name |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
not_valid_before |
2021-12-17
|
2013-05-15
|
not_valid_after |
2023-12-12
|
2019-09-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_56v2en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-29en.pdf
|
status |
archived
|
archived
|
manufacturer |
THALES DIS FRANCE SA
|
Gemalto / NXP Semiconductors
|
manufacturer_web |
https://www.thalesgroup.com/en/europe/france
|
https://www.gemalto.com/
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_56v2.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-29fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2018_56v2.pdf
|
None
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Protection Profile for Machine Readable Travel Document with 'ICAO Application', Basic Acce...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP0017b.pdf', 'pp_ids': None}) |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Java Card™ System Protection Profile Open Configuration, Version 2.6', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf', 'pp_ids': frozenset({'PDCP_V1.3'})}) |
maintenance_updates |
|
|
state/cert/convert_garbage |
True
|
False
|
state/cert/convert_ok |
True
|
False
|
state/cert/download_ok |
True
|
False
|
state/cert/extract_ok |
True
|
False
|
state/cert/pdf_hash |
bc1a323bf86f766a2a05002ebbe6cb7b1bfa796e1bcf72d951179ca97acf29fd
|
None
|
state/cert/txt_hash |
1018fd637a39b2bcf71a00c37edb1cf5c6ef25acde27358ee8cac90a772c107d
|
None
|
state/report/convert_garbage |
True
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
ef08f099149e3563348b259c3c17a57af626df249f41afb1f0e7a6c37a0c7275
|
09350e70013b325b02dc928be23ebfafdc4103557d4495759bc369c36b3a311c
|
state/report/txt_hash |
6a8ba41b7357f6221f27f5a0688a580043952960c24cb2abf92bb773bf07b3d2
|
3f1f3123a798f4edcf346c5349c15ab8bf17fe57abde45d4a551b3fb7d9954df
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
dbea7643ac66ba446ba75b9bb9ab26725d274afbd3d2469e3901d3ac33ee9adf
|
7882805b5b210f87bab3fb28cefb302a5167d4564e4974d3d654703e22971233
|
state/st/txt_hash |
54016fc5b7a689364a2bb7c5b94766f52735101957eba6c31f0059e76b7348e9
|
451f1e5d1afd354cc667040826f698caae1e42bfc2c205723b59548d7059fdb5
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2018/56v2
|
ANSSI-CC-2013/29
|
heuristics/cert_lab |
None
|
SERMA |
heuristics/cpe_matches |
None
|
None
|
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
4.1, 2.3 |
2.1 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
ANSSI-CC-2013/30, ANSSI-CC-2013/31 |
heuristics/report_references/directly_referencing |
ANSSI-CC-2017/24, ANSSI-CC-2018/32v2, ANSSI-CC-2018/56 |
BSI-DSZ-CC-0645-2010 |
heuristics/report_references/indirectly_referenced_by |
None
|
ANSSI-CC-2013/30, ANSSI-CC-2013/31 |
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2016/59, ANSSI-CC-2015/66, ANSSI-CC-2017/07, ANSSI-CC-2018/32, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2017/24, ANSSI-CC-2017/76, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, ANSSI-CC-2018/56, BSI-DSZ-CC-0891-V2-2016 |
BSI-DSZ-CC-0645-2010 |
heuristics/scheme_data/cert_id |
2018/58v2
|
2013/29
|
heuristics/scheme_data/description |
Le produit évalué est l’application « eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated » développée par la société THALES DIS FRANCE SAS et embarquée sur le microcontrôleur S3FT9MH fabriqué par la société SAMSUNG ELECTRONICS CO. LTD.
Le produit implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’aviation civile intern
|
Le produit certifié est la « plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A, référence MultiApp ID V2.1, en version MPH119 avec filtre v2.4 », développé par GEMALTO et NXP.
La plateforme ouverte Java Card est destinée à fournir des services de sécurité aux applets qui seront installées et chargées sur la carte.
|
heuristics/scheme_data/developer |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
GEMALTO / NXP
|
heuristics/scheme_data/enhanced |
- cert_id:
2018/58v2
- certification_date:
17/12/2021
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- sponsor:
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2, AVA_VAN.5
- cert_link: https://cyber.gouv.fr/sites/default/files/2022/01/certificat-2018_58v2.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
- cert_id:
2013/29
- certification_date:
15/05/2013
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r3
- developer:
GEMALTO / NXP
- sponsor:
GEMALTO
- evaluation_facility:
SERMA Technologies
- level:
EAL5+
- protection_profile:
ANSSI-CC-PP-2010-03
- mutual_recognition:
SOG-IS
CCRA
- augmented:
ALC_DVS.2 et AVA_VAN.5
- target_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-29en.pdf
- report_link:
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-29fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ALC_DVS.2, AVA_VAN.5
|
ALC_DVS.2 et AVA_VAN.5
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Cartes à puce
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r3
|
heuristics/scheme_data/enhanced/cert_id |
2018/58v2
|
2013/29
|
heuristics/scheme_data/enhanced/certification_date |
17/12/2021
|
15/05/2013
|
heuristics/scheme_data/enhanced/developer |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
GEMALTO / NXP
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
SERMA Technologies
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/enhanced/mutual_recognition |
SOG-IS
CCRA
|
SOG-IS
CCRA
|
heuristics/scheme_data/enhanced/protection_profile |
Protection Profile, Machine Readable Travel Document with “ICAO Application”, Extended Access Control, version 1.10
|
ANSSI-CC-PP-2010-03
|
heuristics/scheme_data/enhanced/report_link |
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cc-2018_58v2.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC_2013-29fr.pdf
|
heuristics/scheme_data/enhanced/sponsor |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
GEMALTO
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/2022/01/anssi-cible-cc-2018_58v2en.pdf
|
https://cyber.gouv.fr/sites/default/files/IMG/certificat/ANSSI-CC-cible_2013-29en.pdf
|
heuristics/scheme_data/level |
EAL5+
|
EAL5+
|
heuristics/scheme_data/product |
eTravel v2.3 on MultiApp v4.1 platform, BAC, EAC and AA activated Référence/version du produit Version de l’application eTravel : 2.3 Version de la plateforme Java Card MultiApp : 4.1
|
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
|
heuristics/scheme_data/sponsor |
THALES DIS FRANCE SAS SAMSUNG ELECTRONICS CO. LTD
|
GEMALTO
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/etravel-v23-multiapp-v41-platform-bac-eac-and-aa-activated-referenceversion-du
|
https://cyber.gouv.fr/produits-certifies/plateforme-java-card-en-configuration-ouverte-de-la-carte-puce-multiapp-id-v21
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2017/24 |
BSI-DSZ-CC-0645-2010, BSI-DSZ-CC-0555-2009 |
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
certificat-2018_56v2.pdf
|
None
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords |
- cc_cert_id:
- cc_protection_profile_id:
- cc_security_level:
- cc_sar:
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ATE:
- cc_sfr:
- cc_claims:
- vendor:
- eval_facility:
- symmetric_crypto:
- asymmetric_crypto:
- pq_crypto:
- hash_function:
- crypto_scheme:
- crypto_protocol:
- randomness:
- cipher_mode:
- ecc_curve:
- crypto_engine:
- tls_cipher_suite:
- crypto_library:
- vulnerability:
- side_channel_analysis:
- technical_report_id:
- device_model:
- tee_name:
- os_name:
- cplc_data:
- ic_data_group:
- standard_id:
- javacard_version:
- javacard_api_const:
- javacard_packages:
- certification_process:
|
None
|
pdf_data/cert_metadata |
- pdf_file_size_bytes:
1310722
- pdf_is_encrypted:
False
- pdf_number_of_pages:
2
- /Author:
sharbus
- /CreationDate:
D:20211222165036+01'00'
- /ModDate:
D:20211222165036+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - certificat-2018_56v2
- pdf_hyperlinks:
|
None
|
pdf_data/report_filename |
anssi-cc-2018_56v2.pdf
|
ANSSI-CC_2013-29fr.pdf
|
pdf_data/report_frontpage/FR |
|
- match_rules:
Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables
- cert_id:
ANSSI-CC-2013/29
- cert_item:
Plateforme Java Card en configuration ouverte de la carte à puce MultiApp ID V2.1 masquée sur composant P5CC145V0A
- cert_item_version:
Référence MultiApp ID V2.1, Version MPH119 avec filtre v2.4
- ref_protection_profiles:
ANSSI-CC-PP-2010-03], version v2.6 PP-JCS Open Configuration
- cc_version:
CC version 3.1 révision 3
- cc_security_level:
EAL5 Augmenté ALC_DVS.2 et AVA_VAN.5
- developer:
GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France NXP 101 Stresemanallee, D-22502 Hambourg Allemagne Commanditaire GEMALTO La Vigie Avenue du Jujubier, ZI Athélia IV BP 90, 13702 La Ciotat, France
- cert_lab:
SERMA Technologies 30 Avenue Gustave Eiffel, 33608 Pessac, France
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id |
- FR:
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2018/56v2:
15
- ANSSI-CC-2018/56:
4
- ANSSI-CC-2017/24:
2
- ANSSI-CC-2018/32v2:
2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0055-2009:
1
|
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
- BSI-PP-0055-2009:
1
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0055-2009:
1
|
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
- AGD:
- ALC:
- ALC_CMS.5:
1
- ALC_DVS.2:
1
- ALC_TAT.2:
1
- ALC_FLR:
1
- ATE:
- AVA:
|
- ADV:
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
- AGD:
- ALC:
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC:
1
- ALC_CMS:
1
- ALC_DEL:
1
- ALC_DVS:
1
- ALC_TAT:
1
- ATE:
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
- AVA:
- ASE:
- ASE_TSS.2:
1
- ASE_CCL:
1
- ASE_ECD:
1
- ASE_INT:
1
- ASE_OBJ:
1
- ASE_REQ:
1
- ASE_SPD:
1
- ASE_TSS:
1
|
pdf_data/report_keywords/cc_sar/ADV |
- ADV_FSP.5:
1
- ADV_TDS.4:
1
- ADV_INT.2:
1
|
- ADV_ARC:
1
- ADV_FSP:
1
- ADV_IMP:
1
- ADV_INT:
1
- ADV_SPM:
1
- ADV_TDS:
1
|
pdf_data/report_keywords/cc_sar/AGD |
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_CMS.5: 1
- ALC_DVS.2:
1
- ALC_TAT.2: 1
- ALC_FLR:
1
|
- ALC_DVS.2:
3
- ALC_FLR:
2
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_TAT: 1
|
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 |
1
|
3
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
2
|
pdf_data/report_keywords/cc_sar/ATE |
|
- ATE_COV:
1
- ATE_DPT:
1
- ATE_FUN:
1
- ATE_IND:
1
|
pdf_data/report_keywords/cc_sar/AVA |
|
|
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN |
1
|
4
|
pdf_data/report_keywords/cc_security_level/EAL |
|
- EAL5: 3
- EAL4: 2
- EAL7:
1
- EAL 1: 1
- EAL 3: 1
- EAL 5: 1
- EAL 7: 1
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/eval_facility/Serma |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vendor/Gemalto |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata |
- pdf_file_size_bytes:
4196349
- pdf_is_encrypted:
False
- pdf_number_of_pages:
15
- /Author: sharbus
- /CreationDate:
D:20211222164244+01'00'
- /ModDate:
D:20211222164244+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - ANSSI-CC-2018_56v2fr
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
173551
- pdf_is_encrypted:
False
- pdf_number_of_pages:
16
- /CreationDate:
D:20130521160636+02'00'
- /Creator: PDFCreator Version 1.2.1
- /Keywords:
- /ModDate:
D:20130522105152+02'00'
- /Producer:
GPL Ghostscript 9.02
- /Subject:
- /Title:
- pdf_hyperlinks:
|
pdf_data/report_metadata//CreationDate |
D:20211222164244+01'00'
|
D:20130521160636+02'00'
|
pdf_data/report_metadata//ModDate |
D:20211222164244+01'00'
|
D:20130522105152+02'00'
|
pdf_data/report_metadata//Producer |
Microsoft: Print To PDF
|
GPL Ghostscript 9.02
|
pdf_data/report_metadata//Title |
Microsoft Word - ANSSI-CC-2018_56v2fr
|
|
pdf_data/report_metadata/pdf_file_size_bytes |
4196349
|
173551
|
pdf_data/report_metadata/pdf_hyperlinks |
|
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
15
|
16
|
pdf_data/st_filename |
anssi-cible-cc-2018_56v2en.pdf
|
ANSSI-CC-cible_2013-29en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECC/ECC |
2
|
9
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
2
|
3
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
1
|
2
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0555-2009:
1
- BSI-DSZ-CC-0645-2010:
1
- NL:
|
pdf_data/st_keywords/cc_cert_id/NL/CC-1 |
2
|
2
|
pdf_data/st_keywords/cc_cert_id/NL/CC-2 |
5
|
3
|
pdf_data/st_keywords/cc_cert_id/NL/CC-3 |
3
|
2
|
pdf_data/st_keywords/cc_claims |
|
- D:
- D.APP_CODE:
7
- D.APP_C_DATA:
3
- D.APP_I_DATA:
4
- D.PIN:
4
- D.JCS_CODE:
3
- D.JCS_DATA:
5
- D.SEC_DATA:
7
- D.API_DATA:
3
- D.CRYPTO:
5
- O:
- O.SID:
1
- O.OPERATE:
1
- O.RESOURCES:
1
- O.FIREWALL:
1
- O.NATIVE:
1
- O.REALLOCATION:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.ALARM:
1
- O.TRANSACTION:
2
- O.CIPHER:
2
- O.PIN-MNGT:
2
- O.KEY-MNGT:
2
- O.REMOTE:
1
- O.OBJ-DELETION:
1
- O.INSTALL:
1
- O.LOAD:
1
- O.DELETION:
1
- O.SCP:
3
- O.CARD-MANAGEMENT:
1
- O.APPLET:
36
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.REMOTE_MTHD:
9
- O.REMOTE_OBJ:
13
- O.RMI_SERVICE:
17
- O.ROR:
18
- O.CODE_PCKG:
16
- O.REMOTE_OBJECT:
2
- T:
- T.CONFID-JCS-CODE:
1
- T.CONFID-APPLI-DATA:
1
- T.CONFID-JCS-DATA:
1
- T.INTEG-APPLI-CODE:
2
- T.INTEG-JCS-CODE:
1
- T.INTEG-APPLI-DATA:
2
- T.INTEG-JCS-DATA:
1
- T.SID:
2
- T.EXE-CODE:
3
- T.NATIVE:
1
- T.EXE-CODE-REMOTE:
1
- T.RESOURCES:
1
- T.INSTALL:
1
- T.DELETION:
1
- T.OBJ-DELETION:
1
- T.PHYSICAL:
1
- A:
- A.VERIFICATION:
1
- A.DELETION:
1
- A.APPLET:
1
- A.PROTECTION_AFTER_TOE_DELIVERY:
1
- R:
- OP:
- OP.ARRAY_ACCESS:
6
- OP.CREATE:
10
- OP.DELETE_APPLET:
6
- OP.DELETE_PCKG:
4
- OP.DELETE_PCKG_APPLET:
4
- OP.GET_ROR:
6
- OP.INSTANCE_FIELD:
6
- OP.INVK_VIRTUAL:
8
- OP.INVK_INTERFACE:
10
- OP.INVOKE:
12
- OP.JAVA:
8
- OP.THROW:
7
- OP.TYPE_ACCESS:
7
- OP.PUT:
7
- OP.RET_RORD:
3
- OP.RET:
1
- OE:
- OE.VERIFICATION:
1
- OE.APPLET:
1
- OE.PROTECTION_AFTER_TOE_DELIVERY:
1
- OSP:
|
pdf_data/st_keywords/cc_claims/O |
|
- O.SID:
1
- O.OPERATE:
1
- O.RESOURCES:
1
- O.FIREWALL:
1
- O.NATIVE:
1
- O.REALLOCATION:
1
- O.GLOBAL_ARRAYS_CONFID:
1
- O.GLOBAL_ARRAYS_INTEG:
1
- O.ALARM:
1
- O.TRANSACTION:
2
- O.CIPHER:
2
- O.PIN-MNGT:
2
- O.KEY-MNGT:
2
- O.REMOTE:
1
- O.OBJ-DELETION:
1
- O.INSTALL:
1
- O.LOAD:
1
- O.DELETION:
1
- O.SCP:
3
- O.CARD-MANAGEMENT:
1
- O.APPLET:
36
- O.CODE_PKG:
7
- O.JAVAOBJECT:
56
- O.REMOTE_MTHD:
9
- O.REMOTE_OBJ:
13
- O.RMI_SERVICE:
17
- O.ROR:
18
- O.CODE_PCKG:
16
- O.REMOTE_OBJECT:
2
|
pdf_data/st_keywords/cc_claims/OE |
|
- OE.VERIFICATION:
1
- OE.APPLET:
1
- OE.PROTECTION_AFTER_TOE_DELIVERY:
1
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
- BSI-CC-PP-0084-:
1
- BSI-PP-0056-V2-MA-2012:
1
- BSI-CC-PP-0068-:
1
- BSI-PP-0055-2009:
1
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_FSP.5:
2
- ADV_INT.2:
2
- ADV_TDS.4:
2
- ADV_ARC.1:
1
- ALC:
- ALC_CMS.5:
2
- ALC_DVS.2:
3
- ALC_TAT.2:
2
- ATE:
- ASE:
|
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_CMS.5: 2
- ALC_DVS.2:
3
- ALC_TAT.2: 2
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.2 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL4:
3
- EAL 6+:
1
- EAL4 augmented:
1
|
- EAL5+:
4
- EAL5:
4
- EAL5 augmented:
4
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
- FCS:
- FCS_RND:
7
- FCS_CKM:
14
- FCS_COP:
50
- FCS_CKM.1:
19
- FCS_RND.1:
12
- FCS_RND.1.1:
2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
29
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_RNG:
1
- FDP:
- FDP_ACF:
1
- FDP_ITC.1:
12
- FDP_ITC.2:
12
- FDP_ACC.1:
18
- FDP_ACF.1:
11
- FDP_ACC.1.1:
1
- FDP_ACF.1.1:
1
- FDP_ACF.1.2:
2
- FDP_ACF.1.3:
1
- FDP_ACF.1.4:
2
- FDP_UCT.1:
10
- FDP_IFC.1:
4
- FDP_UCT.1.1:
1
- FDP_UIT.1:
10
- FDP_UIT.1.1:
1
- FDP_UIT.1.2:
1
- FDP_ITC:
2
- FIA:
- FIA_API:
13
- FIA_AFL.1:
11
- FIA_SOS.2:
1
- FIA_API.1:
5
- FIA_API.1.1:
1
- FIA_UAU.5.2:
3
- FIA_UAU.4:
11
- FIA_UAU.6:
11
- FIA_UID.1:
11
- FIA_UID.1.1:
1
- FIA_UID.1.2:
1
- FIA_UAU.1:
10
- FIA_UAU.1.1:
1
- FIA_UAU.1.2:
1
- FIA_UAU.4.1:
1
- FIA_UAU.5:
10
- FIA_UAU.5.1:
1
- FIA_UAU.6.1:
1
- FIA_AFL.1.1:
1
- FIA_AFL.1.2:
1
- FIA_UAU:
5
- FMT:
- FMT_LIM:
7
- FMT_LIM.1:
20
- FMT_LIM.2:
18
- FMT_LIM.1.1:
2
- FMT_LIM.2.1:
2
- FMT_MSA.3:
3
- FMT_SMF.1:
20
- FMT_SMR.1:
24
- FMT_SMF.1.1:
1
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MTD.1:
6
- FMT_MTD:
36
- FMT_MSA.1:
1
- FMT_SRM.1:
1
- FPT:
- FPT_EMS:
4
- FPT_EMS.1:
13
- FPT_EMS.1.1:
3
- FPT_EMS.1.2:
3
- FPT_FLS.1:
11
- FPT_TST.1:
10
- FPT_PHP.3:
12
- FPT_FLS.1.1:
1
- FPT_TST.1.1:
1
- FPT_TST.1.2:
1
- FPT_TST.1.3:
1
- FPT_PHP.3.1:
1
- FTP:
- FTP_ITC.1:
5
- FTP_TRP.1:
5
|
- FAU:
- FAU_ARP.1:
5
- FAU_ARP.1.1:
1
- FCO:
- FCS:
- FCS_CKM.1:
9
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1:
1
- FCS_CKM.3:
2
- FCS_CKM.3.1:
1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
11
- FCS_COP.1.1:
1
- FDP:
- FDP_ACC:
15
- FDP_ACC.2:
8
- FDP_ACF:
22
- FDP_ACF.1:
17
- FDP_IFC:
8
- FDP_IFC.1:
3
- FDP_IFF:
8
- FDP_IFF.1:
15
- FDP_RIP:
17
- FDP_RIP.1:
8
- FDP_ROL:
6
- FDP_ROL.1:
2
- FDP_SDI.2:
2
- FDP_SDI.2.1:
1
- FDP_SDI.2.2:
1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2:
2
- FDP_UIT:
2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
- FIA:
- FIA_ATD:
2
- FIA_ATD.1:
1
- FIA_UID:
4
- FIA_UID.2:
1
- FIA_USB:
2
- FIA_USB.1:
3
- FIA_UAU:
2
- FIA_UAI.1:
1
- FIA_UAU.1:
1
- FIA_UID.1:
2
- FMT:
- FMT_MSA:
28
- FMT_MSA.1:
7
- FMT_MSA.2:
1
- FMT_MSA.3:
12
- FMT_SMR:
11
- FMT_SMR.1:
10
- FMT_SMF:
8
- FMT_SMF.1:
4
- FMT_MTD:
4
- FMT_MTD.1:
2
- FMT_MTD.3:
1
- FMT_REV.1:
4
- FMT_REV:
3
- FPR:
- FPR_UNO.1:
2
- FPR_UNO.1.1:
1
- FPT:
- FPT_FLS:
8
- FPT_FLS.1:
4
- FPT_TDC.1:
2
- FPT_TDC.1.1:
1
- FPT_TDC.1.2:
1
- FPT_RCV:
4
- FPT_RCV.3:
4
- FPT_TST:
2
- FPT_TST.1:
3
- FPT_PHP:
2
- FPT_PHP.3:
1
- FPT_RCV.4:
1
- FTP:
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS:
6
- FAU_GEN:
1
- FAU_SAS.1:
12
- FAU_SAS.1.1:
2
|
- FAU_ARP.1:
5
- FAU_ARP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 7
- FCS_CKM: 14
- FCS_COP: 50
- FCS_CKM.1:
19
- FCS_RND.1: 12
- FCS_RND.1.1: 2
- FCS_CKM.2:
4
- FCS_COP.1:
9
- FCS_CKM.4:
29
- FCS_CKM.1.1:
2
- FCS_CKM.4.1:
1
- FCS_COP.1.1:
1
- FCS_RNG: 1
|
- FCS_CKM.1:
9
- FCS_CKM.1.1:
1
- FCS_CKM.2:
2
- FCS_CKM.2.1: 1
- FCS_CKM.3: 2
- FCS_CKM.3.1: 1
- FCS_CKM.4:
2
- FCS_CKM.4.1:
1
- FCS_COP.1:
11
- FCS_COP.1.1:
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
19
|
9
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
4
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
29
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
9
|
11
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1.1 |
1
|
1
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACF:
1
- FDP_ITC.1: 12
- FDP_ITC.2:
12
- FDP_ACC.1:
18
- FDP_ACF.1:
11
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_UCT.1: 10
- FDP_IFC.1:
4
- FDP_UCT.1.1: 1
- FDP_UIT.1:
10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_ITC:
2
|
- FDP_ACC: 15
- FDP_ACC.2: 8
- FDP_ACF:
22
- FDP_ACF.1:
17
- FDP_IFC: 8
- FDP_IFC.1:
3
- FDP_IFF: 8
- FDP_IFF.1: 15
- FDP_RIP: 17
- FDP_RIP.1: 8
- FDP_ROL: 6
- FDP_ROL.1: 2
- FDP_SDI.2: 2
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_ITC:
4
- FDP_ITC.2:
5
- FDP_IFC.2: 2
- FDP_UIT: 2
- FDP_UIT.1:
2
- FDP_ACC.1:
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
18
|
1
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
1
|
22
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
11
|
17
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
4
|
3
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC |
2
|
4
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
12
|
5
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_UIT.1 |
10
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 13
- FIA_AFL.1: 11
- FIA_SOS.2: 1
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_UAU.5.2: 3
- FIA_UAU.4: 11
- FIA_UAU.6: 11
- FIA_UID.1:
11
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UAU.1:
10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.6.1: 1
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_UAU:
5
|
- FIA_ATD: 2
- FIA_ATD.1: 1
- FIA_UID: 4
- FIA_UID.2: 1
- FIA_USB: 2
- FIA_USB.1: 3
- FIA_UAU:
2
- FIA_UAI.1: 1
- FIA_UAU.1:
1
- FIA_UID.1:
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
5
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.1 |
10
|
1
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
11
|
2
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 7
- FMT_LIM.1: 20
- FMT_LIM.2: 18
- FMT_LIM.1.1: 2
- FMT_LIM.2.1: 2
- FMT_MSA.3:
3
- FMT_SMF.1:
20
- FMT_SMR.1:
24
- FMT_SMF.1.1: 1
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FMT_MTD.1:
6
- FMT_MTD:
36
- FMT_MSA.1:
1
- FMT_SRM.1: 1
|
- FMT_MSA: 28
- FMT_MSA.1:
7
- FMT_MSA.2: 1
- FMT_MSA.3:
12
- FMT_SMR: 11
- FMT_SMR.1:
10
- FMT_SMF: 8
- FMT_SMF.1:
4
- FMT_MTD:
4
- FMT_MTD.1:
2
- FMT_MTD.3: 1
- FMT_REV.1: 4
- FMT_REV: 3
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
1
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
3
|
12
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
36
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
20
|
4
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
24
|
10
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 4
- FPT_EMS.1: 13
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1:
11
- FPT_TST.1:
10
- FPT_PHP.3:
12
- FPT_FLS.1.1: 1
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FPT_PHP.3.1: 1
|
- FPT_FLS: 8
- FPT_FLS.1:
4
- FPT_TDC.1: 2
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FPT_RCV: 4
- FPT_RCV.3: 4
- FPT_TST: 2
- FPT_TST.1:
3
- FPT_PHP: 2
- FPT_PHP.3:
1
- FPT_RCV.4: 1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
11
|
4
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_PHP.3 |
12
|
1
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_TST.1 |
10
|
3
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1:
5
- FTP_TRP.1: 5
|
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_ITC.1 |
5
|
3
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme/KA |
|
|
pdf_data/st_keywords/crypto_scheme/MAC/MAC |
4
|
8
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224:
3
- SHA256:
2
- SHA224:
2
- SHA384:
1
- SHA512:
1
- SHA-256:
3
- SHA-384:
3
- SHA-512:
3
- MD:
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
1
|
3
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
- SHA-224: 3
- SHA256: 2
- SHA224: 2
- SHA384: 1
- SHA512: 1
- SHA-256:
3
- SHA-384: 3
- SHA-512:
3
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
1
|
3
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
1
|
3
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
28
- EF.DG2:
10
- EF.DG3:
6
- EF.DG4:
6
- EF.DG5:
7
- EF.DG16:
26
- EF.DG13:
3
- EF.DG14:
3
- EF.DG15:
5
- EF.DG6:
1
- EF.COM:
8
- EF.SOD:
8
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
- java:
- javacard:
- javacard.framework.service:
2
- javacard.framework:
2
- javacardx:
|
pdf_data/st_keywords/javacard_version |
|
- JavaCard:
- Java Card 2.2.2:
7
- JC2.2.2:
1
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG |
2
|
3
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- Leak-Inherent:
1
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
5
- physical tampering:
1
- Physical tampering:
1
- Malfunction:
6
- malfunction:
5
- fault injection:
1
- other:
|
- SCA:
- FI:
- physical tampering:
1
- malfunction:
2
|
pdf_data/st_keywords/side_channel_analysis/FI |
- Physical Tampering: 5
- physical tampering:
1
- Physical tampering: 1
- Malfunction: 6
- malfunction:
5
- fault injection: 1
|
- physical tampering:
1
- malfunction:
2
|
pdf_data/st_keywords/side_channel_analysis/FI/malfunction |
5
|
2
|
pdf_data/st_keywords/side_channel_analysis/FI/physical tampering |
1
|
1
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- Leak-Inherent: 1
- physical probing:
3
- DPA: 2
- SPA: 1
- timing attacks: 1
|
|
pdf_data/st_keywords/side_channel_analysis/SCA/physical probing |
3
|
2
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
- RFC:
- ISO:
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
- FIPS:
- PKCS:
- PKCS#3:
1
- PKCS#1:
7
- PKCS#5:
3
- BSI:
- SCP:
- CC:
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
- CCMB-2017-04-004:
1
|
- CCMB-2009-07-001:
1
- CCMB-2009-07-002:
1
- CCMB-2009-07-003:
1
- CCMB-2009-07-004:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS46-3:
3
- FIPS PUB 46-3:
1
- FIPS 180-2:
1
- FIPS 46-3:
2
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- DES:
- 3DES:
- TDEA:
1
- 3DES:
1
- Triple-DES:
2
- TDES:
8
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
- TDEA: 1
- 3DES: 1
- Triple-DES:
2
- TDES:
8
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/TDES |
1
|
8
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES/Triple-DES |
7
|
2
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
2
|
14
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
- Samsung:
- Gemalto:
- Thales:
|
|
pdf_data/st_keywords/vendor/Gemalto/Gemalto |
235
|
94
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
1660503
- pdf_is_encrypted:
False
- pdf_number_of_pages:
55
- /Title:
MultiApp V4.1: eTravel 2.3 BAC Security Target
- /Author: D1417545
- /Subject:
1.5
- /Keywords:
05-07-2018
- /Creator:
Microsoft® Word 2016
- /CreationDate:
D:20210921161905+02'00'
- /ModDate:
D:20210921161905+02'00'
- /Producer:
Microsoft® Word 2016
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
580401
- pdf_is_encrypted:
False
- pdf_number_of_pages:
71
- /CreationDate:
D:20120608165320Z
- /Creator:
PDFCreator Version 0.9.3
- /Keywords:
- /ModDate:
D:20130522105148+02'00'
- /Producer:
GPL Ghostscript 8.54
- /Subject:
- /Title:
- pdf_hyperlinks:
|
pdf_data/st_metadata//CreationDate |
D:20210921161905+02'00'
|
D:20120608165320Z
|
pdf_data/st_metadata//Creator |
Microsoft® Word 2016
|
PDFCreator Version 0.9.3
|
pdf_data/st_metadata//Keywords |
05-07-2018
|
|
pdf_data/st_metadata//ModDate |
D:20210921161905+02'00'
|
D:20130522105148+02'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word 2016
|
GPL Ghostscript 8.54
|
pdf_data/st_metadata//Subject |
1.5
|
|
pdf_data/st_metadata//Title |
MultiApp V4.1: eTravel 2.3 BAC Security Target
|
|
pdf_data/st_metadata/pdf_file_size_bytes |
1660503
|
580401
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
55
|
71
|
dgst |
c41fa08d50e81932
|
8ba699fea1329040
|