name |
MMA10G-EXE |
NEC Groups Information Leakage Prevention System Version: 1.0 |
category |
Network and Network-Related Devices and Systems |
Other Devices and Systems |
scheme |
US |
JP |
status |
archived |
archived |
not_valid_after |
25.04.2020 |
07.10.2013 |
not_valid_before |
25.04.2018 |
26.12.2007 |
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10866-ci.pdf |
|
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10866-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_erpt.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10866-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20080306_c0134_st.pdf |
manufacturer |
Evertz Microsystems |
NEC Corporation |
manufacturer_web |
https://www.evertz.com/ |
https://www.nec.com/ |
security_level |
{} |
ASE_SPD.1, ASE_OBJ.2, ASE_REQ.2, EAL1+ |
dgst |
decbf8092972fe5f |
85e3322e0f4f0162 |
heuristics/cert_id |
CCEVS-VR-VID-10866-2018 |
JISEC-CC-CRP-C0134 |
heuristics/cert_lab |
US |
[] |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 |
ASE_OBJ.2, ASE_SPD.1, ASE_REQ.2 |
heuristics/extracted_versions |
- |
1.0 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- category: Network Device
- certification_date: 25.04.2018
- evaluation_facility: Acumen Security
- expiration_date: 25.04.2020
- id: CCEVS-VR-VID10866
- product: MMA10G-EXE
- scheme: US
- url: https://www.niap-ccevs.org/product/10866
- vendor: Evertz Microsystems
|
- cert_id: JISEC-CC-CRP-C0134
- certification_date: 01.12.2007
- claim: EAL1+ ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
- enhanced:
- assurance_level: EAL1 Augmented with ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1
- cc_version: 3.1
- description: PRODUCT DESCRIPTION This TOE is an information leakage prevention system that is deployed throughout the NEC group companies. The TOE is designed to restrict the user's PC operations relevant to taking the information out of a PC. This is implemented by defining the PC control policy in accordance with the privilege assigned to each user by the TOE Administrator and enforcing that policy to each user PC. The main security features of the TOE include identification and authentication, access control, cryptography and auditing. [Identification and Authentication] - A function to identify and authenticate a user [Access Control] - A function to control the input/output PC operations from or to its I/O port or a printer - A function to control the execution of a user program - A function to control the output of a file to the authorized external media - A function to control the output of a file to the authorized USB device - A function to control the creation and modification of the client control information [Cryptography] - A function to encrypt and decrypt a file - A function to create an encryption/decryption key - A function to encrypt/decrypt a file when inputting or outputting it from or to the authorized externa media or the authorized USB device [Auditing] - A function to create logs and transfer them to a log server - A function to view and search logs recorded in a log server
- evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.
- product: NEC Group Information Leakage Prevention System
- product_type: Information Leakage Prevention System
- report_link: https://www.ipa.go.jp/en/security/c0134_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0134_est.pdf
- toe_version: 1.0
- vendor: NEC Corporation
- expiration_date: 01.10.2013
- supplier: NEC Corporation
- toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0134_it7148.html
- toe_japan_name: NEC Group Information Leakage Prevention System 1.0
- toe_overseas_link: None
- toe_overseas_name: -----
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
c7cf611c6bb1e4b0 |
{} |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf |
{} |
pdf_data/cert_filename |
st_vid10866-ci.pdf |
|
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10866-2018: 1
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
- /CreationDate: D:20180426102145-04'00'
- /ModDate: D:20180426102145-04'00'
- /Producer: iText 2.1.0 (by lowagie.com)
- pdf_file_size_bytes: 177799
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 1
|
|
pdf_data/report_filename |
st_vid10866-vr.pdf |
20080306_c0134_erpt.pdf |
pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10866-2018
- cert_item: for the Evertz MMA10G-EXE V1.0
- cert_lab: US NIAP
|
|
pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10866-2018: 1
|
- JP:
- CRP-C0134-01: 1
- Certification No. C0134: 1
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL1: 4
- EAL1 augmented: 2
|
pdf_data/report_keywords/cc_sar |
|
- ASE:
- ASE_OBJ.2: 3
- ASE_REQ.2: 3
- ASE_SPD.1: 3
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
- A:
- A.FACILITIES_IN_SECURE_ROOM: 1
- A.LOG_BACKUP: 1
- A.MANAGE_SAFE_PLACE: 1
- A.NETWORK: 1
- A.OPERATOR_MANAGEMENT: 1
- A.PASSWORD_MANAGEMENT: 1
- A.PC_STARTUP_SET: 1
- A.UNJUST_SOFTWARE: 1
- T:
- T.INJUSTICE_CONNECT: 1
- T.INJUSTICE_LOGON: 1
- T.UNAUTHORIZED_ACCESS: 1
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2006-09-002: 2
- CCMB-2006-09-003: 2
- CCMB-2006-09-004: 2
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
- /Author: maorr
- /CreationDate: D:20180426103343-04'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20180426103343-04'00'
- /Producer: Acrobat Distiller 11.0 (Windows)
- /Title: Microsoft Word - VID10866_Validation_Report-final
- pdf_file_size_bytes: 189405
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /CreationDate: D:20080227110226+09'00'
- /ModDate: D:20080227110226+09'00'
- /Producer: Acrobat Distiller 6.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 156801
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 20
|
pdf_data/st_filename |
st_vid10866-st.pdf |
20080306_c0134_st.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
- ADV:
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.1: 1
- ALC_CMS.1: 1
- ASE:
- ATE:
- AVA:
|
- ADV:
- AGD:
- ALC:
- ASE:
- ASE_CCL: 1
- ASE_ECD: 1
- ASE_INT: 1
- ASE_OBJ: 1
- ASE_OBJ.2: 3
- ASE_REQ: 1
- ASE_REQ.2: 5
- ASE_SPD: 1
- ASE_SPD.1: 5
- ASE_TSS: 1
- ATE:
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 3
- FAU_GEN.1.2: 1
- FAU_GEN.2: 3
- FAU_GEN.2.1: 1
- FAU_STG_EXT.1: 4
- FAU_STG_EXT.1.1: 1
- FAU_STG_EXT.1.2: 1
- FAU_STG_EXT.1.3: 1
- FCS:
- FCS_CKM.1: 8
- FCS_CKM.1.1: 1
- FCS_CKM.2: 3
- FCS_CKM.2.1: 1
- FCS_CKM.4: 3
- FCS_CKM.4.1: 1
- FCS_COP.1: 22
- FCS_COP.1.1: 4
- FCS_RBG_EXT.1: 4
- FCS_RBG_EXT.1.1: 1
- FCS_RBG_EXT.1.2: 1
- FCS_RGB_EXT.1: 1
- FCS_TLSC: 1
- FCS_TLSC_EXT: 2
- FCS_TLSC_EXT.1: 7
- FCS_TLSC_EXT.1.1: 1
- FCS_TLSC_EXT.1.2: 1
- FCS_TLSC_EXT.1.3: 1
- FCS_TLSC_EXT.1.4: 1
- FCS_TLSS: 1
- FCS_TLSS_EXT: 1
- FCS_TLSS_EXT.2: 3
- FCS_TLSS_EXT.2.1: 1
- FCS_TLSS_EXT.2.2: 1
- FCS_TLSS_EXT.2.3: 1
- FCS_TLSS_EXT.2.4: 1
- FCS_TLSS_EXT.2.5: 1
- FCS_TLSS_EXT.2.6: 1
- FDP:
- FIA:
- FIA_PMG_EXT.1: 4
- FIA_PMG_EXT.1.1: 1
- FIA_UAU.7: 4
- FIA_UAU.7.1: 1
- FIA_UAU_EXT.2: 3
- FIA_UAU_EXT.2.1: 1
- FIA_UIA_EXT.1: 4
- FIA_UIA_EXT.1.1: 1
- FIA_UIA_EXT.1.2: 1
- FMT:
- FMT_MOF.1: 4
- FMT_MOF.1.1: 1
- FMT_MTD.1: 4
- FMT_MTD.1.1: 1
- FMT_SMF.1: 3
- FMT_SMF.1.1: 2
- FMT_SMR.2: 4
- FMT_SMR.2.1: 1
- FMT_SMR.2.2: 1
- FMT_SMR.2.3: 1
- FPT:
- FPT_APW_EXT.1: 3
- FPT_APW_EXT.1.1: 1
- FPT_APW_EXT.1.2: 1
- FPT_SKP_EXT.1: 4
- FPT_SKP_EXT.1.1: 1
- FPT_STM.1: 4
- FPT_STM.1.1: 1
- FPT_TST_EXT.1: 4
- FPT_TST_EXT.1.1: 1
- FPT_TUD_EXT.1: 5
- FPT_TUD_EXT.1.1: 1
- FPT_TUD_EXT.1.2: 1
- FPT_TUD_EXT.1.3: 1
- FTA:
- FTA_SSL.3: 4
- FTA_SSL.3.1: 1
- FTA_SSL.4: 4
- FTA_SSL.4.1: 1
- FTA_SSL_EXT.1: 4
- FTA_SSL_EXT.1.1: 1
- FTA_TAB.1: 4
- FTA_TAB.1.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP.1: 4
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
- FAU:
- FAU_GEN.1: 13
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 7
- FAU_GEN.2.1: 1
- FAU_SAR.1: 11
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 1
- FAU_SAR.2: 7
- FAU_SAR.2.1: 1
- FAU_SAR.3: 7
- FAU_SAR.3.1: 1
- FAU_STG: 1
- FAU_STG.1: 11
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 8
- FAU_STG.3.1: 1
- FAU_STG.4: 6
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM.1: 15
- FCS_CKM.1.1: 1
- FCS_CKM.2: 3
- FCS_CKM.4: 12
- FCS_CKM.4.1: 1
- FCS_COP.1: 14
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC: 32
- FDP_ACC.1: 19
- FDP_ACF: 25
- FDP_ACF.1: 18
- FDP_ETC.2: 7
- FDP_ETC.2.1: 1
- FDP_ETC.2.2: 1
- FDP_ETC.2.3: 1
- FDP_ETC.2.4: 1
- FDP_IFC.1: 10
- FDP_ITC.1: 3
- FDP_ITC.2: 12
- FDP_ITC.2.1: 1
- FDP_ITC.2.2: 1
- FDP_ITC.2.3: 1
- FDP_ITC.2.4: 1
- FDP_ITC.2.5: 1
- FIA:
- FIA_AFL: 1
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 13
- FIA_ATD.1.1: 1
- FIA_SOS.1: 7
- FIA_SOS.1.1: 1
- FIA_UAU: 1
- FIA_UAU.1: 5
- FIA_UAU.2: 9
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UAU.7: 9
- FIA_UID.1: 5
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_USB.1: 11
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MSA: 49
- FMT_MSA.1: 9
- FMT_MSA.2: 10
- FMT_MSA.3: 12
- FMT_MTD.1: 10
- FMT_MTD.1.1: 1
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 27
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_ITT.1: 7
- FPT_ITT.1.1: 1
- FPT_STM.1: 9
- FPT_STM.1.1: 1
- FPT_TDC.1: 4
- FTP:
- FTP_ITC.1: 3
- FTP_TRP: 1
- FTP_TRP.1: 3
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN_CREDENTIALS_SECURE: 1
- A.LIMITED_FUNCTIONALITY: 1
- A.NO_THRU_TRAFFIC_PROTECTION: 1
- A.PHYSICAL_PROTECTION: 1
- A.REGULAR_UPDATES: 1
- A.TRUSTED_ADMINISTRATOR: 1
- OE:
- OE.ADMIN_CREDENTIALS_SE: 1
- OE.NO_GENERAL_PURPOSE: 1
- OE.NO_THRU_TRAFFIC_PROT: 1
- OE.PHYSICAL: 1
- OE.TRUSTED_ADMIN: 1
- OE.UPDATES: 1
- T:
- T.PASSWORD_CRACKING: 1
- T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
- T.SECURITY_FUNCTIONALITY_FAILURE: 1
- T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
- T.UNDETECTED_ACTIVITY: 1
- T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
- T.UPDATE_COMPROMISE: 1
- T.WEAK_AUTHENTICATION_ENDPOINTS: 1
- T.WEAK_CRYPTOGRAPHY: 1
|
- A:
- A.FACILITIES_IN_SECURE_ROOM: 4
- A.LOG_BACKUP: 5
- A.MANAGE_SAFE_PLACE: 3
- A.NETWORK: 5
- A.OPERATOR_MANAGEMENT: 4
- A.PASSWORD_MANAGEMENT: 4
- A.PC_STARTUP_SET: 4
- A.UNJUST_SOFTWARE: 5
- O:
- O.ACCESS: 1
- O.ACCESS_CONTROL: 8
- O.ACCESS_CONTROL_: 1
- O.ACCESS_CONTROL_MEDIA: 5
- O.AUDIT: 6
- O.CRYPTO: 1
- O.CRYPTOGRAPHY: 9
- O.LOG_COLLECT: 7
- O.RE_AUTH: 8
- OE:
- OE.FACILITIES_IN_SECURE_ROOM: 4
- OE.LOG_: 1
- OE.LOG_BACKUP: 4
- OE.LOG_COLLECT: 4
- OE.MANAGE_PC_PLACE: 5
- OE.NETWORK: 5
- OE.OPERATOR_MANAGEMENT: 5
- OE.PASSWORD_MANAGEMENT: 5
- OE.PC_STARTUP: 1
- OE.PC_STARTUP_SET: 3
- OE.SECURITY_: 1
- OE.SECURITY_PARAMETER: 4
- OE.UNJUST_SOFTWARE: 5
- OE.USERDATA_CRYPTOGRAPHY: 4
- T:
- T.INJUSTICE_CONNECT: 5
- T.INJUSTICE_LOGON: 5
- T.UNAUTHORISED_ACCESS: 4
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
|
pdf_data/st_keywords/asymmetric_crypto |
- ECC:
- FF:
- DH:
- DH: 4
- DHE: 1
- Diffie-Hellman: 2
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
- SHA:
- SHA1:
- SHA2:
- SHA-256: 5
- SHA-384: 2
- SHA256: 2
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
- IPsec:
- SSH:
- TLS:
- SSL:
- TLS:
- TLS: 52
- TLS 1.0: 1
- TLS 1.1: 1
- TLS 1.2: 1
- TLS1.2: 3
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
- NIST:
- P-256: 8
- P-384: 10
- P-521: 6
- secp256r1: 3
- secp384r1: 3
- secp521r1: 4
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
- TLS:
- TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
- TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
- TLS_RSA_WITH_AES_128_CBC_SHA: 3
- TLS_RSA_WITH_AES_128_CBC_SHA256: 3
- TLS_RSA_WITH_AES_256_CBC_SHA: 3
- TLS_RSA_WITH_AES_256_CBC_SHA256: 3
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- ISO:
- ISO/IEC 14888-3: 1
- ISO/IEC 18031:2011: 3
- ISO/IEC 9796-2: 1
- PKCS:
- RFC:
- RFC 2818: 1
- RFC 2986: 1
- RFC 5246: 2
- RFC 5280: 4
- RFC 5289: 4
- RFC 6125: 1
- RFC3268: 8
- RFC5280: 1
- RFC5759: 1
- X509:
|
- CC:
- CCMB-2006-09-001: 2
- CCMB-2006-09-002: 2
- CCMB-2006-09-003: 2
- CCMB-2006-09-004: 2
- FIPS:
- FIPS PUB 197: 8
- FIPS PUB 46-3: 4
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: Evertz Microsystems Ltd
- /CreationDate: D:20180426055608-04'00'
- /Creator: Microsoft® Word 2013
- /ModDate: D:20180426055608-04'00'
- /Producer: Microsoft® Word 2013
- /Subject: 25 April, 2018
- /Title: Evertz MMA10G-EXE Network Device Collaborative Protection Profile Security Target v1.0a
- pdf_file_size_bytes: 1366896
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 42
|
- /CreationDate: D:20080226213013+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20080226213216+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title:
- pdf_file_size_bytes: 618504
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 87
|
state/cert/convert_garbage |
True |
False |
state/cert/convert_ok |
True |
False |
state/cert/download_ok |
True |
False |
state/cert/extract_ok |
True |
False |
state/cert/pdf_hash |
Different |
Different |
state/cert/txt_hash |
Different |
Different |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |