name |
Data Security Kit DA-SC04 V1.00 |
Infineon Technologies AG Smartcard ICs SLE88CNFX6600PM/P, SLE88CNFX6602PM/P, SLE88CNFX5400PM/P, SLE88CNF6600PM/P, SLE88CNF6602PM/P, SLE88CNF5400PM/P, SLE88CFX6600P, SLE88CFX6602P, SLE88CFX5400P, SLE88CF6600P, SLE88CF6602P, SLE88CF5400P all with PSL 3.22.11 |
category |
Multi-Function Devices |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme |
JP |
DE |
status |
archived |
archived |
not_valid_after |
13.12.2010 |
01.09.2019 |
not_valid_before |
30.05.2008 |
29.06.2011 |
cert_link |
None |
None |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0168_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0706a_pdf.pdf |
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0168_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0706b_pdf.pdf |
manufacturer |
Panasonic Communications Co., Ltd. |
Infineon Technologies AG |
manufacturer_web |
https://www.panasonic.com/ |
https://www.infineon.com/ |
security_level |
EAL2 |
AVA_VAN.5, ALC_DVS.2, EAL5+ |
dgst |
e6375121b8384ab3 |
c379736b67eb7df8 |
heuristics/cert_id |
JISEC-CC-CRP-C0168 |
BSI-DSZ-CC-0706-2011 |
heuristics/cert_lab |
[] |
BSI |
heuristics/cpe_matches |
{} |
{} |
heuristics/verified_cpe_matches |
{} |
{} |
heuristics/related_cves |
{} |
{} |
heuristics/direct_transitive_cves |
{} |
{} |
heuristics/indirect_transitive_cves |
{} |
{} |
heuristics/extracted_sars |
AGD_ADM.1, ATE_FUN.1, AVA_VLA.1, ADV_FSP.1, ATE_COV.1, AVA_SOF.1, ADV_RCR.1, ADV_HLD.1, AGD_USR.1, ATE_IND.2 |
ASE_INT.1, APE_SPD.1, ASE_SPD.1, APE_REQ.2, ASE_CCL.1, ALC_CMC.4, ALC_LCD.1, ATE_COV.2, ADV_FSP.5, ASE_REQ.2, APE_INT.1, APE_OBJ.2, ASE_OBJ.2, ASE_TSS.1, AVA_VAN.5, AGD_PRE.1, ALC_CMS.5, ATE_FUN.1, ADV_IMP.1, ATE_DPT.3, AGD_OPE.1, ADV_TDS.4, ASE_ECD.1, ALC_DEL.1, ADV_SPM.1, APE_ECD.1, ALC_FLR.3, ALC_DVS.2, ALC_TAT.2, ADV_ARC.1, ADV_INT.2, APE_CCL.1, ATE_IND.2 |
heuristics/extracted_versions |
1.00 |
3.22.11 |
heuristics/prev_certificates |
{} |
{} |
heuristics/next_certificates |
{} |
{} |
heuristics/report_references/directly_referenced_by |
{} |
{} |
heuristics/report_references/directly_referencing |
{} |
{} |
heuristics/report_references/indirectly_referenced_by |
{} |
{} |
heuristics/report_references/indirectly_referencing |
{} |
{} |
heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0168
- certification_date: 01.05.2008
- claim: EAL2
- enhanced:
- assurance_level: EAL2
- cc_version: 2.3
- cert_link: https://www.ipa.go.jp/en/security/c0168_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE The TOE is a software product to protect the used document data which had been already stored on the HDD (Hard Disk Drive) after being processed by the digital imaging system from being disclosed illicitly. The TOE is offered as an optional product of Panasonic Communications Co., Ltd. Digital Color Imaging System DP-C3040VFS / C3030VFS / C2626VFS / DP-C3040V(*)/ C3030V(*) / C2626VF(*) for Japan (DP-C405 / C305 / C265 for Overseas), and provides the security functions by replacing the standard bundled software of the digital imaging system. (*) Requires installation of optional Hard Disk Unit. TOE security functions - Hard Disk Drive Overwriting Function for Residual Data - Key Operator Authentication Function - Hard Disk Drive Lock Management Function - Security Mode Operating Management Function - Service Technician Authentication Function - Security Mode Maintenance Management Function
- evaluation_facility: Information Technology Security Center Evaluation Department
- product: Japanese Name: Data Security Kit DA-SC04 English Name: Data Security Kit DA-SC04
- product_type: IT Product (data protection function in digital imaging system)
- report_link: https://www.ipa.go.jp/en/security/c0168_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0168_est.pdf
- toe_version: V1.00
- vendor: Panasonic System Networks Co., Ltd.
- expiration_date: 01.01.2011
- supplier: Panasonic System Networks Co., Ltd.
- toe_japan_name: Data Security Kit DA-SC04 V1.00
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0168_it7188.html
- toe_overseas_name: Data Security Kit DA-SC04 V1.00
|
|
heuristics/st_references/directly_referenced_by |
{} |
{} |
heuristics/st_references/directly_referencing |
{} |
{} |
heuristics/st_references/indirectly_referenced_by |
{} |
{} |
heuristics/st_references/indirectly_referencing |
{} |
{} |
heuristics/protection_profiles |
{} |
f6d23054061d72ba |
maintenance_updates |
|
|
protection_profiles |
|
|
protection_profile_links |
{} |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename |
None |
None |
pdf_data/cert_frontpage |
|
|
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename |
c0168_erpt.pdf |
0706a_pdf.pdf |
pdf_data/report_frontpage |
|
- DE:
- cert_id: BSI-DSZ-CC-0706-2011
- cert_item: Infineon Technologies AG Smartcard ICs SLE88CNFX6600PM/P, SLE88CNFX6602PM/P, SLE88CNFX5400PM/P, SLE88CNF6600PM/P, SLE88CNF6602PM/P, SLE88CNF5400PM/P, SLE88CFX6600P, SLE88CFX6602P, SLE88CFX5400P, SLE88CF6600P, SLE88CF6602P, SLE88CF5400P all with PSL 3.22.11
- cert_lab: BSI
- developer: Infineon Technologies AG
- match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
|
pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0168-01: 1
- Certification No. C0168: 1
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP- 0035-2007: 1
- BSI-CC-PP-0035-2007: 2
|
pdf_data/report_keywords/cc_security_level |
|
- EAL:
- EAL 4: 2
- EAL 5: 7
- EAL 5 augmented: 3
- EAL1: 7
- EAL2: 3
- EAL3: 4
- EAL4: 7
- EAL5: 7
- EAL5+: 1
- EAL6: 4
- EAL7: 4
- ITSEC:
|
pdf_data/report_keywords/cc_sar |
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 1
- ADV_FSP: 1
- ADV_FSP.1: 1
- ADV_FSP.2: 1
- ADV_FSP.3: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 2
- ADV_FSP.6: 1
- ADV_IMP: 1
- ADV_IMP.1: 1
- ADV_IMP.2: 1
- ADV_INT: 1
- ADV_INT.1: 1
- ADV_INT.2: 2
- ADV_INT.3: 1
- ADV_SPM: 1
- ADV_SPM.1: 1
- ADV_TDS: 1
- ADV_TDS.1: 1
- ADV_TDS.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 2
- ADV_TDS.5: 1
- ADV_TDS.6: 1
- AGD:
- AGD_OPE: 1
- AGD_OPE.1: 1
- AGD_PRE: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC: 1
- ALC_CMC.1: 1
- ALC_CMC.2: 1
- ALC_CMC.3: 1
- ALC_CMC.4: 2
- ALC_CMC.5: 1
- ALC_CMS: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_CMS.3: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL: 1
- ALC_DEL.1: 2
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 7
- ALC_FLR: 1
- ALC_FLR.1: 1
- ALC_FLR.2: 1
- ALC_FLR.3: 1
- ALC_LCD.1: 2
- ALC_LCD.2: 1
- ALC_TAT: 1
- ALC_TAT.1: 1
- ALC_TAT.2: 3
- ALC_TAT.3: 1
- APE:
- APE_CCL.1: 1
- APE_ECD.1: 1
- APE_INT.1: 1
- APE_OBJ.1: 1
- APE_OBJ.2: 1
- APE_REQ.1: 1
- APE_REQ.2: 1
- APE_SPD.1: 1
- ASE:
- ASE_CCL: 1
- ASE_CCL.1: 1
- ASE_ECD: 1
- ASE_ECD.1: 1
- ASE_INT: 1
- ASE_INT.1: 1
- ASE_OBJ: 1
- ASE_OBJ.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.1: 1
- ASE_REQ.2: 1
- ASE_SPD: 1
- ASE_SPD.1: 1
- ASE_TSS: 1
- ASE_TSS.1: 1
- ASE_TSS.2: 1
- ATE:
- ATE_COV: 1
- ATE_COV.1: 1
- ATE_COV.2: 1
- ATE_COV.3: 1
- ATE_DPT: 1
- ATE_DPT.1: 1
- ATE_DPT.2: 1
- ATE_DPT.3: 2
- ATE_DPT.4: 1
- ATE_FUN: 1
- ATE_FUN.1: 1
- ATE_FUN.2: 1
- ATE_IND: 1
- ATE_IND.1: 1
- ATE_IND.2: 1
- ATE_IND.3: 1
- AVA:
- AVA_VAN: 2
- AVA_VAN.1: 1
- AVA_VAN.2: 1
- AVA_VAN.3: 1
- AVA_VAN.4: 1
- AVA_VAN.5: 6
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.SE: 1
- A.SETSEC: 1
- T:
|
|
pdf_data/report_keywords/vendor |
|
- Infineon:
- Infineon: 4
- Infineon Technologies: 6
- Infineon Technologies AG: 26
|
pdf_data/report_keywords/eval_facility |
- ITSC:
- Information Technology Security Center: 3
|
|
pdf_data/report_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
- BSI:
- BSI 7125: 2
- BSI 7148: 1
- BSI TR-02102: 1
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 2
- CCMB-2005-08-002: 2
- CCMB-2005-08-003: 2
- CCMB-2005-08-004: 2
- ISO:
- ISO/IEC 15408:2005: 1
- ISO/IEC 18045:2005: 2
|
- BSI:
- AIS 25: 2
- AIS 26: 2
- AIS 31: 2
- AIS 32: 1
- AIS 34: 2
- AIS 36: 3
- AIS 37: 2
- AIS 38: 1
- FIPS:
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/certification_process |
|
- ConfidentialDocument:
- 0035-2007 [8] Evaluation Technical Report, Version 1.02, 09.06.2011, T-Systems GEI GmbH, (confidential document) [9] ETR for composite evaluation according to AIS 36 for the Product Infineon Smart Card IC: 1
- Version 1.02, 09.06.2011, T-Systems GEI GmbH (confidential document) [10] SLE88CNFX Family Hardware Reference User’s Manual, Edition 19-12-2009, Infineon Technologies: 1
|
pdf_data/report_metadata |
- /Author: s-shiro
- /CreationDate: D:20080711162024+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20080711162024+09'00'
- /Producer: Acrobat Distiller 8.0.0 (Windows)
- /Title: Microsoft Word - C0168_Certification Report_en.doc
- pdf_file_size_bytes: 188639
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 21
|
- /Author: Bundesamt für Sicherheit in der Informationstechnik
- /CreationDate: D:20110712132349+02'00'
- /Creator: Writer
- /Keywords: "Common Criteria, Certification, Zertifizierung, SLE88, Infineon"
- /ModDate: D:20110712133038+02'00'
- /Producer: OpenOffice.org 3.2
- /Subject: Common Criteria Certification
- /Title: Certification Report BSI-DSZ-CC-0706-2011
- pdf_file_size_bytes: 932246
- pdf_hyperlinks: http://www.commoncriteriaportal.org/, https://www.bsi.bund.de/
- pdf_is_encrypted: False
- pdf_number_of_pages: 38
|
pdf_data/st_filename |
c0168_est.pdf |
0706b_pdf.pdf |
pdf_data/st_frontpage |
|
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL 5: 3
- EAL 5 augmented: 3
- EAL5: 5
- EAL5 augmented: 1
|
pdf_data/st_keywords/cc_sar |
- ACM:
- ADO:
- ADO_DEL.1: 4
- ADO_IGS.1: 3
- ADV:
- ADV_FSP.1: 11
- ADV_HLD.1: 2
- ADV_RCR.1: 5
- AGD:
- AGD_ADM.1: 7
- AGD_USR.1: 3
- ATE:
- ATE_COV: 1
- ATE_COV.1: 3
- ATE_FUN.1: 4
- ATE_IND.2: 4
- AVA:
- AVA_SOF.1: 4
- AVA_VLA.1: 3
|
- ADV:
- ADV_ARC.1: 2
- ADV_FSP: 1
- ADV_FSP.2: 1
- ADV_FSP.4: 1
- ADV_FSP.5: 3
- ADV_IMP.1: 2
- ADV_INT.2: 1
- ADV_TDS.3: 1
- ADV_TDS.4: 1
- AGD:
- AGD_OPE.1: 2
- AGD_PRE.1: 2
- ALC:
- ALC_CMC.4: 1
- ALC_CMS: 1
- ALC_CMS.4: 1
- ALC_CMS.5: 3
- ALC_DEL.1: 1
- ALC_DVS: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 9
- ALC_LCD.1: 1
- ALC_TAT.2: 1
- ASE:
- ASE_CCL: 2
- ASE_CCL.1: 1
- ASE_ECD: 2
- ASE_ECD.1: 1
- ASE_INT: 2
- ASE_INT.1: 1
- ASE_OBJ: 2
- ASE_OBJ.2: 1
- ASE_REQ: 2
- ASE_REQ.2: 1
- ASE_SPD: 2
- ASE_SPD.1: 1
- ASE_TSS: 2
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.3: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
pdf_data/st_keywords/cc_sfr |
- FAU:
- FDP:
- FDP_RIP.1: 12
- FDP_RIP.1.1: 1
- FIA:
- FIA_AFL.1: 26
- FIA_AFL.1.1: 2
- FIA_AFL.1.2: 2
- FIA_SOS.1: 30
- FIA_SOS.1.1: 2
- FIA_UAU.1: 19
- FIA_UAU.2: 34
- FIA_UAU.7: 26
- FIA_UAU.7.1: 2
- FIA_UID.1: 19
- FIA_UID.2: 36
- FMT:
- FMT_MOF.1: 13
- FMT_MOF.1.1: 1
- FMT_MTD.1: 41
- FMT_MTD.1.1: 3
- FMT_SMF.1: 21
- FMT_SMF.1.1: 1
- FMT_SMR.1: 26
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPT:
- FPT_RVM.1: 30
- FPT_RVM.1.1: 1
|
- FAU:
- FAU_GEN: 1
- FAU_SAS: 4
- FAU_SAS.1: 10
- FAU_SAS.1.1: 1
- FCS:
- FCS_CKM: 1
- FCS_CKM.1: 18
- FCS_CKM.2: 1
- FCS_CKM.4: 13
- FCS_COP: 28
- FCS_COP.1: 16
- FCS_RNG: 4
- FCS_RNG.1: 10
- FCS_RNG.1.1: 1
- FCS_RNG.1.2: 1
- FDP:
- FDP_ACC.1: 17
- FDP_ACC.1.1: 1
- FDP_ACF.1: 15
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_IFC.1: 8
- FDP_ITC.1: 14
- FDP_ITC.2: 14
- FDP_ITT.1: 6
- FDP_SDI.1: 1
- FDP_SDI.2: 13
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FMT:
- FMT_CKM.4: 1
- FMT_LIM: 3
- FMT_LIM.1: 8
- FMT_LIM.2: 8
- FMT_MSA.1: 15
- FMT_MSA.1.1: 1
- FMT_MSA.3: 16
- FMT_MSA.3.1: 1
- FMT_MSA.3.2: 1
- FMT_SMF.1: 12
- FMT_SMF.1.1: 1
- FMT_SMR.1: 6
- FPT:
- FPT_FLS.1: 9
- FPT_ITT.1: 6
- FPT_PHP.3: 8
- FPT_TST: 7
- FPT_TST.1: 8
- FPT_TST.2: 29
- FPT_TST.2.1: 1
- FRU:
|
pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 4
- A.SE: 5
- A.SETSEC: 5
- O:
- O.HDLMNG: 6
- O.RESIDUAL: 5
- OE:
- OE.ADMIN: 3
- OE.AUTH: 4
- OE.HDD: 7
- OE.SE: 3
- T:
|
|
pdf_data/st_keywords/vendor |
|
- Infineon:
- Infineon: 3
- Infineon Technologies: 2
- Infineon Technologies AG: 5
- NXP:
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- DFA: 1
- Malfunction: 8
- malfunction: 1
- SCA:
- DPA: 5
- Leak-Inherent: 7
- Physical Probing: 2
- SPA: 1
- side-channel: 4
- other:
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2005-08-001: 1
- CCMB-2005-08-002: 1
- CCMB-2005-08-003: 1
- ISO:
|
- BSI:
- CC:
- CCMB-2009-07-001: 2
- CCMB-2009-07-002: 2
- CCMB-2009-07-003: 2
- FIPS:
- ISO:
- ISO/IEC 3309: 2
- ISO/IEC 7816-3: 1
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
- /Author: 1800072
- /CreationDate: D:20080619114948+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20080619114948+09'00'
- /Producer: Acrobat Distiller 6.0.1 (Windows)
- /Title: Microsoft Word - DA-SC04英文ST20080620.doc
- pdf_file_size_bytes: 366792
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 41
|
- /Author: Jürgen Noller
- /CreationDate: D:20110617092354
- /Creator: SLE88CNFX6600PM_SecTar.doc - Microsoft Word
- /Keywords: Dresden, NFC, high end Security Controller, robust, high attack potential, EAL5, high, not practical, Infineon, CCv3.1, PP0035, TRGN
- /Producer: Acrobat PDFWriter 5.0 für Windows NT
- /Subject: Security Target SLE88CNFX6600PM / M8864
- /Title: CC EAL5 Certification Security Target
- pdf_file_size_bytes: 339184
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 59
|
state/cert/convert_garbage |
False |
False |
state/cert/convert_ok |
False |
False |
state/cert/download_ok |
False |
False |
state/cert/extract_ok |
False |
False |
state/cert/pdf_hash |
Equal |
Equal |
state/cert/txt_hash |
Equal |
Equal |
state/report/convert_garbage |
False |
False |
state/report/convert_ok |
True |
True |
state/report/download_ok |
True |
True |
state/report/extract_ok |
True |
True |
state/report/pdf_hash |
Different |
Different |
state/report/txt_hash |
Different |
Different |
state/st/convert_garbage |
False |
False |
state/st/convert_ok |
True |
True |
state/st/download_ok |
True |
True |
state/st/extract_ok |
True |
True |
state/st/pdf_hash |
Different |
Different |
state/st/txt_hash |
Different |
Different |