name |
MX-FR42 D.10 |
SOMA-c007 Machine Readable Electronic Document SSCD Application version 4 |
category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
ES |
status |
archived |
active |
not_valid_after |
02.12.2019 |
15.09.2028 |
not_valid_before |
27.11.2014 |
15.09.2023 |
cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20_Certificado.pdf |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0449_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20INF-4155.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0449_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2018-20%20ST_LITE.pdf |
manufacturer |
Sharp Corporation |
HID Global |
manufacturer_web |
https://sharp-world.com/ |
https://www.hidglobal.com/ |
security_level |
EAL3 |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst |
c934edb47ed50e04 |
1e59c2d790653fcf |
heuristics/cert_id |
JISEC-CC-CRP-C0449 |
2018-20-INF-4155 |
heuristics/cert_lab |
[] |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ATE_DPT.1, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, AVA_VAN.2, ALC_DVS.1, ADV_ARC.1, ASE_ECD.1, ALC_LCD.1, ASE_REQ.2, ASE_OBJ.2, ATE_IND.2, ATE_FUN.1, ALC_CMS.3, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ADV_TDS.2, ADV_FSP.3, ASE_CCL.1, ALC_CMC.3 |
ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ALC_DEL.1, ASE_INT.1, ADV_ARC.1, ADV_FSP.5, AVA_VAN.5, ASE_ECD.1, ATE_DPT.3, ALC_LCD.1, ASE_REQ.2, ADV_IMP.1, ALC_DVS.2, ASE_OBJ.2, ATE_IND.2, ALC_TAT.2, ATE_FUN.1, ALC_CMC.4, ALC_CMS.5, ADV_INT.2, ASE_SPD.1, ASE_TSS.1, AGD_PRE.1, ASE_CCL.1 |
heuristics/extracted_versions |
10 |
4 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V4-2019 |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0449
- certification_date: 01.11.2014
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1 Release4
- cert_link: https://www.ipa.go.jp/en/security/c0449_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is an IT product, composed of 2 parts, to protect data in a Multi Function Device (hereafter referred to as an“MFD”). One part is a hardware part in an MFD and provided in the form of an MFD. The other part is a firmware product and provided as an upgrade kit for the firmware of the MFD. An MFD is an office machine that has imaging functions such as copy, printer, image scanning and fax. TOE security functions The TOE counters unauthorized disclosure of image data by: - the encryption function, which encrypts data, such as image data that the MFD handles, before storing the data to the HDD in the MFD, - the cryptographic key generation function, generates a seed for a cryptographic key once when the TOE is installed, and generates a constant cryptographic key from the seed whenever the MFD is powered, and stores the key in a volatile memory for the encryption function, - the data erasure function, which automatically overwrites to erase image data no longer in use in the HDD, and overwrites to erase all data when invoked by the administrator of an MFD in use or no longer in use, - the authentication function, which authenticates the TOE administrator with a password, and provides the TOE administrator with a management function for changing his password, - the confidential file function, which provides image data filed by users with password protection, and - the network protection functions, which counters malicious attempts (of unauthorized network-accesses, communication data wiretaps, and network settings falsifications), and - the fax flow control function, which counters attempts to access to the internal network via the MFD network interface from public telephone networks on the MFD fax interface.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: MX-FR42
- product_type: data protection function in Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0449_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0449_est.pdf
- toe_version: D.10
- vendor: Sharp Corporation
- expiration_date: 01.12.2019
- supplier: Sharp Corporation
- toe_japan_name: MX-FR42D.10
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0449_it4490.html
- toe_overseas_name: MX-FR42D.10
|
- category: QSCD/SSCD
- certification_date: 15.09.2023
- enhanced:
- category: QSCD/SSCD
- cc_version: Common Criteria 3.1 release 5
- cert_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1820
- certification_date: 15.09.2023
- description: The TOE is a combination of hardware and software configured to securely create, use, and manage Signature Creation Data (SCD). The SSCD protects the SCD during its whole life cycle as to be used in a signature creation process solely by its Signatory. The TOE comprises all IT security functionality necessary to ensure the secrecy of the SCD and the security of the electronic signature. The TOE provides the following functions: to generate Signature Creation Data (SCD) and the corresponding Signature Verification Data (SVD), to export the SVD for certification to the CGA over a trusted channel, to prove the identity as SSCD to external entities, to, optionally, receive and store certificate info, to switch the SSCD from a non-operational state to an operational state, and if in an operational state, to create digital signatures for data with the following steps: select an SCD if multiple are present in the SSCD, authenticate the Signatory and determine its intent to sign, receive data to be signed or a unique representation thereof (DTBS/R) from the SCA over a trusted channel, apply an appropriate cryptographic signature creation function to the DTBS/R using the selected SCD.
- evaluation_facility: Applus Laboratories
- level: EAL5 + ALC_DVS.2 + AVA_VAN.5
- manufacturer: Hid Global
- report_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1821
- status: Certified
- target_link: https://oc.ccn.cni.es/en/component/djcatalog2/?format=raw&task=download&fid=1819
- type: Product
- manufacturer: Hid Global
- product: SOMA-c007 Machine Readable Electronic Document SSCD Application version 4
- product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/991-soma-c007-machine-readable-electronic-document-sscd-application-version-4
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0891-V6-2021 |
heuristics/protection_profiles |
{} |
d9553e7194783182, 1f7ea2e05de5b88b, d918b28fd7bb5d79 |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf |
pdf_data/cert_filename |
|
2018-20_Certificado.pdf |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0071-2012: 1
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
- /CreationDate: D:20230904142226+02'00'
- /ModDate: D:20230904142226+02'00'
- /Producer: GPL Ghostscript 9.27
- pdf_file_size_bytes: 903551
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
pdf_data/report_filename |
c0449_erpt.pdf |
2018-20 INF-4155.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0449-01: 1
- Certification No. C0449: 1
|
- DE:
- BSI-DSZ-CC-0891-V6-2021: 1
- ES:
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 3
- BSI-CC-PP-0071-2012: 3
- BSI-CC-PP-0072-2012: 3
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 2: 1
- EAL 4: 2
- EAL2: 1
- EAL5: 8
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_IMP.1: 1
- ADV_TDS.4: 1
- AGD:
- ALC:
- ALC_CMC.4: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 8
- ALC_FLR: 3
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_INT.1: 1
- ASE_REQ.2: 1
- ATE:
- ATE_COV.2: 1
- ATE_FUN.1: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.NETWORK: 1
- A.OPERATOR: 1
- T:
- T.RECOVER: 2
- T.REMOTE: 2
- T.SPOOF: 1
- T.TAMPER: 1
- T.TAP: 2
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 4
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /CreationDate: D:20150126175113+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20150126175139+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 238111
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 34
|
- /Author: 9308
- /CreationDate: D:20230918162101+02'00'
- /Creator: Microsoft® Word LTSC
- /ModDate: D:20230918162101+02'00'
- /Producer: Microsoft® Word LTSC
- pdf_file_size_bytes: 509192
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.sogis.eu/
- pdf_is_encrypted: False
- pdf_number_of_pages: 17
|
pdf_data/st_filename |
c0449_est.pdf |
2018-20 ST_LITE.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0891-V6-2021: 2
|
pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 2
- BSI-CC-PP-0068-V2-2011-MA-01: 1
- BSI-CC-PP-0071-2012: 2
- BSI-CC-PP-0072-2012: 2
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 12
- EAL5 augmented: 5
- EAL5+: 1
- EAL6: 1
- EAL6 augmented: 1
- EAL6+: 2
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.4: 1
- ADV_FSP.5: 1
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FCS:
- FCS_CKM.1: 12
- FCS_CKM.1.1: 1
- FCS_CKM.2: 2
- FCS_CKM.4: 8
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_IFC.1: 9
- FDP_IFC.1.1: 1
- FDP_IFF.1: 8
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 2
- FDP_ITC.2: 2
- FDP_RIP.1: 11
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL: 21
- FIA_AFL.1: 4
- FIA_SOS: 15
- FIA_SOS.1: 2
- FIA_UAU: 46
- FIA_UAU.1: 10
- FIA_UAU.2: 2
- FIA_UAU.7: 2
- FIA_UID: 25
- FIA_UID.1: 10
- FIA_UID.2: 2
- FMT:
- FMT_MOF: 27
- FMT_MOF.1: 3
- FMT_MSA.3: 5
- FMT_MTD: 29
- FMT_MTD.1: 3
- FMT_SMF.1: 36
- FMT_SMF.1.1: 1
- FMT_SMR: 20
- FMT_SMR.1: 16
- FTA:
- FTA_TSE.1: 9
- FTA_TSE.1.1: 1
- FTP:
- FTP_TRP.1: 18
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FCS:
- FCS_CKM.1: 16
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP.1: 11
- FDP:
- FDP_ACC: 27
- FDP_ACC.1: 19
- FDP_ACF: 31
- FDP_ACF.1: 18
- FDP_AFC: 1
- FDP_DAU: 8
- FDP_DAU.1: 1
- FDP_DAU.2: 2
- FDP_IFC.1: 10
- FDP_ITC.1: 4
- FDP_ITC.2: 4
- FDP_RIP.1: 8
- FDP_SDI: 19
- FDP_SDI.1: 2
- FDP_SDI.2: 4
- FDP_UIT: 7
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 40
- FIA_AFL.1: 12
- FIA_API: 4
- FIA_API.1: 13
- FIA_UAU.1: 28
- FIA_UAU.1.1: 3
- FIA_UID.1: 26
- FIA_UID.1.1: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 25
- FMT_LIM.2: 19
- FMT_MOF.1: 9
- FMT_MSA: 23
- FMT_MSA.1: 5
- FMT_MSA.2: 10
- FMT_MSA.3: 18
- FMT_MSA.4: 10
- FMT_MTD: 41
- FMT_MTD.1: 5
- FMT_SMF.1: 29
- FMT_SMR: 37
- FMT_SMR.1: 28
- FPT:
- FPT_EMS: 6
- FPT_EMS.1: 16
- FPT_EMS.1.1: 1
- FPT_EMS.1.2: 1
- FPT_FLS.1: 9
- FPT_PHP.1: 10
- FPT_PHP.3: 9
- FPT_PHP.3.1: 1
- FPT_TST: 1
- FPT_TST.1: 14
- FTP:
- FTP_ITC: 61
- FTP_ITC.1: 20
- FTP_TRP.1: 2
|
pdf_data/st_keywords/cc_claims |
- A:
- A.NETWORK: 4
- A.OPERATOR: 4
- O:
- O.FAXTONET: 6
- O.FILTER: 9
- O.MANAGE: 13
- O.REMOVE: 7
- O.RESIDUAL: 7
- O.TRP: 8
- O.USER: 7
- OE:
- OE.CIPHER: 3
- OE.ERASEALL: 3
- OE.FIREWALL: 3
- OE.OPERATE: 3
- OE.PC-USER: 4
- OE.SUBNET: 3
- OE.USER: 3
- T:
- T.RECOVER: 5
- T.REMOTE: 3
- T.SPOOF: 4
- T.TAMPER: 3
- T.TAP: 4
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 5
- Infineon Technologies AG: 1
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
- Generic:
- Crypto Library v2.02.010: 2
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 2
- fault injection: 1
- physical tampering: 10
- SCA:
- DPA: 2
- SPA: 3
- side channels: 1
- timing attacks: 2
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
- CC:
- FIPS:
- FIPS PUB 180-4: 3
- FIPS PUB 197: 1
- ICAO:
- ISO:
- ISO/IEC 7816-4: 1
- ISO/IEC 7816-9: 1
- PKCS:
- RFC:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author:
- /CreationDate: D:20141022171011+09'00'
- /Creator: Word 用 Acrobat PDFMaker 11
- /GTS_PDFXConformance: PDF/X-1a:2001
- /GTS_PDFXVersion: PDF/X-1:2001
- /ModDate: D:20141022171018+09'00'
- /Producer: Adobe PDF Library 11.0
- /Title: Security Target
- /Trapped: /False
- pdf_file_size_bytes: 855255
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /Author: Giovanni LICCARDO, Roberta SODANO
- /CreationDate: D:20230308150403+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20230308150403+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- /Subject: SOMA-c007 Machine Readable Electronic Document
- /Title: SOMA-c007 Machine Readable Electronic Document - Security Target SSCD Application - Recertification
- pdf_file_size_bytes: 1875447
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 131
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
True |
state/cert/download_ok |
False |
True |
state/cert/extract_ok |
False |
True |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |