Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Ruckus Solution
SERTIT-071
SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD)
NSCIB-CC-0189594-CR
name Ruckus Solution SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD)
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme NO NL
status archived active
not_valid_after 27.06.2021 13.07.2026
not_valid_before 27.06.2016 13.07.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-certificate-21-0189594.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160627_SERTIT-071_Ruckus%20Solution_CR_v.1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/nscib-cc-0189594-crsscd-imp.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Ruckus%20Wireless%20-%20Ruckus%20Solution%20final%20v1.8.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st-lite-sscd_impv1.6st_lite_eps3_pp0075_v16_infineon.pdf
manufacturer Ruckus Wireless, Inc. Infineon Technologies AG
manufacturer_web https://www.ruckuswireless.com/ https://www.infineon.com/
security_level EAL2+, ALC_FLR.1 EAL5+, AVA_VAN.5, ALC_DVS.2
dgst d942b6cb00b24266 5c8a5a97ed2b0df4
heuristics/cert_id SERTIT-071 NSCIB-CC-0189594-CR
heuristics/cert_lab []
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2
heuristics/extracted_versions - 1.0, 3.5
heuristics/scheme_data
  • category: Network and Network-Related Devices and Systems
  • certification_date: 27.06.2016
  • developer: Ruckus Wireless, Inc.
  • enhanced:
    • category: Network and Network-Related Devices and Systems
    • cert_id: SERTIT-071
    • certification_date: 27.06.2016
    • description: The Ruckus Solution (TOE) is a Wireless LAN access system (WLAN). The Wireless LAN access system defined in this ST are multiple products operating together to provide secure wireless access to a wired and wireless network. The TOE provides end-to-end wireless encryption, centralized WLAN management, authentication, authorization, and accounting (AAA) policy enforcement. SZ 100 SmartZoneâ„¢ 100 (SZ 100) is the most Scalable, Resilient, and Highest Performing Wireless LAN controller within Ruckus family of WLAN controllers for Enterprises around the world. It manages up to 1,024 ZoneFlex Smart Wi-Fi access points, 2,000 WLANs, and 25,000 clients per device. Its RuckOS' unique architecture enables SZ 100 to be deployed in 3+1 Active-Active cluster. With Active-Active clustering all members (up to 4) of cluster will actively manage APs in the network and also provides the highest resiliency. With clustering it can manage up to 3,000 APs and 60,000 clients. Its Smart licensing allows customers to manage all the licensing needs online at https://Support.ruckuswireless.com. With Smart licensing, customers will have the ability to buy and assign licenses as granular as 1 (one) AP license. vSCG Ruckus virtual SmartCellâ„¢ Gateway (vSCG), is a Network Functions Virtualization (NFV) based WLAN Controller for service providers and enterprises who desire a carrier-class solution that runs in the cloud. It supports all of the WLAN Controller features of the industry leading SCG-200, while also enabling the rollout of highly scalable and resilient wireless LAN cloud services. SCG-200 The SmartCellâ„¢ Gateway (SCG) 200 represents the first in a new category of scalable and versatile WLAN controllers with support for 3GPP compatible WLAN gateway functionality. It has been designed to eliminate the difficulties service providers and enterprises are experiencing when building and managing large-scale Wi-Fi radio access networks and integrating them into their core networks. R310 ZoneFlex R310 Smart Wi-Fi Indoor delivers high-performance and reliable wireless networking and combines patented adaptive antenna technology and automatic interference mitigation to deliver consistent, predictable performance. R500 The Ruckus ZoneFlex R500 delivers high-performance and reliable 802.11ac wireless networking at a competitive price point. Unlike any other 802.11ac wireless solution in its class, the ZoneFlex R500 combines patented adaptive antenna technology and automatic interference mitigation to deliver consistent, predictable performance at extended ranges with up to an additional 4dB of BeamFlex gain on top of the physical antenna gain and up to 10dB of interference mitigation. A sleek and low-profile design, the ZoneFlex R500 was purpose built for enterprises requiring reliable high speed client connectivity. It is ideal for a variety of medium density enterprise and hotspot environments including SMBs, hotels, retail outlets, and branch offices. R600 The Ruckus ZoneFlex R600 delivers high-performance and reliable 802.11ac wireless networking at a competitive price point for medium density venues such as in K-12 or education. The ZoneFlex R600 combines patented adaptive antenna technology and automatic interference mitigation to deliver consistent, predictable performance at extended ranges with up to an additional 6dB of BeamFlex gain on top of the physical antenna gain and up to 15dB of interference mitigation. The R600 is ideal for wireless networks servicing mobile devices with dual-polarized antennas that adapt in real time to maximize performance for the mobile enterprise. A sleek and low-profile design, the ZoneFlex R600 was purposebuilt for enterprises requiring reliable high speed client connectivity. It is ideal for a variety of medium density enterprise and hotspot environments including SMBs, hotels, and schools. R710 ZoneFlex R710 Smart Wi-Fi Indoor is purpose-built for high-capacity, high performance and interference-laden environments such as airports, public venues, hotels, universities and conference centers. Built for data-intensive streaming multimedia applications, for delivering of picture HD-quality IP video while supporting VoIP and data applications that have stringent quality of service requirements. The ZoneFlex T300 Series, are dual-band 802.11ac outdoor access points (AP) designed explicitly for high density public venues such as airports, conventions centers, plazas & malls, and other dense urban environments. Offered as either with an internal omni directional antennas or with optional external 5GHz antenna support, the T300 Series is designed for easy installation within an ultra-lightweight and low profile enclosure. The T300 is ideal for venue owners and enterprises looking to quickly and economically deploy Wi-Fi in high-capacity environments.
    • developer: Ruckus Wireless, Inc.
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135025-1607952560/SERTIT/Sertifikater/2016/71/20160627_SERTIT-071_Ruckus%20Solution_C_v.1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135028-1607952564/SERTIT/Sertifikater/2016/71/ST%20Ruckus%20Wireless%20-%20Ruckus%20Solution%20final%20v1.8.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135022-1607952557/SERTIT/Sertifikater/2016/71/20160627_SERTIT-071_Ruckus%20Solution_CR_v.1.0.pdf'})]})
    • evaluation_facility: Advanced Data Security
    • level: EAL 2, ALC_FLR.2
    • mutual_recognition: CCRA
    • product: Wireless Controllers: SmartCell Gateway 200 (SCG 200); Virtual SmartCell Gateway (vSCG); Smart Zone 100 (SZ 100); Access Points: ZoneFlex R500 Smart Wi-Fi Indoor (R500); ZoneFlex R600 Smart Wi-Fi Indoor (R600); ZoneFlex T300 Smart Wi-Fi Outdoor (T300); ZoneFlex R710 Smart Wi-Fi Indoor (R710); ZoneFlex R310 Smart Wi-Fi Indoor (R310); Software: RuckOS 3.2.1
  • product: Ruckus Solution
  • url: https://sertit.no/certified-products/product-archive/ruckus-solution-1
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-1079-V2-2020
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-1079-V2-2020
heuristics/protection_profiles {} 27abdb9c6ab375a7
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf
pdf_data/cert_filename nscib-certificate-21-0189594.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-21-0189594: 1
pdf_data/cert_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0075-2012-MA-01: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL2: 1
    • EAL7: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 1
  • AVA:
    • AVA_VAN.5: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
pdf_data/cert_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408-1: 1
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 18045: 2
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20210715135138+01'00'
  • /Creator: C458-M
  • /ModDate: D:20210715135209+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S21071513510
  • pdf_file_size_bytes: 82710
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 20160627_SERTIT-071_Ruckus Solution_CR_v.1.0.pdf nscib-cc-0189594-crsscd-imp.pdf
pdf_data/report_frontpage
  • NL:
  • NL:
    • cert_id: NSCIB-CC-0189594-CR
    • cert_item: SECORA™ ID X Applet Collection with ePasslet Suite v3.5 by cryptovision GmbH, version 1.0 – Java Card applet configuration providing Secure Signature Creation Device with key import (SSCD
    • cert_lab: Brightsight B.V.
    • developer: cv cryptovision GmbH
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-071: 19
  • NL:
    • NSCIB-CC-0031318-CR2: 1
    • NSCIB-CC-0189594-CR: 12
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 21
    • EAL 2 augmented: 20
    • EAL1: 1
    • EAL2: 1
    • EAL7: 1
  • EAL:
    • EAL 5: 1
    • EAL 5 augmented: 1
    • EAL4: 1
    • EAL4+: 1
    • EAL5+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.1: 20
  • ADV:
    • ADV_IMP: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_DVS.2: 2
  • AVA:
    • AVA_VAN.5: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 1
  • FDP:
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_RIP.1: 1
  • FIA:
    • FIA_ATD.1: 2
    • FIA_UAU.1: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_ITT.1: 1
    • FPT_STM.1: 1
    • FPT_TST.1: 1
  • FTA:
    • FTA_SSL.3: 1
  • FTP:
    • FTP_TRP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.AUDIT_GENERATION: 1
    • O.CORRECT_TSF_OPERERATION: 1
    • O.CRYPTOGRAPHY: 1
    • O.INTEGRITY: 1
    • O.MANAGE: 1
    • O.MEDIATE: 1
    • O.RESIDUAL_INFORMATION: 1
    • O.SELF_PROTECTION: 1
    • O.TOE_ACCESS: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 2
pdf_data/report_keywords/eval_facility
  • ADS:
    • Advanced Data Security: 1
  • BrightSight:
    • Brightsight: 2
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA4096: 1
pdf_data/report_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
  • other:
    • JIL: 2
    • JIL-AAPS: 2
    • JIL-AM: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
pdf_data/report_metadata
  • /Author: Arne
  • /CreationDate: D:20160629100255+02'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160629100452+02'00'
  • /Producer: Acrobat Distiller 9.5.5 (Windows)
  • /Title: Microsoft Word - 20160627 SERTIT-071 Ruckus Solution CR v.1.0
  • pdf_file_size_bytes: 487135
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author:
  • /CreationDate: D:20210713160933+02'00'
  • /Creator:
  • /Keywords:
  • /ModDate: D:20210713160933+02'00'
  • /Producer: Foxit Reader PDF Printer Version 7.1.0.112
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 198822
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename ST Ruckus Wireless - Ruckus Solution final v1.8.pdf st-lite-sscd_impv1.6st_lite_eps3_pp0075_v16_infineon.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-1079-V2-2020: 2
  • NL:
    • NSCIB-CC-0031318-CR2: 1
    • NSCIB-CC-0189594: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0075-: 1
    • BSI-CC-PP-0075-2012-: 1
    • BSI-CC-PP-0075-2012-MA-01: 2
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0006-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL 5: 2
    • EAL 5 augmented: 1
    • EAL 5+: 3
    • EAL4: 1
    • EAL4 augmented: 1
    • EAL5: 4
    • EAL5 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.1: 6
  • ASE:
    • ASE_CCL: 2
    • ASE_CCL.1: 1
    • ASE_ECD: 2
    • ASE_ECD.1: 1
    • ASE_INT: 2
    • ASE_INT.1: 1
    • ASE_OBJ: 2
    • ASE_OBJ.2: 1
    • ASE_REQ: 2
    • ASE_REQ.2: 1
    • ASE_SPD: 2
    • ASE_SPD.1: 1
    • ASE_TSS: 2
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 3
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_IMP.1: 2
    • ADV_INT.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 2
    • AGD_PRE: 4
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 7
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_SEL: 1
    • FAU_SEL.1: 5
    • FAU_SEL.1.1: 1
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_IFC: 1
    • FDP_IFC.1: 13
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP: 1
    • FDP_RIP.1: 7
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 2
    • FIA_UAU: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 3
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 7
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 9
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_STM: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 7
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_TRP: 1
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_ARP.1: 1
    • FAU_GEN: 1
  • FCO:
    • FCO_NRO: 1
  • FCS:
    • FCS_CKM.1: 12
    • FCS_CKM.2: 1
    • FCS_CKM.3: 1
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 3
    • FCS_COP: 18
    • FCS_COP.1: 15
    • FCS_RND: 7
    • FCS_RND.1: 11
    • FCS_RND.1.1: 2
    • FCS_RNG.1: 2
  • FDP:
    • FDP_ACC: 25
    • FDP_ACC.1: 22
    • FDP_ACF: 14
    • FDP_ACF.1: 28
    • FDP_AFC: 1
    • FDP_IFC: 2
    • FDP_IFC.1: 12
    • FDP_IFF: 2
    • FDP_ITC: 9
    • FDP_ITC.1: 15
    • FDP_ITC.2: 6
    • FDP_RIP: 8
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 2
    • FDP_ROL: 2
    • FDP_SDI: 12
    • FDP_SDI.1: 2
    • FDP_SDI.2: 12
    • FDP_UCT: 10
    • FDP_UCT.1: 3
    • FDP_UIT: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 3
    • FIA_AFL.1.2: 3
    • FIA_ATD: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 3
    • FIA_UID: 2
    • FIA_UID.1: 13
    • FIA_UID.1.1: 3
    • FIA_UID.1.2: 3
    • FIA_USB: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 2
    • FMT_MSA: 23
    • FMT_MSA.1: 7
    • FMT_MSA.2: 5
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 5
    • FMT_MSA.4.1: 3
    • FMT_MTD: 15
    • FMT_MTD.1: 6
    • FMT_SMF: 3
    • FMT_SMF.1: 21
    • FMT_SMF.1.1: 2
    • FMT_SMR: 3
    • FMT_SMR.1: 24
    • FMT_SMR.1.1: 4
    • FMT_SMR.1.2: 3
  • FPR:
    • FPR_UNO.1: 1
  • FPT:
    • FPT_EMS: 7
    • FPT_EMS.1: 11
    • FPT_EMS.1.1: 5
    • FPT_EMS.1.2: 4
    • FPT_FLS: 4
    • FPT_FLS.1: 12
    • FPT_FLS.1.1: 2
    • FPT_ITC: 1
    • FPT_PHP.1: 6
    • FPT_PHP.1.1: 3
    • FPT_PHP.1.2: 3
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 3
    • FPT_RCV: 1
    • FPT_TDC.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 15
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ICT: 2
    • FTP_ITC: 6
    • FTP_ITC.1: 11
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.PHYSICAL: 3
    • A.TRUSTED_ADMIN: 2
  • O:
    • O.AUDIT_: 1
    • O.AUDIT_GENERATI: 1
    • O.AUDIT_GENERATION: 7
    • O.CORRECT_: 1
    • O.CORRECT_TSF_: 3
    • O.CORRECT_TSF_OPERERATION: 1
    • O.CRYPTO-: 1
    • O.CRYPTOGRAPHY: 9
    • O.INTEGRITY: 6
    • O.MANAGE: 13
    • O.MEDIATE: 8
    • O.RESIDUAL_: 4
    • O.RESIDUAL_INFORMATION: 3
    • O.SELF_: 1
    • O.SELF_PROTECTION: 9
    • O.TOE_: 1
    • O.TOE_ACCESS: 10
  • OE:
    • OE.NO_: 1
    • OE.NO_GENERAL_: 1
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.PHYSICAL: 4
    • OE.TRUSTED_: 1
    • OE.TRUSTED_ADMIN: 9
  • A:
    • A.APPLET: 1
    • A.CGA: 2
    • A.CSP: 2
    • A.SCA: 2
    • A.VERIFICATION: 1
  • O:
    • O.ALARM: 1
    • O.CARD-MANAGEMENT: 1
    • O.CIPHER: 1
    • O.COMMUNICATION: 1
    • O.DELETION: 1
    • O.FIREWALL: 1
    • O.GLOBAL_ARRAYS_CONFID: 1
    • O.GLOBAL_ARRAYS_INTEG: 1
    • O.INSTALL: 1
    • O.KEY-MNGT: 1
    • O.LOAD: 1
    • O.NATIVE: 1
    • O.OBJ-DELETION: 1
    • O.OPERATE: 1
    • O.PIN-MNGT: 1
    • O.REALLOCATION: 1
    • O.RESOURCES: 1
    • O.SCP: 4
    • O.SID: 1
    • O.TRANSACTION: 1
  • OE:
    • OE.APPLET: 1
    • OE.CODE-EVIDENCE: 1
    • OE.HID_VAD: 3
    • OE.VERIFICATION: 1
  • T:
    • T.COMMUNICATION: 1
    • T.CONFID-APPLI-DATA: 1
    • T.CONFID-JCS-CODE: 1
    • T.CONFID-JCS-DATA: 1
    • T.DELETION: 1
    • T.EXE-CODE: 2
    • T.INSTALL: 1
    • T.INTEG-APPLI-CODE: 2
    • T.INTEG-APPLI-DATA: 2
    • T.INTEG-JCS-CODE: 1
    • T.INTEG-JCS-DATA: 1
    • T.LIFE_CYCLE: 1
    • T.NATIVE: 1
    • T.OBJ-DELETION: 1
    • T.PHYSICAL: 1
    • T.RESOURCES: 1
    • T.RNG: 1
    • T.SID: 2
    • T.UNAUTHORIZED_CARD_MNGT: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Infineon:
    • Infineon: 7
    • Infineon Technologies AG: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 12
  • AES_competition:
    • AES:
      • AES: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDSA:
      • ECDSA: 4
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
  • MAC:
    • MAC: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 7
  • TLS:
    • TLS:
      • TLS: 4
  • PACE:
    • PACE: 21
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 10
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
  • FI:
    • DFA: 1
    • fault injection: 1
    • malfunction: 1
    • physical tampering: 13
  • SCA:
    • DPA: 2
    • SPA: 2
    • physical probing: 1
    • timing attacks: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 5
  • RFC:
    • RFC5216: 1
  • X509:
    • x.509: 1
  • BSI:
    • AIS 20: 1
    • AIS 31: 1
    • AIS20: 3
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 2
  • FIPS:
    • FIPS PUB 186-3: 1
    • FIPS180-4: 3
    • FIPS186-3: 2
    • FIPS197: 2
  • ICAO:
    • ICAO: 7
  • ISO:
    • ISO/IEC 7816-4: 1
  • PKCS:
    • PKCS#15: 4
    • PKCS1: 2
  • RFC:
    • RFC 5639: 1
    • RFC5639: 2
  • SCP:
    • SCP02: 1
    • SCP03: 1
  • X509:
    • X.509: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • No contradiction to this ST. FDP_ROL.1/FIREWALL No correspondence. Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No correspondence Out of scope (internal Java Card Fire- wall: 1
    • No contradiction to this ST. FMT_SMR.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
    • No contradiction to this ST. FPT_FLS.1/Installer No correspondence Out of scope (internal Java Card func- tionality: 1
    • While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification: 1
    • While D.Sig provides the TOE’s functionality claimed by this security target, the PKCS#15 part is out of scope of the certification. 1.4.3 TOE package types and forms of delivery The TOE can be delivered in the: 1
    • 20 of 74 Platform SFR Correspondence in this ST References/Remarks FPT_FLS.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. ODELG Security Functional: 1
    • 21 of 74 Platform SFR Correspondence in this ST References/Remarks FCO_NRO.2/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/SC No correspondence: 1
    • 74 Platform SFR Correspondence in this ST References/Remarks FDP_ACF.1/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • 74 Platform Threat Correspondence in this ST References/Remarks T.COMMUNICATION No correspondence Out of scope. No contradiction to this ST. T.UNAUTHORIZED_CARD_MNGT No correspondence Out of scope. No: 1
    • ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • Card OS). No contradiction to this ST. FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS). No contradiction to this ST. FCS_CKM.4 FCS_CKM.4 Tbd. (“clearKey: 1
    • DTBS_Forgery, T.Sig_Forgery No contradiction to this ST. T.INTEG-APPLI-DATA.LOAD No correspondence Out of scope. No contradiction to this ST. T.INTEG-JCS-CODE No correspondence Out of scope. No contradiction to: 1
    • FCS_CKM.1.1/AES, FCS_CKM.1.1/TDES) No correspondence Out of scope of the TOE. No contra- diction to this ST. FCS_CKM.2 No correspondence Out of scope (managed within: 1
    • FCS_CKM.1.1/RSA, FCS_CKM.1.1/EC, FCS_CKM.1.1/AES, FCS_CKM.1.1/TDES) No correspondence Out of scope of the TOE: 1
    • Functional Requirements (chapter 7.2.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • O.GLOBAL_ARRAYS_INTEG OT.DTBS_Integrity_TOE No contradiction to this ST. O.NATIVE No correspondence Out of scope. No contradiction to this ST. O.OPERATE No correspondence Out of scope. No contradiction to this ST: 1
    • O.LOAD No correspondence Out of scope. No contradiction to this ST. O.INSTALL No correspondence Out of scope. No contradiction to this ST. O.CARD-MANAGEMENT No correspondence Out of scope. No contradiction to: 1
    • O.REALLOCATION No correspondence Out of scope. No contradiction to this ST. O.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • Out of scope: 96
    • Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 2
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. ADELG Security Functional: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/TRANSIENT No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/bArray No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/FIREWALL No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/Installer No: 1
    • Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_RCV.3/Installer No: 1
    • SID.2 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.1 No correspondence Out of scope. No contradiction to this ST. T.EXE-CODE.2 No correspondence Out of scope. No contradiction to this: 1
    • ST. O.COMMUNICATION No correspondence Out of scope. No contradiction to this ST. O.SCP.IC OT.Tamper_ID, OT.Tamper_Resistance, OT.EMSEC_Design The: 1
    • ST. O.OBJ-DELETION No correspondence Out of scope. No contradiction to this ST. O.DELETION No correspondence Out of scope. No contradiction to this: 1
    • ST. T.INTEG-APPLI-CODE No correspondence Out of scope. No contradiction to this ST. T.INTEG-APPLI-CODE.LOAD No correspondence Out of scope. No: 1
    • ST. T.INTEG-JCS-DATA No correspondence Out of scope. No contradiction to this ST. T.SID.1 No correspondence Out of scope. No contradiction to this ST: 1
    • Security Functional Requirements (chapter 7.2.6 in platform ST) FDP_UIT.1/CCM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ROL.1/CCM No correspondence: 1
    • T.DELETION No correspondence Out of scope. No contradiction to this ST. T.INSTALL No correspondence Out of scope. No contradiction to this ST: 1
    • T.NATIVE No correspondence Out of scope. No contradiction to this ST. T.RESOURCES No correspondence Out of scope. No contradiction to this: 1
    • T.SCD_Divulg, T.SCD_Derive No contradiction to this ST. T.CONFID-JCS-CODE No correspondence Out of scope. No contradiction to this ST. T.CONFID-JCS-DATA No correspondence Out of scope. No contradiction to: 1
    • are related. No con- tradiction to this ST. O.SCP.RECOVERY No correspondence Out of scope. No contradiction to this ST. O.SCP.SUPPORT No correspondence Out of scope. No contradiction to: 1
    • chapter 7.2.1 in platform ST) FDP_ACC.2/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall: 1
    • chapter 7.2.6 in platform ST) FDP_UIT.1/CCM No correspondence Out of scope (internal Java Card func- tionality: 1
    • in this ST References/Remarks mechanisms. No contradiction to this ST. FPT_TDC.1 No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_ATD.1/AID No correspondence: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.2/FIREWALL-JCVM No: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of scope (internal Java Card Fire- wall: 1
    • internal Java Card Fire- wall). No contradiction to this ST. FMT_SMR.1 No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FCS_CKM.1 (FCS_CKM.1.1/RSA, FCS_CKM.1: 1
    • internal Java Card func- tionality). No contradiction to this ST. FCS_COP.1/DAP No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FCS_COP.1/DAP No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACC.1/SD No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/SD No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/SD No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/SD No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFC.2/SC No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_IFF.1/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/SC No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence. Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/KEYS No correspondence. Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_ATD.1/AID No correspondence. Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1/SC No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.4/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SCPG Security Functional: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UID.1/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_UAU.1/SC No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_UID.2/AID No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FIA_USB.1/AID No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.1/SC No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/ADEL No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/SC No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/SC No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/SD No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MSA.3/SD No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/SD No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.1/JCRE No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_MTD.3/JCRE No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMF.1/SC No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. SECORA™ ID X Applet Collection: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/SD No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/SD No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.1/SC No correspondence: 1
    • internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.2/CCM No correspondence Out of scope (internal Java Card func- tionality: 1
    • internal Java Card func- tionality). No contradiction to this ST. FTP_ITC.2/CCM No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/CCM No correspondence: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out of scope (internal Java Virtual Machine: 1
    • internal Java Virtual Machine). No contradiction to this ST. FDP_RIP.1/OBJECTS No correspondence. Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_MSA.1/JCRE No correspondence Out: 1
    • managed within Java Card OS). No contradiction to this ST. FCS_CKM.3 No correspondence Out of scope (managed within Java Card OS: 1
    • manager (ADEL) policy on security aspects outside the runtime. FDP_ACC.2/ADEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_ACF.1/ADEL No correspondence: 1
    • objectives. Platform Objective Correspondence in this ST References/Remarks O.SID No correspondence Out of scope. No contradiction to this ST. O.FIREWALL No correspondence Out of scope. No contradiction to this: 1
    • of the TOE. No contradic- tion to this ST. FDP_IFC.1/JCVM No correspondence Out of scope (internal Java Virtual Machine). No contradiction to this ST. FDP_IFF.1/JCVM No correspondence Out: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/FIREWALL No correspondence Out of scope (internal Java Card Fire- wall). The resulting requirements for applets are reflected in the User: 1
    • of the TOE. No contradic- tion to this ST. FMT_MSA.3/JCVM No correspondence Out of scope (internal Java Card Fire- wall). No contradiction to this ST. FMT_SMF.1 No correspondence Out of: 1
    • out of scope: 1
    • that owns the deleted objects by invoking a specific API method. FDP_RIP.1/ODEL No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FPT_FLS.1/ODEL FPT_FLS.1 The: 1
    • the plat- form leads to secrecy of SCD. No contradiction to this ST. O.PIN-MNGT No correspondence Out of scope. No contradiction to this ST. O.TRANSACTION No correspondence Out of scope. No contradiction to: 1
    • to this ST. T.LIFE_CYCLE No correspondence Out of scope. No contradiction to this ST. T.OBJ-DELETION No correspondence Out of scope. No contradiction to: 1
    • vided by FCS_COP.1.1/JCAPI/HASH. No contradictions to this ST. FDP_RIP.1/ABORT No correspondence. Out of scope (internal Java Card func- tionality). No contradiction to this ST. FDP_RIP.1/APDU No correspondence: 1
    • which addresses security aspects outside the runtime. FDP_ITC.2/Installer No correspondence Out of scope (internal Java Card func- tionality). No contradiction to this ST. FMT_SMR.1/Installer No: 1
pdf_data/st_metadata
  • /Author: Admin
  • /CreationDate: D:20160625221418-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20160625221418-07'00'
  • /Producer: GPL Ghostscript 8.64
  • /Title: Microsoft Word - ST Ruckus Wireless - Ruckus Solution final v1.8.docx
  • pdf_file_size_bytes: 1087249
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 51
  • /Author: bdrisch
  • /CreationDate: D:20210611135736+02'00'
  • /Creator: Microsoft® Word 2013
  • /Keywords: SSCD, ePasslet Suite, electronic Signature
  • /ModDate: D:20210611135736+02'00'
  • /Producer: Microsoft® Word 2013
  • /Title: Security Target ePasslet/ePKI-SSCD
  • pdf_file_size_bytes: 2431628
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 74
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different