name |
HED Secure Smart Card Chip CIU9872B_01 C11 with IC Dedicated Software |
Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11 |
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
NO |
FR |
status |
archived |
archived |
not_valid_after |
25.11.2021 |
01.09.2019 |
not_valid_before |
25.11.2016 |
07.02.2014 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/files/epfiles/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_14fr.pdf |
st_link |
https://www.commoncriteriaportal.org/files/epfiles/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible%20ANSSI-CC-2014_14en.pdf |
manufacturer |
CEC Huada Electronic Design Co., Ltd. |
Gemalto - Infineon Technologies AG |
manufacturer_web |
|
https://www.gemalto.com/ |
security_level |
ALC_DVS.2, EAL5+, AVA_VAN.5 |
EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst |
d48cc6c1c371a5a4 |
5f544899f54919a6 |
heuristics/cert_id |
|
ANSSI-CC-2014/14 |
heuristics/cert_lab |
[] |
SERMA |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_ARC.1, ALC_CMC.4, ALC_DVS.2, ASE_OBJ.2, ALC_TAT.2, ASE_SPD.1, ATE_IND.2, AGD_PRE.1, ADV_FSP.5, ALC_DEL.1, ATE_FUN.1, ATE_DPT.3, ADV_TDS.4, ATE_COV.2, ASE_ECD.1, ASE_REQ.2, ALC_LCD.1, ASE_TSS.1, ASE_INT.1, AVA_VAN.5, ADV_INT.2, ALC_CMS.5, ADV_IMP.1, ASE_CCL.1, AGD_OPE.1 |
AVA_VAN.5, ALC_DVS.2 |
heuristics/extracted_versions |
- |
- |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
ANSSI-CC-2014/49, ANSSI-CC-2014/50, ANSSI-CC-2015/08 |
heuristics/report_references/directly_referencing |
{} |
ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012 |
heuristics/report_references/indirectly_referenced_by |
{} |
ANSSI-CC-2015/38, ANSSI-CC-2015/37, ANSSI-CC-2014/49, ANSSI-CC-2015/08, ANSSI-CC-2016/03, ANSSI-CC-2016/04, ANSSI-CC-2014/50 |
heuristics/report_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, ANSSI-CC-2014/06, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011 |
heuristics/scheme_data |
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- certification_date: 25.11.2016
- developer: CEC Huada Electronic Design Co., Ltd.
- enhanced:
- category: ICs, Smart Cards and Smart Card-Related Devices and Systems
- cert_id: SERTIT-090
- certification_date: 25.11.2016
- description: The TOE is a high-end secure smart card integrated circuit with dedicated software mainly for financial applications. The scope of the TOE includes the IC hardware and IC dedicated software which is constitutive of Chip Management System (CMS) and cryptographic library. CMS supports two functionalities, which are booting process controlling and chip module function testing. The cryptographic library implements the arithmetic function like RSA, DES, and TDES with cooperating of hardware. The whole IC dedicated software is programed with C language.
- developer: CEC Huada Electronic Design Co., Ltd.
- documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135106-1607952924/SERTIT/Sertifikater/2016/90/20161125%20SERTIT-090%20C.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135112-1607952929/SERTIT/Sertifikater/2016/90/Security%20Target-lite%20of%20CIU9872B_01%20C11%20Secure%20Smart%20Card%20Chip%20V1.1.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135109-1607952926/SERTIT/Sertifikater/2016/90/20161125%20S-090%20CR%20%20v1.0%20Huada.pdf'})]})
- evaluation_facility: Brightsight B.V.
- level: EAL 5, ALC_DVS.2, AVA_VAN.5
- mutual_recognition: CCRA, SOG-IS
- product: C11
- protection_profile: BSI-CC-PP-0084-2014 v1.0
- sponsor: CEC Huada Electronic Design Co., Ltd.
- product: HED Secure Smart Card Chip CIU9872B_01
- url: https://sertit.no/certified-products/product-archive/hed-secure-smart-card-chip-ciu9872b-01
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0727-2011, BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0727-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0813-2012, BSI-DSZ-CC-0695-2011 |
heuristics/protection_profiles |
{} |
9863a376f3bb4175, 40002c3611fc465f |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
|
Rapport ANSSI-CC-2014_14fr.pdf |
pdf_data/report_frontpage |
|
- FR:
- cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
- cc_version: Critères Communs version 3.1 révision 4
- cert_id: ANSSI-CC-2014/14
- cert_item: Application IAS V4 sur la plateforme JavaCard ouverte MultiApp V3 masquée sur le composant M7820 A11
- cert_item_version: Version de l’application IAS : 4.0.2.K Version de l’application MOCA Server : 1.0 Version plateforme Java Card MultiApp : 3.0 Version du patch : 1.5
- cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
- developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France Infineon Technologies AG AIM CC SM PS – Am Campeon 1-12, 85579 Neubiberg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
- match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
- ref_protection_profiles: Protection Profile – Secure Signature-Creation Device Type 2, version 1.04, certifié sous la référence [BSI-PP-0005-2002]. Protection Profile – Secure Signature-Creation Device Type 3, version 1.05, certifié sous la référence [BSI-PP-0006-2002
|
pdf_data/report_keywords/cc_cert_id |
|
- DE:
- FR:
- ANSSI-CC-2014/06: 4
- ANSSI-CC-2014/14: 23
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-PP- 0005-2002: 1
- BSI-PP- 0006-2002: 1
- BSI-PP- 0035-2007: 1
- BSI-PP-0005-2002: 3
- BSI-PP-0006-2002: 3
- BSI-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 1: 1
- EAL 3: 1
- EAL 5: 3
- EAL 7: 1
- EAL4: 2
- EAL5: 1
- EAL7: 1
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_FSP: 1
- ADV_IMP: 1
- ADV_INT: 1
- ADV_SPM: 1
- ADV_TDS: 1
- AGD:
- ALC:
- ALC_CMC: 1
- ALC_CMS: 1
- ALC_DEL: 1
- ALC_DVS: 1
- ALC_DVS.2: 3
- ALC_FLR: 2
- ALC_TAT: 1
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_REQ: 1
- ASE_SPD: 1
- ASE_TSS: 1
- ATE:
- ATE_COV: 1
- ATE_DPT: 1
- ATE_FUN: 1
- ATE_IND: 1
- AVA:
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
- Gemalto:
- Infineon:
- Infineon: 3
- Infineon Technologies: 5
- Infineon Technologies AG: 1
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
- com:
- com.gemalto.javacardx.pace: 1
- javacardx:
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
- /Author: Duquesnoy
- /CreationDate: D:20140310110235+01'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20140310110235+01'00'
- /Producer: Acrobat Distiller 9.0.0 (Windows)
- /Title: Microsoft Word - Rapport ANSSI-CC-2014_14fr.doc
- pdf_file_size_bytes: 230125
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 22
|
pdf_data/st_filename |
Security Target-lite of CIU9872B_01 C11 Secure Smart Card Chip V1.1.pdf |
Cible ANSSI-CC-2014_14en.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
- DE:
- BSI-DSZ-CC-0695-2011: 1
- BSI-DSZ-CC-0727-2011: 1
- BSI-DSZ-CC-0829-2012: 1
- NL:
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-PP-0084: 24
|
- BSI:
- BSI-CC-PP-0059-2009-MA-01: 1
- BSI-CC-PP-0075-2012: 1
- BSI-PP-0005: 1
- BSI-PP-0006: 1
- BSI-PP-0035: 1
- other:
- PP-SSCD-KG: 16
- PP-SSCD-KI: 14
|
pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL4: 1
- EAL4 augmented: 1
- EAL5: 9
- EAL5 augmented: 3
- EAL5+: 1
|
- EAL:
- EAL 5+: 1
- EAL5: 2
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 2
- ADV_FSP.5: 2
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.4: 2
- AGD:
- AGD_OPE: 2
- AGD_OPE.1: 2
- AGD_PRE: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.5: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 8
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN: 1
- FAU_SAS: 5
- FAU_SAS.1: 6
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM.1: 13
- FCS_CKM.4: 10
- FCS_COP: 1
- FCS_COP.1: 21
- FCS_COP.1.1: 2
- FCS_RNG: 3
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 1
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF: 1
- FDP_ACF.1: 12
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 4
- FDP_ITC.1: 9
- FDP_ITC.2: 9
- FDP_ITT.1: 4
- FDP_SDC: 3
- FDP_SDC.1: 5
- FDP_SDC.1.1: 1
- FDP_SDI: 1
- FDP_SDI.1: 3
- FDP_SDI.2: 6
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_LIM: 5
- FMT_LIM.1: 5
- FMT_LIM.2: 5
- FMT_MSA.3: 4
- FPT:
- FPT_FLS: 1
- FPT_FLS.1: 6
- FPT_FLS.1.1: 1
- FPT_ITT.1: 4
- FPT_PHP: 1
- FPT_PHP.3: 5
- FPT_PHP.3.1: 1
- FRU:
|
- FCS:
- FCS_CKM: 16
- FCS_CKM.1: 6
- FCS_CKM.1.1: 2
- FCS_CKM.2: 2
- FCS_CKM.4: 10
- FCS_CKM.4.1: 2
- FCS_COP: 14
- FCS_COP.1: 2
- FCS_COP.1.1: 3
- FDP:
- FDP_ACC: 2
- FDP_ACC.1: 14
- FDP_ACC.1.1: 5
- FDP_ACF.1: 3
- FDP_ACF.1.1: 5
- FDP_ACF.1.2: 5
- FDP_ACF.1.3: 5
- FDP_ACF.1.4: 5
- FDP_ETC: 1
- FDP_ETC.1: 2
- FDP_ETC.1.1: 1
- FDP_ETC.1.2: 1
- FDP_IFC.1: 11
- FDP_ITC: 4
- FDP_ITC.1: 5
- FDP_ITC.1.1: 2
- FDP_ITC.1.2: 2
- FDP_ITC.1.3: 2
- FDP_ITC.2: 5
- FDP_RIP: 1
- FDP_RIP.1: 1
- FDP_RIP.1.1: 1
- FDP_SDI: 4
- FDP_SDI.1: 2
- FDP_SDI.2.1: 2
- FDP_SDI.2.2: 2
- FDP_UCT: 2
- FDP_UCT.1: 1
- FDP_UCT.1.1: 1
- FDP_UIT: 2
- FDP_UIT.1: 1
- FDP_UIT.1.1: 2
- FDP_UIT.1.2: 2
- FIA:
- FIA_AFL: 5
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_ATD.1: 2
- FIA_ATD.1.1: 1
- FIA_UAU: 4
- FIA_UAU.1: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UID: 4
- FIA_UID.1: 5
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FMT:
- FMT_MOF.1: 2
- FMT_MOF.1.1: 1
- FMT_MSA: 16
- FMT_MSA.1: 3
- FMT_MSA.1.1: 3
- FMT_MSA.2: 2
- FMT_MSA.2.1: 1
- FMT_MSA.3: 3
- FMT_MSA.3.1: 2
- FMT_MSA.3.2: 2
- FMT_MSA.4.1: 2
- FMT_MTD: 4
- FMT_MTD.1.1: 2
- FMT_SMF.1: 8
- FMT_SMF.1.1: 1
- FMT_SMR.1: 11
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_EMS: 3
- FPT_EMS.1: 7
- FPT_EMS.1.1: 3
- FPT_EMS.1.2: 3
- FPT_FLS.1: 2
- FPT_FLS.1.1: 1
- FPT_PHP.1: 2
- FPT_PHP.1.1: 1
- FPT_PHP.1.2: 1
- FPT_PHP.3: 2
- FPT_PHP.3.1: 1
- FPT_TST: 2
- FPT_TST.1: 3
- FPT_TST.1.1: 1
- FPT_TST.1.2: 1
- FPT_TST.1.3: 1
- FTP:
- FTP_ITC: 13
- FTP_ITC.1: 3
- FTP_ITC.1.1: 3
- FTP_ITC.1.2: 3
- FTP_ITC.1.3: 3
- FTP_TRP: 4
- FTP_TRP.1: 2
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
pdf_data/st_keywords/cc_claims |
- O:
- O.MEM-ACCESS: 1
- O.RND: 2
- O.RSA: 4
- O.TDES: 5
- T:
|
- A:
- D:
- D.DTBS: 1
- D.RAD: 1
- D.SCD: 1
- D.SIG: 1
- D.SSCD: 1
- D.SVD: 1
- D.VAD: 1
- OE:
- OE.HI_VAD: 1
- OE.SVD_AUTH_CGA: 1
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
- FI:
- DFA: 2
- Malfunction: 6
- malfunction: 2
- physical tampering: 1
- SCA:
- DPA: 3
- Leak-Inherent: 5
- Physical Probing: 2
- SPA: 3
- physical probing: 3
|
- FI:
- SCA:
- DPA: 1
- SPA: 1
- timing attacks: 1
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- BSI:
- CC:
- CCMB-2012-09-001: 2
- CCMB-2012-09-002: 2
- CCMB-2012-09-003: 2
- CCMB-2012-09-004: 2
- FIPS:
- ISO:
- ISO/IEC 14443: 2
- ISO/IEC 7816: 2
- ISO/IEC14443: 2
|
- CC:
- CCMB-2012-09-001: 1
- CCMB-2012-09-002: 1
- CCMB-2012-09-003: 1
- CCMB-2012-09-004: 1
- FIPS:
- FIPS PUB 46-3: 1
- FIPS180-2: 1
- FIPS197: 2
- FIPS46-3: 1
- PKCS:
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: 刘剑峰
- /CreationDate: D:20161125102430+00'00'
- /Creator: Microsoft Word
- /ModDate: D:20161125102430+00'00'
- pdf_file_size_bytes: 1079746
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 40
|
- /Author: Antoine de Lavernette
- /CreationDate: D:20140123111642+01'00'
- /Creator: Microsoft® Office Word 2007
- /Keywords: Security Target, CC, eTravel
- /ModDate: D:20140123111642+01'00'
- /Producer: Microsoft® Office Word 2007
- /Subject: MRTD
- /Title: eTravel v1.0 Security Target MAÏA3
- pdf_file_size_bytes: 653030
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 46
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
False |
True |
state/report/download_ok |
False |
True |
state/report/extract_ok |
False |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |