| name |
Tenix Interactive Link Data Diode Device, Gigabit Variant, Version 3.0 |
IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration) |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
US |
NL |
| status |
archived |
archived |
| not_valid_after |
06.09.2012 |
19.11.2023 |
| not_valid_before |
16.11.2006 |
19.11.2018 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-196231.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid9513-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-196231-CR.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid9513-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-BAC-Lite]%202018_2000037746%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(BAC%20Configuration)%20(v1.0,%202018-09-07).pdf |
| manufacturer |
BAE SYSTEMS DATAGATE (formerly Tenix Datagate) |
Idemia |
| manufacturer_web |
https://www.baesystems.com |
https://www.idemia.com |
| security_level |
EAL7+ |
EAL4+, ALC_TAT.2, ADV_INT.2, ALC_CMS.5, ADV_FSP.5, ATE_DPT.3, ALC_DVS.2, ADV_TDS.4 |
| dgst |
c5ff92ac473da244 |
ce867531085e33f8 |
| heuristics/cert_id |
CCEVS-VR-0051-2006 |
NSCIB-CC-196231-CR |
| heuristics/cert_lab |
US |
|
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ATE_DPT.3, ADV_RCR.3, ALC_LCD.3, ATE_FUN.2, ATE_IND.3, AGD_USR.1, AVA_CCA.3, ALC_TAT.3, ADV_LLD.2, ALC_DVS.2, AVA_VLA.4, ATE_COV.3, AVA_MSU.3, ADV_INT.3, ADV_SPM.3, AGD_ADM.1, AVA_SOF.1, ADV_HLD.5, ADV_IMP.3, ADV_FSP.4 |
ADV_TDS.4, ALC_DVS.2, ALC_CMS.5, ATE_DPT.3, AVA_VAN.5, ADV_FSP.5, ADV_ARC.1, ADV_INT.2, ADV_SPM.1, ALC_TAT.2 |
| heuristics/extracted_versions |
3.0 |
2.3 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
CCEVS-VR-0119-2005 |
NSCIB-CC-195748-CR |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
CCEVS-VR-0119-2005 |
NSCIB-CC-195748-CR |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/9513/
- categories: ['Multiple Domain Solution']
- category: Multiple Domain Solution
- certification_date: 16.11.2006
- evaluation_facility: COACT, Inc. Labs
- expiration_date:
- id: CCEVS-VR-VID9513
- product: Tenix Interactive Link Data Diode Device, Gigabit Variant (P/N FID003)
- scheme: US
- url: https://www.niap-ccevs.org/products/9513
- vendor: BAE Systems Information and Electronic Systems, Inc.
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
60455fc9564e2545 |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf |
| pdf_data/cert_filename |
|
Signed certificate CC-18-196231.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
- ADV:
- ADV_FSP.5: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- ALC:
- ALC_CMS.5: 1
- ALC_DVS.2: 1
- ALC_TAT.2: 1
- ATE:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
- ICAO:
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC 18045: 2
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20181119163400+01'00'
- /Creator: BHC364e
- /ModDate: D:20181119163400+01'00'
- /Producer: KONICA MINOLTA bizhub C364e
- /Title: BHC364e-20181119163400
- pdf_file_size_bytes: 202344
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
| pdf_data/report_filename |
st_vid9513-vr.pdf |
Certification Report NSCIB-CC-196231-CR.pdf |
| pdf_data/report_frontpage |
- NL:
- US:
- cert_id: CCEVS-VR-06-0051
- cert_item: Tenix Datagate Inc Interactive Link Data Diode Device, Gigabit Variant Version 3.0 (P/N FID003
- cert_lab: US NIAP
|
- NL:
- cert_id: NSCIB-CC-196231-CR
- cert_item: IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration
- cert_lab: Brightsight
- developer: IDEMIA
- US:
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-05-0119: 2
- CCEVS-VR-06-0051: 1
|
- FR:
- NL:
- CC-19-180045: 1
- CC-195748: 2
- NSCIB-CC-196231-CR: 12
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 1
- EAL 4 augmented: 1
- EAL4: 2
- EAL4 augmented: 1
- EAL4+: 2
|
| pdf_data/report_keywords/cc_sar |
- ACM:
- ADO:
- ATE:
- ATE_FUN: 1
- ATE_IND: 1
- ATE_IND.3: 1
- AVA:
- AVA_CCA.3: 1
- AVA_MSU.2: 1
- AVA_VLA: 1
- AVA_VLA.2: 1
- AVA_VLA.3: 1
|
- ADV:
- ADV_FSP.5: 2
- ADV_INT.2: 2
- ADV_TDS.4: 2
- AGD:
- ALC:
- ALC_CMS.5: 2
- ALC_DVS.2: 2
- ALC_TAT.2: 2
- ATE:
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.EMISSION: 1
- A.INSTALLATION: 1
- A.NETWORK: 1
- A.NO_EVIL: 1
- A.PERSONNEL: 1
- A.PHYSICAL: 1
- A.TRAINING: 1
- T:
- T.FAILURE: 1
- T.LOGIC: 1
- T.TAMPER: 1
- T.TRANSFER: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
- OutOfScope:
- of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no security risk to the TOE. 2.5 Documentation The following documentation is: 1
- out of scope: 1
|
| pdf_data/report_metadata |
- /Author: Validation Team
- /Company: MITRE and NSA
- /CreationDate: D:20061128153410-05'00'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /ModDate: D:20061128153454-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20061128171400
- /Title: Validation Report for Marconi
- pdf_file_size_bytes: 190901
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 26
|
- /Author: p646
- /CreationDate: D:20181120153406+01'00'
- /Creator: PDFCreator Version 1.2.0
- /Keywords:
- /ModDate: D:20181120153406+01'00'
- /Producer: GPL Ghostscript 9.0
- /Subject:
- /Title: Certification Report NSCIB-CC-196231-CR
- pdf_file_size_bytes: 630780
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 13
|
| pdf_data/st_filename |
st_vid9513-st.pdf |
[ST-BAC-Lite] 2018_2000037746 - Security Target Lite IDeal Pass v2.3-i JC (BAC Configuration) (v1.0, 2018-09-07).pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0055-2009: 1
- BSI-CC-PP-0056-V2-2012-MA-02: 1
- BSI-PP-0035: 1
- BSI-PP-0055: 1
- BSI-PP-0056: 1
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 7: 4
- EAL 7 augmented: 1
- EAL7: 2
|
- EAL:
- EAL4: 6
- EAL4 augmented: 2
- EAL5: 1
|
| pdf_data/st_keywords/cc_sar |
- ACM:
- ACM_AUT.2: 2
- ACM_CAP.3: 3
- ACM_CAP.5: 1
- ACM_SCP.3: 2
- ADO:
- ADO_DEL: 2
- ADO_DEL.3: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 8
- ADV_FSP.2: 1
- ADV_FSP.4: 3
- ADV_HLD.1: 1
- ADV_HLD.2: 2
- ADV_HLD.3: 1
- ADV_HLD.5: 1
- ADV_IMP.1: 2
- ADV_IMP.2: 3
- ADV_IMP.3: 1
- ADV_INT.1: 1
- ADV_INT.3: 2
- ADV_LLD.1: 4
- ADV_LLD.2: 1
- ADV_RCR.1: 2
- ADV_RCR.2: 1
- ADV_RCR.3: 2
- ADV_SPM.1: 4
- ADV_SPM.3: 3
- AGD:
- AGD_ADM.1: 11
- AGD_USR.1: 10
- ALC:
- ALC_DVS.2: 3
- ALC_LCD.3: 2
- ALC_TAT.1: 1
- ALC_TAT.3: 2
- ATE:
- ATE_COV.3: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 3
- ATE_FUN.2: 2
- ATE_IND.3: 2
- AVA:
- AVA_CCA.3: 11
- AVA_MSU.3: 2
- AVA_SOF.1: 2
- AVA_VLA.4: 2
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.5: 4
- ADV_INT.2: 4
- ADV_SPM.1: 1
- ADV_TDS.4: 4
- AGD:
- ALC:
- ALC_CMS.5: 4
- ALC_DVS.2: 5
- ALC_TAT.2: 4
- ATE:
|
| pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_IFC: 3
- FDP_IFC.1: 6
- FDP_IFC.2: 16
- FDP_IFC.2.1: 1
- FDP_IFC.2.2: 1
- FDP_IFF: 3
- FDP_IFF.1: 22
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.5: 1
- FDP_IFF.5: 14
- FMT:
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 13
- FPT_FLS.1.1: 1
- FPT_RVM: 1
- FPT_RVM.1: 15
- FPT_RVM.1.1: 1
- FPT_SEP: 1
- FPT_SEP.3: 10
- FPT_SEP.3.1: 1
- FPT_SEP.3.2: 1
- FPT_SEP.3.3: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 7
- FAU_SAS.1: 11
- FAU_SAS.1.1: 2
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 30
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 22
- FCS_CKM.4.1: 1
- FCS_COP: 51
- FCS_COP.1: 9
- FCS_RND: 9
- FCS_RND.1: 13
- FCS_RND.1.1: 2
- FDP:
- FDP_ACC.1: 18
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 13
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC: 2
- FDP_ITC.1: 12
- FDP_ITC.2: 12
- FDP_UCT.1: 11
- FDP_UCT.1.1: 1
- FDP_UIT: 1
- FDP_UIT.1: 10
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FIA:
- FIA_AFL.1: 8
- FIA_AFL.1.1: 3
- FIA_AFL.1.2: 3
- FIA_API: 16
- FIA_API.1: 5
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 10
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.4: 16
- FIA_UAU.4.1: 1
- FIA_UAU.5: 10
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 4
- FIA_UAU.6: 12
- FIA_UAU.6.1: 1
- FIA_UID.1: 12
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_LIM: 8
- FMT_LIM.1: 18
- FMT_LIM.1.1: 3
- FMT_LIM.2: 19
- FMT_LIM.2.1: 4
- FMT_MSA.1: 1
- FMT_MSA.2: 1
- FMT_MSA.3: 3
- FMT_MTD: 35
- FMT_MTD.1: 5
- FMT_SMF.1: 18
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 3
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS.1: 1
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 10
- FPT_FLS.1.1: 1
- FPT_PHP.3: 10
- FPT_PHP.3.1: 1
- FPT_RVM.1: 1
- FPT_SEP.1: 1
- FPT_TST.1: 9
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC.1: 5
- FTP_TRP.1: 5
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.EMISSION: 4
- A.INSTALLATION: 2
- A.NETWORK: 2
- A.NO_EVIL: 3
- A.PERSONNEL: 4
- A.PHYSICAL: 3
- A.TRAINING: 3
- O:
- O.CONFIDENTIAITY: 1
- O.CONFIDENTIALITY: 13
- O.FAILSECURE: 10
- O.INVOKE: 10
- O.ROM: 9
- O.TAMPER_SEAL: 1
- O.TAMPER_SEALS: 9
- OE:
- OE.EMISSION: 4
- OE.INSTALLATION: 6
- OE.NETWORK: 3
- OE.NO_EVIL: 10
- OE.PERSONNEL: 9
- OE.PHYSICAL: 11
- OE.TRAINING: 7
- T:
- T.FAILURE: 5
- T.LOGIC: 3
- T.TAMPER: 6
- T.TRANFER: 1
- T.TRANSFER: 4
|
- A:
- OE:
- OE.AA_MRTD: 6
- OE.MRTD_: 2
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 11
- AES-: 1
- AES-128: 1
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-2: 2
- SHA-224: 2
- SHA-256: 1
- SHA-384: 2
- SHA-512: 1
- SHA224: 1
- SHA256: 1
- SHA384: 1
- SHA512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 5
- Physical tampering: 1
- fault injection: 1
- malfunction: 7
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 4
- timing attacks: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 9
- EF.DG1: 27
- EF.DG13: 4
- EF.DG14: 3
- EF.DG15: 8
- EF.DG16: 27
- EF.DG2: 10
- EF.DG3: 7
- EF.DG4: 6
- EF.DG5: 8
- EF.SOD: 9
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCIMB-99-031: 1
- CCIMB-99-032: 1
- CCIMB-99-033: 1
|
- BSI:
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
- FIPS:
- FIPS 180-4: 2
- FIPS 46-3: 2
- FIPS PUB 197: 1
- FIPS46: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 6
- ISO/IEC 18013: 6
- ISO/IEC 7816-2: 1
- ISO/IEC 7816-4: 1
- ISO/IEC15946-2: 1
- RFC:
- RFC 5639: 1
- RFC-5639: 1
- RFC3369: 1
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- of the TOE hardware depending on the used hardware platform. For the TOE the MIFARE application is out of scope, but this poses no risk to the TOE security. Figure 1: TOE 1.4.2 TOE usage and security features: 1
- out of scope: 1
|
| pdf_data/st_metadata |
- /Author: Chris Walsh
- /Comments: Issue No. 5.1
- /Company: Tenix Datagate Inc.
- /CreationDate: D:20050901021753+09'30'
- /Creator: Acrobat PDFMaker 7.0 for Word
- /Keywords: Doc. No. 9162P01000001
- /ModDate: D:20061128100602-05'00'
- /Producer: Acrobat Distiller 7.0 (Windows)
- /SourceModified: D:20050831164405
- /Subject: Interactive Link Data Diode Device
- /Title: Security Target
- pdf_file_size_bytes: 225489
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: IDEMIA
- /CreationDate: D:20180907132327+02'00'
- /Creator: Microsoft® Word 2016
- /Keywords: NSCIB-CC-196231, ASE Lite, ICAO, ePassport, BAC
- /ModDate: D:20180907132327+02'00'
- /Producer: Microsoft® Word 2016
- /Subject: ASE Lite 2018_2000037746, v1.0, 2018-09-07
- /Title: Security Target Lite IDeal Pass v2.3-i JC with Privacy Protection (BAC Configuration)
- pdf_file_size_bytes: 1486764
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 102
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |