Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Smart TV Security Solution V8.0 for Samsung Knox
KECS-CISS-1291-2024
STARCOS 3.5 ID ECC C1R
BSI-DSZ-CC-0880-2013
name Smart TV Security Solution V8.0 for Samsung Knox STARCOS 3.5 ID ECC C1R
category Other Devices and Systems Products for Digital Signatures
scheme KR DE
status active archived
not_valid_after 23.02.2029 01.09.2019
not_valid_before 23.02.2024 19.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1291-2024_CR_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0880a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CISS-1291-2024_ST_EN.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0880b_pdf.pdf
manufacturer Samsung Electronics Co., Ltd. G+D Mobile Security GmbH
manufacturer_web https://www.samsung.com https://www.gi-de.com/de/de/mobile-security/
security_level EAL1 EAL4+, AVA_VAN.5
dgst d60796c5d09c77ed 6aab2fa5c307924d
heuristics/cert_id KECS-CISS-1291-2024 BSI-DSZ-CC-0880-2013
heuristics/cert_lab [] BSI
heuristics/extracted_sars ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, APE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_INT.3, APE_INT.1, APE_SPD.1, ADV_FSP.4, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1
heuristics/extracted_versions 8.0 3.5
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0813-2012
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0813-2012
heuristics/scheme_data
  • category: Smart TV Security Solution
  • cert_id: KECS-CISS-1291-2024
  • certification_date: 23.02.2024
  • enhanced:
  • level: EAL1
  • product: Smart TV Security Solution V8.0 for Samsung Knox
  • product_link: https://itscc.kr/certprod/view.do?product_id=1291&product_class=1
  • vendor: Samsung Electronics Co,. Ltd
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/protection_profiles {} d918b28fd7bb5d79
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf
pdf_data/report_filename KECS-CISS-1291-2024_CR_EN.pdf 0880a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0880-2013
    • cert_item: STARCOS 3.5 ID ECC C1R
    • cert_lab: BSI
    • developer: Giesecke & Devrient GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-1291-2024: 1
  • DE:
    • BSI-DSZ-CC-0769-2012: 4
    • BSI-DSZ-CC-0813: 1
    • BSI-DSZ-CC-0813-2012: 4
    • BSI-DSZ-CC-0880: 3
    • BSI-DSZ-CC-0880-2013: 21
    • BSI-DSZ-CC-S-0007-2011: 1
    • BSI-DSZ-CC-S-0008-2011: 1
    • BSI-DSZ-CC-S-0009-2012: 1
    • BSI-DSZ-CC-S-0010-2012: 1
    • BSI-DSZ-CC-S-0012-2012: 1
    • BSI-DSZ-CC-S-0015-2012: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 3
    • BSI-CC-PP-0059-MA-01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 6
  • EAL:
    • EAL 1: 1
    • EAL 4: 10
    • EAL 4 augmented: 3
    • EAL 5: 4
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 4
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 2
    • ASE_REQ.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 4
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 6
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM: 2
    • FCS_COP: 1
  • FIA:
    • FIA_API.1: 5
  • FTP:
    • FTP_ITC: 2
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 44
  • GD:
    • G&D: 4
    • Giesecke & Devrient: 31
  • Infineon:
    • Infineon: 1
    • Infineon Technologies AG: 4
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
  • SRC:
    • SRC Security Research & Consulting: 3
  • TUV:
    • TÜViT: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • CMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 50
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 2
  • FF:
    • DH:
      • Diffie-Hellman: 3
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • PACE:
    • PACE: 11
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • Malfunction: 1
    • fault injection: 1
    • physical tampering: 1
  • SCA:
    • side channel: 1
  • other:
    • JIL: 4
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/tee_name
  • ARM:
    • ARM TrustZone: 2
  • IBM:
    • SE: 49
  • other:
    • TEE: 9
pdf_data/report_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 48
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • SCP:
    • SCP 03: 2
  • BSI:
    • AIS 20: 3
    • AIS 25: 2
    • AIS 26: 2
    • AIS 32: 2
    • AIS 34: 3
    • AIS 35: 2
    • AIS 36: 3
    • AIS 38: 2
    • AIS36: 1
  • FIPS:
    • FIPS PUB 180-2: 2
    • FIPS PUB 197: 1
  • PKCS:
    • PKCS #1: 2
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • STARCOS 3.5 ID ECC C1R Security Target, Version 2.2, 21.03.2013, Giesecke & Devrient GmbH (confidential document) [7] Security Target BSI-DSZ-CC-0880, STARCOS 3.5 ID ECC C1R Security Target Lite, Version 2.3, 21: 1
    • Version 1.2, Date: 27.03.2013, Evaluation Facility: SRC Security Research & Consulting GmbH (confidential document) [9] Protection profiles for secure signature creation device – Part 2: Device with key generation: 1
pdf_data/report_metadata
  • /Author: Administrator
  • /CreationDate: D:20240223140743+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20240223140743+09'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 335018
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20130430135819+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Giesecke & Devrient GmbH, STARCOS 3.5 ID ECC C1R"
  • /ModDate: D:20130430141225+02'00'
  • /Producer: LibreOffice 3.6
  • /Subject: CC-Zertifizierung
  • /Title: Certification Report BSI-DSZ-CC-0880-2013
  • pdf_file_size_bytes: 1049681
  • pdf_hyperlinks: https://www.bsi.bund.de/zertifizierung, https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 40
pdf_data/st_filename KECS-CISS-1291-2024_ST_EN.pdf 0880b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035: 2
    • BSI-CC-PP-0059-2009-MA-: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 4
  • EAL:
    • EAL 4: 4
    • EAL 5: 2
    • EAL4: 7
    • EAL4 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 14
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 7
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.1: 5
    • ASE_REQ.1: 13
    • ASE_TSS.1: 6
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 7
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 5
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
  • FIA:
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_TEE.1: 4
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM: 14
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 16
    • FCS_COP: 9
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
    • FCS_RND.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 27
    • FDP_ACC.1: 17
    • FDP_ACF: 18
    • FDP_ACF.1: 18
    • FDP_DAU: 7
    • FDP_DAU.1: 1
    • FDP_DAU.2: 2
    • FDP_IFC.1: 11
    • FDP_ITC.1: 8
    • FDP_ITC.2: 8
    • FDP_ITT.1: 3
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI: 13
    • FDP_SDI.1: 2
    • FDP_SDI.2: 4
    • FDP_UIT: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 4
    • FIA_API.1: 17
    • FIA_API.1.1: 3
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA: 14
    • FMT_MSA.1: 4
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.4: 7
    • FMT_MSA.4.1: 1
    • FMT_MTD: 12
    • FMT_MTD.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 23
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 6
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 4
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 3
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 2
    • FPT_TST: 2
    • FPT_TST.1: 14
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST.2: 1
    • FPT_TST.3: 1
  • FRU:
    • FRU_FLT.2: 3
  • FTP:
    • FTP_ITC: 35
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.CGA: 4
    • A.SCA: 4
  • O:
    • O.RND: 3
  • OE:
    • OE.HID_VAD: 1
  • OT:
    • OT.TOE_TC_SVD_EXP: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 31
  • GD:
    • G&D: 6
    • Giesecke & Devrient: 8
  • Infineon:
    • Infineon: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES256: 1
  • AES_competition:
    • AES:
      • AES: 13
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 106
    • ECDSA:
      • ECDSA: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-2: 2
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • PACE:
    • PACE: 5
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 3
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP224r1: 3
    • brainpoolP256r1: 8
    • brainpoolP320r1: 8
    • brainpoolP384r1: 8
    • brainpoolP512r1: 8
  • NIST:
    • secp256r1: 8
    • secp384r1: 8
    • secp521r1: 8
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 8
    • fault injection: 1
    • physical tampering: 14
  • SCA:
    • DPA: 3
    • Leak-Inherent: 7
    • SPA: 2
    • timing attacks: 2
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 2
  • IBM:
    • SE: 93
  • other:
    • TEE: 9
pdf_data/st_keywords/os_name
  • STARCOS:
    • STARCOS: 1
    • STARCOS 3: 108
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • SCP:
    • SCP 03: 3
  • BSI:
    • AIS 31: 1
    • AIS20: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
  • FIPS:
    • FIPS PUB 180-2: 1
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 14443: 4
    • ISO/IEC 7816: 4
  • PKCS:
    • PKCS #1: 1
pdf_data/st_metadata
  • /CreationDate: D:20240223141717+09'00'
  • /Creator: Microsoft® Word LTSC
  • /ModDate: D:20240223141717+09'00'
  • /Producer: Microsoft® Word LTSC
  • pdf_file_size_bytes: 444472
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
  • /Author: Giesecke & Devrient GmbH
  • /Category: M7820
  • /Comments: Public
  • /Company: Giesecke & Devrient
  • /CreationDate: D:20130321175922+01'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /Keywords: Version 2.3/21.03.13
  • /Manager: Infineon
  • /ModDate: D:20130321175925+01'00'
  • /Producer: Acrobat Distiller 9.5.0 (Windows)
  • /Subject: Security Target Lite STARCOS 3.5 ID ECC C1R
  • /Title: STARCOS 3.5 ID ECC C1R
  • pdf_file_size_bytes: 282804
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 86
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different