685-000-D001
- /EWP_Title: Evaluation Work Plan
- /EWP_Version: 1.0
- /Eval number: 383-4-181
- /Eval_End_Date: 12 July 2011
- /Eval_Start_Date: 2 August 2010
- /Keywords:
- /LeadEvaluator: Greg Lague
- /LeadEvaluatorInitials: GL
- /ModDate: D:20110908103917-04'00'
- /Producer: Acrobat Distiller 10.0.0 (Windows)
- /ProjectManager: M. Gauvreau
- /ProjectManagerInitials: MG
- /ProjectNumber: 1685
- /ST_Date: 23 June 2011
- /ST_Title: EMC Corporation EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100 Security Target
- /ST_Version: 0.6
- /SVC_Date: TBD
- /SVC_Doc#: 1685-000-D007
- /SVC_Title: Site Visit Checklist
- /SVC_Version: 0.1
- /SVR_Date: 8 July 2011
- /SVR_Doc#: 1685-000-D006
- /SVR_Title: Site Visit Report
- /SVR_Version: 1.0
- /SV_City: Hopkinton, MA
- /Security Classification: EWA-Canada & EMC Proprietary
- /SourceModified: D:20110908140517
- /Sponsor: EMC
- /Sponsor City: Hopkinton
- /Sponsor Country: USA
- /Sponsor Postal Code: 01748
- /Sponsor State: MA
- /Sponsor Street: 171 South Street
- /Subject:
- /TOE: EMC® VNXe Operating Environment v2.0 with Unisphere™ running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE Short: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE Short with version: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE Short-NoTM: EMC VNXe Operating Environment v2.0
- /TOE Version: v2.0
- /TOE with version: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /TOE-NoTM: EMC VNXe Operating Environment v2.0 with Unisphere running on VNXe Series hardware models VNXe3300 and VNXe3100
- /Title: EAL X+ Evaluation of [Developer Long Name]
- pdf_file_size_bytes: 76805
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 12
|
| pdf_data/st_filename |
SecurePay Security Target v1.0.pdf |
emc-vnx-v20-sec-eng.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL3: 1
- EAL3 augmented: 1
- EAL3+: 4
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 2
- ASE_ECD.1: 1
- ASE_INT.1: 2
- ASE_OBJ.2: 2
- ASE_REQ.2: 2
- ASE_SPD.1: 2
- ASE_TSS.1: 4
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_FLR.2: 4
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 6
- FAU_GEN.1.1: 1
- FAU_SAR.1: 5
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC.1: 14
- FDP_ACC.1.1: 1
- FDP_ACF.1: 8
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FDP_IFF: 2
- FIA:
- FIA_ATD.1: 7
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 7
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.6: 5
- FIA_UAU.6.1: 1
- FIA_UID.1: 6
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA.1: 8
- FMT_MSA.1.1: 1
- FMT_MSA.3: 9
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 6
- FMT_MTD.1.1: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FTP:
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 7
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR.1: 6
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FDP:
- FDP_ACC: 20
- FDP_ACC.1: 2
- FDP_ACF: 16
- FDP_ACF.1: 8
- FDP_SDI.1: 1
- FDP_SDI.2: 7
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FIA:
- FIA_ATD.1: 6
- FIA_ATD.1.1: 1
- FIA_UAU.1: 1
- FIA_UAU.2: 7
- FIA_UAU.2.1: 1
- FIA_UID.1: 8
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FMT:
- FMT_MSA: 32
- FMT_MSA.1: 2
- FMT_MSA.3: 4
- FMT_MTD: 18
- FMT_MTD.1: 3
- FMT_SMF.1: 16
- FMT_SMF.1.1: 1
- FMT_SMR.1: 20
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.CLOUD: 3
- A.NOEVIL: 3
- A.NOTRST: 2
- A.TIMESTAMP: 3
- O:
- O.ACC_CONTROL: 1
- O.ACC_CTRL: 4
- O.AUDREC: 3
- O.AUTH: 4
- O.MANAGE: 4
- O.PASSWORD: 3
- O.TOECOM: 4
- OE:
- OE.ADMIN: 2
- OE.AUTHDATA: 4
- OE.CLOUD: 2
- OE.TIMESTAMP: 3
- T:
- T.AUDREC: 3
- T.NOMGMT: 2
- T.PSWD_CRACKING: 2
- T.UNAUTH: 3
- T.WEB_ATTACK: 3
|
- A:
- A.MANAGE: 2
- A.NOEVIL: 2
- A.PHYSICAL: 2
- A.PROTECT: 2
- A.TIMESTAMP: 2
- O:
- O.ADMIN: 23
- O.AUDIT: 4
- O.AUDIT_REVIEW: 4
- O.PROTECT: 16
- OE:
- OE.PROPER_NAME_ASSIGNME: 2
- OE.PROPER_NAME_ASSIGNMEN: 1
- OE.SECURE_COMMUNICATIO: 6
- OE.SECURE_COMMUNICATION: 1
- OE.SECURE_SERVERS: 7
- OE.TIME: 3
- T:
- T.DATA_CORRUPTION: 2
- T.IMPROPER_CONFIG: 2
- T.IMPROPER_SERVER: 2
- T.MEDIATE_ACCESS: 2
- T.UNAUTH: 2
|
| pdf_data/st_keywords/vendor |
- Microsoft:
- STMicroelectronics:
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
True |
False |
| state/cert/download_ok |
True |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |