name |
Hitachi Unified Storage 110 Microprogram Version:0917/A |
ID-One ePass IDL Full EACv2 in PACE MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P |
category |
Access Control Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
FR |
status |
archived |
active |
not_valid_after |
09.01.2019 |
04.11.2026 |
not_valid_before |
12.12.2013 |
11.05.2017 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_anssi-cc-2017_29-s02fr.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0421_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_29fr.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0421_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2017-29en.pdf |
manufacturer |
Hitachi, Ltd. |
Oberthur Card Systems |
manufacturer_web |
https://www.hitachi.com/ |
https://www.oberthur.com/ |
security_level |
EAL2 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
c855912a0bee12b9 |
0b3536318a895c22 |
heuristics/cert_id |
JISEC-CC-CRP-C0421 |
ANSSI-CC-2017/29 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ASE_TSS.1, ADV_TDS.1, ASE_INT.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, AGD_OPE.1, ADV_ARC.1, AVA_VAN.2, ASE_CCL.1, ASE_REQ.2 |
ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions |
0917, 110 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0964-2015 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0814-2012, BSI-DSZ-CC-0883-2013, BSI-DSZ-CC-0786-2012, BSI-DSZ-CC-0917-2014, BSI-DSZ-CC-0964-2015 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0421
- certification_date: 01.12.2013
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 3.1 Release3
- cert_link: https://www.ipa.go.jp/en/security/c0421_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE This TOE is a control program (software) operating in the disk array “Hitachi Unified Storage 110” that is a storage product. The TOE controls accesses to its storage areas from host computers connected to the disk array. The TOE does not have assumed threats. Security functions of TOE satisfy the assumed organizational security policy and are provided to customers. TOE security functionality Three kinds of main security functions of this TOE exist as follows. - Exclusive control of storage areaFunction to access control to storage area according to requests from host computer. - Account AuthenticationUser's login facility and control of access to each function of the TOE. - AuditAudit log function that records event of administrative operations.
- evaluation_facility: ECSEC Laboratory Inc. Evaluation Center
- product: Hitachi Unified Storage 110 Microprogram
- product_type: Storage System control software
- report_link: https://www.ipa.go.jp/en/security/c0421_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0421_est.pdf
- toe_version: 0917/A
- vendor: Hitachi, Ltd.
- expiration_date: 01.01.2019
- supplier: Hitachi, Ltd.
- toe_japan_name: Hitachi Unified Storage 110 Microprogram0917/A
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0421_it2418.html
- toe_overseas_name: Hitachi Unified Storage 110 Microprogram0917/A
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
b380aabf93b29692 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf |
pdf_data/cert_filename |
|
certificat_anssi-cc-2017_29-s02fr.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-01: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /Author:
- /CreationDate: D:20211104112210+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20211104112210+01'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title:
- pdf_file_size_bytes: 287241
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0421_erpt.pdf |
ANSSI-CC-2017_29fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2 et AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2017/29
- cert_item: ID-One ePass IDL Full EACv2 in PACE MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P
- cert_item_version: code SAAAAR : 084194
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Oberthur Technologies Infineon Technologies AG 420 rue d'Estienne d'Orves, Am Campeon 1-12, 885579 Neubiberg, CS 40008, 92705 Colombes, France Allemagne Commanditaire Oberthur Technologies 420 rue d'Estienne d'Orves, CS 40008, 92705 Colombes, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur\\(s\\)(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Machine Readable Travel Document using Standard Inspection Procedure with PACE [PP_PACE] Version 1.01, BSI-CC-PP-0068-V2-2011-MA-01
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0421-01: 1
- Certification No. C0421: 1
|
- DE:
- BSI-DSZ-CC-0964-2015: 1
- BSI-DSZ-CC-0964-V2-2017: 1
- FR:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0068-V2-2011-MA-: 1
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-PP-0035-2007: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL2: 2
- EAL4: 1
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 20
- Infineon Technologies: 1
- Infineon Technologies AG: 1
- Oberthur:
- OBERTHUR: 11
- Oberthur Technologies: 2
|
pdf_data/report_keywords/eval_facility |
|
- CESTI:
- Serma:
- SERMA: 2
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
- ISO:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20140529133557+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20140529133629+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 509194
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
- /Author: Christian Benardeau
- /CreationDate: D:20170512132411+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.021
- /ModDate: D:20170512132411+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: ID-One ePass IDL Full EACv2 in PACE MRTD configuration on Infineon SLE77CLFX2400P and SLE77CLFX2407P
- /Title: ANSSI-CC-2017/29
- pdf_file_size_bytes: 592293
- pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
c0421_est.pdf |
anssi_cible_2017-29en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0056-V2-2012: 1
- BSI-CC-PP-0068-V2-2011: 2
- BSI-PP- 0035-2007: 1
- BSI-PP-0002-2001: 1
- BSI-PP-0056: 1
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 3
- EAL4 augmented: 1
- EAL5: 7
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_TDS.1: 1
- AGD:
- ALC:
- ALC_CMC.2: 1
- ALC_DEL.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 6
- ADV_FSP.1: 2
- ADV_FSP.2: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 4
- ADV_IMP.1: 4
- ADV_INT.2: 1
- ADV_TDS.1: 2
- ADV_TDS.3: 3
- ADV_TDS.4: 5
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 6
- AGD_PRE: 4
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_SCT: 2
- ALC_STM: 2
- ALC_TAT.1: 2
- ALC_TAT.2: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 2
- ATE_DPT.1: 2
- ATE_DPT.3: 1
- ATE_FUN.1: 4
- ATE_IND.2: 1
- AVA:
- AVA_VAN: 1
- AVA_VAN.3: 2
- AVA_VAN.5: 8
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 2
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 6
- FAU_GEN.2.1: 1
- FAU_SAR: 2
- FAU_SAR.1: 8
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 4
- FAU_SAR.2.1: 1
- FAU_STG: 2
- FAU_STG.1: 8
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 4
- FAU_STG.4.1: 1
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 2
- FIA:
- FIA_ATD.1: 11
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 6
- FIA_UAU.1: 8
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.2: 5
- FIA_UAU.2.1: 1
- FIA_UAU.5: 8
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UID.1: 16
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_UID.2: 7
- FIA_UID.2.1: 1
- FIA_USB.1: 7
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF: 1
- FMT_MOF.1: 10
- FMT_MOF.1.1: 1
- FMT_MSA: 1
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 13
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD: 2
- FMT_MTD.1: 8
- FMT_MTD.1.1: 1
- FMT_REV.1: 8
- FMT_REV.1.1: 1
- FMT_REV.1.2: 1
- FMT_SMF.1: 14
- FMT_SMF.1.1: 1
- FMT_SMR.1: 19
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FRU:
- FRU_RSA.1: 8
- FRU_RSA.1.1: 1
- FTA:
- FTA_SSL.3: 8
- FTA_SSL.3.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 8
- FAU_SAS.1.1: 3
- FCS:
- FCS_CKM: 5
- FCS_CKM.1: 14
- FCS_CKM.2: 1
- FCS_CKM.4: 6
- FCS_CKM.4.1: 2
- FCS_COP: 11
- FCS_COP.1: 27
- FCS_RND: 6
- FCS_RND.1: 8
- FCS_RND.1.1: 3
- FDP:
- FDP_ACC: 3
- FDP_ACC.1: 13
- FDP_ACF: 5
- FDP_ACF.1: 31
- FDP_IFC.1: 3
- FDP_ITC: 2
- FDP_ITC.1: 10
- FDP_ITC.2: 2
- FDP_RIP.1: 3
- FDP_RIP.1.1: 2
- FDP_UCT: 4
- FDP_UCT.1: 9
- FDP_UIT: 4
- FDP_UIT.1: 16
- FIA:
- FIA_AFL: 2
- FIA_AFL.1: 12
- FIA_API: 7
- FIA_API.1: 10
- FIA_API.1.1: 1
- FIA_SOS.2: 1
- FIA_UAU: 6
- FIA_UAU.1: 9
- FIA_UAU.4: 5
- FIA_UAU.5: 8
- FIA_UAU.6: 9
- FIA_UID: 1
- FIA_UID.1: 10
- FMT:
- FMT_LIM: 6
- FMT_LIM.1: 14
- FMT_LIM.1.1: 3
- FMT_LIM.2: 14
- FMT_LIM.2.1: 3
- FMT_MOF: 4
- FMT_MOF.1: 4
- FMT_MSA.3: 2
- FMT_MTD: 12
- FMT_MTD.1: 26
- FMT_SMF.1: 5
- FMT_SMF.1.1: 2
- FMT_SMR: 1
- FMT_SMR.1: 10
- FPT:
- FPT_EMS: 4
- FPT_EMS.1: 8
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS.1: 3
- FPT_FLS.1.1: 2
- FPT_PHP.3: 3
- FPT_PHP.3.1: 2
- FPT_TST.1: 4
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FTP:
- FTP_ITC: 2
- FTP_ITC.1: 19
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 7
- Infineon Technologies: 1
- Oberthur:
- Oberthur Technologies: 12
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 3
- Physical Tampering: 3
- Physical tampering: 2
- fault injection: 1
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 2
- SPA: 1
- physical probing: 3
- timing attacks: 1
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
- EF:
- EF.COM: 8
- EF.DG1: 7
- EF.DG13: 1
- EF.DG14: 1
- EF.DG15: 1
- EF.DG16: 6
- EF.DG2: 5
- EF.DG3: 3
- EF.DG4: 3
- EF.DG5: 3
- EF.SOD: 8
|
pdf_data/st_keywords/standard_id |
- ISO:
- ISO/IEC 15408: 2
- ISO/IEC15408: 12
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186-3: 1
- FIPS 197: 1
- FIPS 46-3: 1
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 18013: 10
- ISO/IEC 7816-4: 1
- ISO/IEC 9797-1: 1
- RFC:
- SCP:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: ODA-USER
- /CreationDate: D:2014052817405909'00'
- /Creator: PrimoPDF http://www.primopdf.com/
- /ModDate: D:2014052817405909'00'
- /Producer: PrimoPDF
- /Title: Microsoft Word - HUS110_ST.doc
- pdf_file_size_bytes: 433611
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 48
|
- /CreationDate: D:20170223112330+01'00'
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20170512161348+02'00'
- /Producer: Microsoft® Office Word 2007
- /Subject:
- /Title:
- pdf_file_size_bytes: 3693308
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 101
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |