name |
Argus Command Center Web Portal Stable Version 2.1 |
ST54J A01 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
MY |
FR |
status |
active |
archived |
not_valid_after |
23.06.2026 |
18.04.2024 |
not_valid_before |
23.06.2021 |
18.04.2019 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C115-CR-v1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2019_20.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2019%20Certis%20Cisco%20–%20Argus%20CC%20EAL2%20–%20Security%20Target%20[ASE]-v1.14%202.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2019_20en.pdf.pdf |
manufacturer |
Certis CISCO Security Pte Ltd (Certis) |
STMicroelectronics |
manufacturer_web |
https://www.certisgroup.com/ |
https://www.st.com/ |
security_level |
EAL2 |
AVA_VAN.5, EAL5+, ALC_DVS.2 |
dgst |
c86ad5ef88d4cf8b |
7864dffb718a5592 |
heuristics/cert_id |
ISCB-3-RPT-C115-CR-v1 |
ANSSI-CC-2019/20 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ATE_IND.2, AGD_PRE.1, AGD_OPE.1, ASE_REQ.2, ADV_TDS.1, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ADV_FSP.2, ASE_TSS.1, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1 |
ADV_IMP.1, AVA_VAN.5, ADV_INT.2, ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ADV_TDS.4, ALC_CMC.4, ALC_TAT.2, AGD_OPE.1, ASE_REQ.2, ASE_ECD.1, ALC_DVS.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 |
heuristics/extracted_versions |
2.1 |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
cf0f01bcd7be3e9c |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename |
ISCB-5-CERT-C115-CERTIFICATE-v1.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20210630131348Z
- /Creator: Word
- /ModDate: D:20210630215915+08'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 205722
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
ISCB-5-RPT-C115-CR-v1.pdf |
anssi-cc-2019_20.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 5
- cert_id: ANSSI-CC-2019/20
- cert_item: ST54J A01
- cert_item_version: A01
- cert_lab: Serma Safety & Security 14 rue Galilée, CS 10071, 33608 Pessac Cedex, France
- developer: STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France Commanditaire STMicroelectronics 190 avenue Célestin Coq, ZI de Rousset, 13106 Rousset Cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
|
pdf_data/report_keywords/cc_cert_id |
- MY:
- ISCB-3-RPT-C115-CR-v1: 35
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084-2014: 1
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 2
- EAL 3: 1
- EAL 5: 3
- EAL 7: 2
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
- ALC:
- ALC_CMS.2: 1
- ALC_DEL.1: 1
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 2
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 14
- FDP_ACF.1: 1
- FIA:
- FIA_AFL.1: 2
- FIA_ATD.1: 5
- FIA_SOS.1: 3
- FIA_SOS.2: 2
- FIA_UAU.1: 2
- FIA_UID.1: 7
- FMT:
- FMT_MSA.1: 7
- FMT_SMF.1: 3
- FMT_SMR.1: 3
- FTP:
- FTP_ITC.1: 17
- FTP_TRP.1: 2
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.CLOUD: 1
- A.CONNECTIVITY: 1
- A.DDOS: 1
- A.MALWARE: 1
- A.THIRDPARTY: 1
- A.TIMESTAMP: 1
- A.TRUSTED_ADMIN: 1
- A.TRUSTED_DEV: 1
|
|
pdf_data/report_keywords/vendor |
|
- STMicroelectronics:
- STM: 10
- STMicroelectronics: 2
|
pdf_data/report_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 1
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- ISO:
- ISO/IEC 18045: 2
- ISO/IEC15408: 2
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- CCMB-2017-04-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20210629084408Z00'00'
- /Creator: Word
- /ModDate: D:20210629084408Z00'00'
- /Producer: macOS Version 10.15.7 (Build 19H1217) Quartz PDFContext
- pdf_file_size_bytes: 800031
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 36
|
- /Author: RENNER Soline
- /CreationDate: D:20190418171553+02'00'
- /Creator: Microsoft® Word 2010
- /Keywords: ANSSI-CC-CER-F-07.29
- /ModDate: D:20190418171553+02'00'
- /Producer: Microsoft® Word 2010
- /Subject: ST54J A01
- /Title: ANSSI-CC-2019/20
- pdf_file_size_bytes: 892903
- pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14 2.pdf |
anssi-cible-cc-2019_20en.pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0084-2014: 10
- BSI-CC-PP-0084-: 1
- BSI-CC-PP-0084-2014: 65
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 1
- EAL 5 augmented: 1
- EAL4: 1
- EAL5: 16
- EAL5 augmented: 1
- EAL5+: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.2: 1
- ADV_TDS.1: 1
- AGD:
- AGD_OPE.1: 4
- AGD_PRE.1: 4
- ALC:
- ALC_CMC.2: 1
- ALC_CMS.2: 1
- ALC_DEL.1: 4
- ASE:
- ASE_CCL.1: 3
- ASE_ECD: 1
- ASE_ECD.1: 3
- ASE_INT.1: 3
- ASE_OBJ.2: 3
- ASE_REQ.2: 5
- ASE_SPD.1: 3
- ASE_TSS.1: 3
- ATE:
- ATE_COV.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 2
- ADV_ARC.1: 2
- ADV_FSP: 4
- ADV_FSP.5: 3
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_INT.2: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 3
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.5: 1
- ALC_DEL: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.2: 4
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 4
- ASE_CCL.1: 1
- ASE_ECD: 4
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 11
- ASE_OBJ.2: 1
- ASE_REQ: 30
- ASE_REQ.2: 1
- ASE_SPD: 8
- ASE_SPD.1: 1
- ASE_TSS: 7
- ASE_TSS.1: 1
- ATE:
- ATE_COV: 3
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FDP:
- FDP_ACC.1: 8
- FDP_ACC.1.1: 1
- FDP_ACF.1: 6
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FIA:
- FIA_AFL.1: 5
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 5
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_SOS.2: 5
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_UAU.1: 6
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UID.1: 8
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FMT:
- FMT_MSA.1: 6
- FMT_MSA.1.1: 1
- FMT_MSA.3: 7
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 6
- FMT_SMF.1.1: 1
- FMT_SMR.1: 9
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 5
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 8
- FAU_SAR.1: 25
- FAU_SAS: 2
- FAU_SAS.1: 28
- FCS:
- FCS_CKM.1: 2
- FCS_CKM.4: 4
- FCS_COP.1: 17
- FCS_RNG: 2
- FCS_RNG.1: 6
- FDP:
- FDP_ACC.1: 23
- FDP_ACC.2: 12
- FDP_ACF: 1
- FDP_ACF.1: 28
- FDP_IFC.1: 17
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_ITT.1: 10
- FDP_SDC: 2
- FDP_SDC.1: 8
- FDP_SDI.2: 14
- FDP_SMF.1: 2
- FDP_SMR.1: 1
- FDP_UCT.1: 16
- FDP_UIT.1: 16
- FIA:
- FIA_API: 2
- FIA_API.1: 6
- FIA_UAU.1: 14
- FIA_UID.1: 16
- FMT:
- FMT_LIM: 2
- FMT_LIM.1: 29
- FMT_LIM.2: 30
- FMT_MSA.1: 26
- FMT_MSA.3: 26
- FMT_SMF.1: 21
- FMT_SMR.1: 17
- FPT:
- FPT_FLS.1: 22
- FPT_ITT.1: 9
- FPT_PHP.3: 11
- FRU:
- FTP:
- FTP_ITC.1: 27
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.CLOUD: 3
- A.CONNECTIVITY: 4
- A.DDOS: 3
- A.MALWARE: 4
- A.THIRDPARTY: 3
- A.TIMESTAMP: 4
- A.TRUSTED_ADMIN: 4
- A.TRUSTED_DEV: 3
- O:
- O.SEC_ACCESS: 5
- O.SEC_AUTHENTICATE: 5
- O.SEC_COMMUNICATION: 5
- O.SEC_PASSWORD_GENER: 1
- O.SEC_PASSWORD_GENERATION: 3
- OE:
- OE.ADMINISTRATOR: 3
- OE.ANTI_DDOS: 3
- OE.ANTI_MALWARE: 3
- OE.DEVELOPER: 3
- OE.SAFE_CLOUD: 3
- OE.SAFE_CONNECTIVITY: 3
- OE.SYN_TIMESTAMP: 3
- OE.THIRDPARTY: 3
- T:
- T.BROKEN_AUTH: 4
- T.INTERCEPTION: 4
- T.UNAUTHORIZED_AC: 1
- T.UNAUTHORIZED_ACCESS: 2
- T.WEAK_PASSWORD_: 1
- T.WEAK_PASSWORD_GENE: 1
- T.WEAK_PASSWORD_GENERATION: 1
|
- O:
- O.C: 2
- O.RND: 4
- O.TOE-: 1
- R:
- T:
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Philips:
- STMicroelectronics:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- AES:
- AES: 17
- AES-128: 1
- AES-192: 1
- AES-256: 1
- DES:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 13
- malfunction: 2
- physical tampering: 1
- SCA:
- Leak-Inherent: 14
- Physical Probing: 4
- physical probing: 3
- side channel: 2
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- BSI:
- CC:
- CCMB-2017-04-001: 2
- CCMB-2017-04-002: 23
- CCMB-2017-04-003: 2
- FIPS:
- ISO:
- ISO/IEC 14888: 2
- ISO/IEC 7816-3: 1
- ISO/IEC 9796: 1
- ISO/IEC 9796-2: 1
- NIST:
- NIST SP 800-38A: 2
- NIST SP 800-67: 3
- SP 800-38A: 2
- SP 800-67: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
- OutOfScope:
- AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope: 1
- environment, listing the AWS services being used. The Argus Platform and AWS S3 are deemed as out of scope. Consumers are able to access the TOE upon successful authentication through the web browser and: 1
- infrastructure is conducted solely by Amazon Web Services, Inc. The following are categorized as out of scope from the selected TOE: • Amazon Web Service (AWS) host, • database host(s); • mobile device(s: 1
- inside the Amazon Web Services AWS S3 (AWS), a third-party hosting environment which is deemed as out of scope. Component 5 is also out of scope. Figure 1 shows the supporting non-TOE software shown within the: 1
- out of scope: 5
- together with the logical scope of the TOE boxed in red. The Argus Platform is deemed as out of scope. All hardware appliances/devices, software components, integration APIs and third-party hosting: 1
|
- OutOfScope:
- The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation: 1
- The ST54J_SE is in the scope of this evaluation, while the ST54J_CLF and the ST54J_IOs are out of scope of this evaluation. 18 In the following, the TOE is denoted by “ST54J A01” or “TOE”. 19 Figure 1: 1
- ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation: 1
- Security IC Embedded Software (ES) is in User NVM. 41 Note: The ES is not part of the TOE and is out of scope of the evaluation. 1.6.3 TOE documentation 42 The user guidance documentation, part of the TOE: 1
- out of scope: 2
|
pdf_data/st_metadata |
- /Author: CLAIREHYC
- /CreationDate: D:20210701124256+08'00'
- /Creator: PDFCreator Free 4.2.0
- /Keywords:
- /ModDate: D:20210701124256+08'00'
- /Producer: GPL Ghostscript 9.52
- /Subject:
- /Title: 2019 Certis Cisco – Argus CC EAL2 – Security Target [ASE]-v1.14
- pdf_file_size_bytes: 1022047
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
- /Author: Christiane DROULERS
- /CreationDate: D:20190325175557Z
- /Creator: FrameMaker 11.0
- /ModDate: D:20190325180544+01'00'
- /Producer: Acrobat Elements 10.0.0 (Windows)
- /Title: SMD_ST54J_VA01_3P.book
- pdf_file_size_bytes: 768214
- pdf_hyperlinks: http://www.st.com
- pdf_is_encrypted: False
- pdf_number_of_pages: 80
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |