| name |
CA Siteminder Web Access Manager r12 SP1-CR3 |
Fuji Xerox DocuCentre-IV C2265/C2263 (SSD Model) Series Controller Software for Asia Pacific Version: Controller ROM Ver. 1.111.4 |
| category |
Access Control Devices and Systems |
Other Devices and Systems |
| scheme |
US |
JP |
| status |
archived |
archived |
| not_valid_after |
20.07.2012 |
03.08.2017 |
| not_valid_before |
12.06.2009 |
30.07.2012 |
| cert_link |
None |
None |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10317-vr.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0365_erpt.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10317-st.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0365_est.pdf |
| manufacturer |
CA Technologies |
Fuji Xerox Co., Ltd. |
| manufacturer_web |
https://www.ca.com |
https://www.fujixerox.co.jp/eng/ |
| security_level |
ASE_TSS.2, EAL3+, ALC_FLR.1 |
EAL3 |
| dgst |
e55d05a9ca8efdf1 |
bdb949e2ccf1e288 |
| heuristics/cert_id |
CCEVS-VR-VID-10317-2009 |
JISEC-CC-CRP-C0365 |
| heuristics/cert_lab |
US |
[] |
| heuristics/cpe_matches |
{} |
cpe:2.3:h:fujixerox:docucentre-iv_c2263:-:*:*:*:*:*:*:* |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ALC_FLR.1, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ASE_TSS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ADV_ARC.1 |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions |
- |
1.111.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
{} |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
{} |
| heuristics/scheme_data |
- api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10317/
- categories: ['Network Access Control', ' System Access Control']
- category: Network Access Control
- certification_date: 12.06.2009
- evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
- expiration_date:
- id: CCEVS-VR-VID10317
- product: CA Siteminder Web Access Manager r12 SP1-CR3
- scheme: US
- url: https://www.niap-ccevs.org/products/10317
- vendor: CA Technologies
|
- cert_id: JISEC-CC-CRP-C0365
- certification_date: 01.07.2012
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cert_link: https://www.ipa.go.jp/en/security/c0365_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is the software to control Multi Function Device (MFD) that provides such basic functions as copy, print, scan, and fax. The MFD is assumed to be used, at general office, from the control panel, public telephone line, clients (for general user and system administrator) and servers which are connected to the MFD via internal network, and general user client which is directly connected to the MFD. TOE security functions To ensure the security of assets to be protected, the TOE provides the following security functions regarding the above basic functions: - SSD Data Encryption - User Authentication - System Administrator's Security Management - Customer Engineer Operation Restriction - Security Audit Log - Internal Network Data Protection - Fax Flow Security Note that the TOE does not provide the data overwrite function for SSD.
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Fuji Xerox DocuCentre-IV C2265/C2263(SSD Model) Series Controller Software for Asia Pacific
- product_type: Control Software for Multi Function Device
- report_link: https://www.ipa.go.jp/en/security/c0365_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0365_est.pdf
- toe_version: Controller ROM Ver. 1.111.4
- vendor: Fuji Xerox Co., Ltd.
- expiration_date: 01.08.2017
- supplier: Fuji Xerox Co., Ltd.
- toe_japan_name: -----
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0365_it2405.html
- toe_overseas_name: Fuji Xerox DocuCentre-IV C2265/C2263(SSD Model)Series Controller Software for Asia Pacific Controller ROM Ver. 1.111.4
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
{} |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
{} |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
None |
None |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename |
st_vid10317-vr.pdf |
c0365_erpt.pdf |
| pdf_data/report_frontpage |
- US:
- cert_id: CCEVS-VR-VID10317-2009
- cert_item: CA SiteMinder Web Access Manager r12 SP1-CR3
- cert_lab: US NIAP
|
|
| pdf_data/report_keywords/cc_cert_id |
- US:
- CCEVS-VR-VID10317-2009: 1
|
- JP:
- CRP-C0365-01: 1
- Certification No. C0365: 1
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_DEL.1: 1
- ALC_FLR.1: 2
- ASE:
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
- A:
- T:
- T.COMM_TAP: 2
- T.CONFDATA: 2
- T.CONSUME: 2
- T.DATA_SEC: 2
- T.RECOVER: 2
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
- ITSC:
- Information Technology Security Center: 3
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
- TLS:
- SSL:
- SSL: 3
- SSL 3.0: 1
- SSL v3.0: 2
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
- CVE:
- CVE-2003-0718: 1
- CVE-2003-1312: 1
- CVE-2005-2089: 1
- CVE-2005-2204: 1
- CVE-2006-2501: 1
- CVE-2006-3733: 1
- CVE-2006-3918: 1
- CVE-2007-1157: 1
- CVE-2007-1354: 1
- CVE-2007-1526: 1
- CVE-2007-4465: 1
- CVE-2007-5923: 1
- CVE-2007-6203: 1
- CVE-2007-6572: 1
- CVE-2008-0075: 1
- CVE-2008-0455: 1
- CVE-2008-0456: 1
- CVE-2008-1446: 1
- CVE-2008-2166: 1
- CVE-2008-2168: 1
- CVE-2008-2518: 1
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
|
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- CCMB-2009-07-004: 2
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
- /Author: CCEVS NIAP
- /CreationDate: D:20090709152611
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090709152611
- /Producer: Microsoft® Office Word 2007
- /Title: National Information Assurance Partnership
- pdf_file_size_bytes: 375891
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 25
|
- /CreationDate: D:20120920154423+09'00'
- /Creator: Microsoft® Word 2010
- /ModDate: D:20120920154513+09'00'
- /Producer: Microsoft® Word 2010
- pdf_file_size_bytes: 375406
- pdf_hyperlinks: {}
- pdf_is_encrypted: True
- pdf_number_of_pages: 36
|
| pdf_data/st_filename |
st_vid10317-st.pdf |
c0365_est.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
- EAL:
- EAL 3: 2
- EAL3: 7
- EAL3 augmented: 2
|
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 12
- ADV_FSP.3: 14
- ADV_TDS.2: 15
- AGD:
- AGD_OPE.1: 15
- AGD_PRE.1: 11
- ALC:
- ALC_CMC.3: 15
- ALC_CMS.3: 8
- ALC_DEL.1: 10
- ALC_DVS.1: 7
- ALC_FLR.1: 11
- ALC_LCD.1: 8
- ASE:
- ASE_CCL.1: 13
- ASE_ECD.1: 12
- ASE_INT.1: 14
- ASE_OBJ.2: 12
- ASE_REQ.1: 9
- ASE_REQ.2: 3
- ASE_SPD.1: 9
- ASE_TSS.1: 1
- ASE_TSS.2: 10
- ATE:
- ATE_COV.2: 7
- ATE_DPT.1: 7
- ATE_FUN.1: 10
- ATE_IND.2: 9
- AVA:
|
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_GEN.2: 8
- FAU_GEN.2.1: 1
- FAU_SAR.1: 1
- FAU_SAR_EXP.1: 1
- FAU_SAR_EXT.1: 7
- FAU_SAR_EXT.1.1: 2
- FAU_SAR_EXT.1.2: 2
- FAU_STG: 2
- FAU_STG.1: 1
- FAU_STG_EXT.1: 8
- FAU_STG_EXT.1.1: 2
- FAU_STG_EXT.1.2: 2
- FCS:
- FCS_CKM: 3
- FCS_CKM.1: 35
- FCS_CKM.1.1: 3
- FCS_CKM.2: 3
- FCS_CKM.4: 20
- FCS_CKM.4.1: 1
- FCS_CKM_EXT: 1
- FCS_CKM_EXT.1: 9
- FCS_CKM_EXT.1.1: 1
- FCS_CKM_EXT.4: 10
- FCS_CKM_EXT.4.1: 1
- FCS_COP: 3
- FCS_COP.1: 42
- FCS_COP.1.1: 4
- FCS_COP_EXT.1: 9
- FCS_COP_EXT.1.1: 1
- FDP:
- FDP_ACC.1: 22
- FDP_ACC.1.1: 2
- FDP_ACF.1: 20
- FDP_ACF.1.1: 2
- FDP_ACF.1.2: 2
- FDP_ACF.1.3: 2
- FDP_ACF.1.4: 2
- FDP_IFC.1: 4
- FDP_ITC.1: 5
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 7
- FIA_AFL.1.1: 1
- FIA_AFL.1.2: 1
- FIA_ATD.1: 8
- FIA_ATD.1.1: 1
- FIA_SOS.1: 8
- FIA_SOS.1.1: 1
- FIA_UAU: 2
- FIA_UAU.1: 9
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.5: 1
- FIA_UAU.6: 8
- FIA_UAU.6.1: 1
- FIA_UAU_EXP.5: 2
- FIA_UAU_EXT.5: 18
- FIA_UAU_EXT.5.1: 3
- FIA_UAU_EXT.5.2: 2
- FIA_UID: 2
- FIA_UID.1: 4
- FIA_UID.2: 9
- FIA_UID.2.1: 1
- FIA_UID_EXP.2: 1
- FIA_UID_EXT.2: 7
- FIA_UID_EXT.2.1: 1
- FMT:
- FMT_MSA.1: 26
- FMT_MSA.1.1: 3
- FMT_MSA.2: 13
- FMT_MSA.3: 10
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 11
- FMT_SMF.1.1: 1
- FMT_SMR.1: 13
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_CKM_EXT.1.1: 1
- FPT_CKM_EXT.4.1: 1
- FPT_COP_EXT.1.1: 1
- FPT_FLS.1: 8
- FPT_FLS.1.1: 1
- FPT_STM: 3
- FPT_STM.1: 3
- FPT_STM_EXT.1: 8
- FPT_STM_EXT.1.1: 3
- FRU:
- FRU_FLT.1: 8
- FRU_FLT.1.1: 1
- FTP:
- FTP_ITC.1: 8
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
- FTP_TRP: 3
- FTP_TRP.1: 1
- FTP_TRP_EXP.1: 1
- FTP_TRP_EXT.1: 7
- FTP_TRP_EXT.1.1: 1
- FTP_TRP_EXT.1.2: 1
- FTP_TRP_EXT.1.3: 1
|
- FAU:
- FAU_GEN.1: 12
- FAU_GEN.1.1: 1
- FAU_GEN.1.2: 1
- FAU_SAR: 1
- FAU_SAR.1: 9
- FAU_SAR.1.1: 1
- FAU_SAR.1.2: 2
- FAU_SAR.2: 8
- FAU_SAR.2.1: 1
- FAU_STG: 1
- FAU_STG.1: 10
- FAU_STG.1.1: 1
- FAU_STG.1.2: 1
- FAU_STG.3: 1
- FAU_STG.4: 8
- FAU_STG.4.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 11
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 3
- FCS_COP.1: 10
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 12
- FDP_ACC.1.1: 1
- FDP_ACF.1: 10
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 11
- FDP_IFC.1.1: 1
- FDP_IFF: 1
- FDP_IFF.1: 10
- FDP_IFF.1.1: 1
- FDP_IFF.1.2: 1
- FDP_IFF.1.3: 1
- FDP_IFF.1.4: 1
- FDP_IFF.1.5: 1
- FDP_ITC.1: 1
- FDP_ITC.2: 1
- FIA:
- FIA_AFL.1: 29
- FIA_AFL.1.1: 4
- FIA_AFL.1.2: 4
- FIA_ATD.1: 9
- FIA_ATD.1.1: 1
- FIA_SOS.1: 6
- FIA_SOS.1.1: 1
- FIA_UAU.1: 19
- FIA_UAU.1.1: 1
- FIA_UAU.1.2: 1
- FIA_UAU.7: 9
- FIA_UAU.7.1: 1
- FIA_UIA.1: 1
- FIA_UID.1: 15
- FIA_UID.1.1: 1
- FIA_UID.1.2: 1
- FIA_USB.1: 8
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MOF.1: 9
- FMT_MOF.1.1: 1
- FMT_MSA: 2
- FMT_MSA.1: 11
- FMT_MSA.1.1: 1
- FMT_MSA.3: 11
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_MTD.1: 11
- FMT_MTD.1.1: 1
- FMT_SMF.1: 17
- FMT_SMF.1.1: 1
- FMT_SMR.1: 15
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_STM.1: 10
- FPT_STM.1.1: 1
- FTP:
- FTP_TRP.1: 8
- FTP_TRP.1.1: 1
- FTP_TRP.1.2: 1
- FTP_TRP.1.3: 1
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.LOCATE: 3
- A.NOEVIL: 3
- A.PATCHES: 1
- O:
- O.ACCESS: 4
- O.AUDIT: 4
- O.AUTH: 4
- O.EAVESDROPPING: 4
- O.MANAGE: 4
- O.ROBUST_ADMIN_G: 1
- O.ROBUST_ADMIN_GUI: 1
- O.ROBUST_ADMIN_GUID: 1
- O.ROBUST_ADMIN_GUIDANCE: 1
- O.ROBUST_TOE_ACCE: 1
- O.ROBUST_TOE_ACCESS: 3
- O.SELF_PROTECTION: 4
- OE:
- OE.EAVESDROPPING: 4
- OE.FILESYS: 4
- OE.LOCATE: 3
- OE.NOEVIL: 3
- OE.ROBUST_ACCESS: 4
- T:
- T.ACCESS: 4
- T.ADMIN_ERROR: 4
- T.AUDIT_COMPROMIS: 2
- T.AUDIT_COMPROMISE: 2
- T.EAVESDROPPING: 4
- T.MASK: 3
- T.MASQUERADE: 4
- T.UNAUTH: 3
|
- A:
- O:
- O.AUDITS: 8
- O.CIPHER: 6
- O.COMM_SEC: 7
- O.FAX_SEC: 5
- O.MANAGE: 9
- O.RESTRICT: 5
- O.USER: 9
- OE:
- T:
- T.COMM_TAP: 5
- T.CONFDATA: 3
- T.CONSUME: 5
- T.DATA_SEC: 3
- T.RECOVER: 5
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
- AES_competition:
- constructions:
|
- AES_competition:
- DES:
- constructions:
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
- TLS:
- SSL:
- SSL: 24
- SSL 3.0: 2
- SSL v3.0: 7
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_RSA_WITH_AES_128_CBC_SHA: 1
- TLS_RSA_WITH_AES_128_CBC_SHA256: 1
- TLS_RSA_WITH_AES_256_CBC_SHA: 1
- TLS_RSA_WITH_AES_256_CBC_SHA256: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- FIPS:
- FIPS 140: 1
- FIPS 140-2: 1
- FIPS 197: 1
- RFC:
- X509:
|
- CC:
- CCMB-2009-07-001: 1
- CCMB-2009-07-002: 1
- CCMB-2009-07-003: 1
- CCMB-2009-07-004: 1
- FIPS:
- RFC:
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
- /CreationDate: D:20090709152747
- /Creator: Microsoft® Office Word 2007
- /ModDate: D:20090709152747
- /Producer: Microsoft® Office Word 2007
- pdf_file_size_bytes: 1353090
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 133
|
- /Author:
- /CreationDate: D:20120830102655+09'00'
- /Creator: PScript5.dll Version 5.2.2
- /ModDate: D:20120830102655+09'00'
- /Producer: Acrobat Distiller 10.1.3 (Windows)
- /Title:
- pdf_file_size_bytes: 425623
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 89
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
False |
| state/cert/download_ok |
False |
False |
| state/cert/extract_ok |
False |
False |
| state/cert/pdf_hash |
Equal |
Equal |
| state/cert/txt_hash |
Equal |
Equal |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |