This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.
- Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 BSI-DSZ-CC-0772-2014 |
Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware) BSI-DSZ-CC-0891-V2-2016 |
|
---|---|---|
name | - Kanguru Defender Elite 200 with Kanguru Defender Manager Elite 200, Firmware Version 02.03.10, KDME200 v2.0.0.0-2/3/6,- Kanguru Defender 2000 with Kanguru Defender Manager 2000, Firmware Version 02.03.10, KDM2000 v1.2.1.8-2/3/6,- Universal Kanguru Local Administrator, Version 3.2.0.3 and- Kanguru Remote Management Console, Version 5.0.2.6 | Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware) |
category | Data Protection | ICs, Smart Cards and Smart Card-Related Devices and Systems |
not_valid_before | 2014-11-07 | 2016-12-20 |
not_valid_after | 2019-11-08 | 2021-12-20 |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V2b_pdf.pdf |
manufacturer | Kanguru Solutions | Infineon Technologies AG |
manufacturer_web | https://www.kanguru.com | https://www.infineon.com/ |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0891V2a_pdf.pdf |
protection_profiles | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Schutzprofil fur USB-Datentrager, Version 1.4', 'pp_eal': 'EAL2+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0025b.pdf', 'pp_ids': frozenset({'SCHUTZPROFIL_USB-DATENTRAGER_V1.4'})}) | frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': 'Security IC Platform Protection Profile with Augmentation Packages', 'pp_eal': 'EAL4+', 'pp_link': 'https://www.commoncriteriaportal.org/files/ppfiles/pp0084b_pdf.pdf', 'pp_ids': frozenset({'BAROC_SC_PP_V1.0', 'SECURITY_IC_AUGP_V1.0', 'JAVA_OC'})}) |
maintenance_updates | frozendict({'_type': 'sec_certs.sample.cc.CCCertificate.MaintenanceReport', 'maintenance_date': datetime.date(2015, 1, 20), 'maintenance_title': 'Kanguru Defender Elite 200 and Kanguru Defender 2000, firmware version 2.05.10', 'maintenance_report_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1a_pdf.pdf', 'maintenance_st_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0772_ma1b_pdf.pdf'}) | |
state/report/pdf_hash | 16e52e72927a5eee7124e6fde0c186c1d3d113e733e6116f5fdfcc44278c5b57 | 9945b7d3b0356021c38fe5dfaef23ccfce0945fc223844d48c2455403dd38b46 |
state/report/txt_hash | 8cb2309bdc02367be25c3961b565d25c9f78b2d7cdce20c08213092f4a2eff82 | e71b9a66aba5412d0aacae08c557832a5d5d07839c9b3f6c6e91884f740d9dc2 |
state/st/pdf_hash | 077d27d1e2e9eafc65cbb9d302bc66883e2dd06e21ea816741ca25fe7f7dcd7d | 1d498c6b156e29079aac67c4a0bc56ccaddb460cc34d2182c0da4d8045536909 |
state/st/txt_hash | 74714db4c60a8332c3603aaae83a1c8ec3cbea7950400f562332e8ccdcc98147 | eec8796b0551a13865067fb4f58b363a9efb36ba8787c8b9780ed664098850d4 |
heuristics/cert_id | BSI-DSZ-CC-0772-2014 | BSI-DSZ-CC-0891-V2-2016 |
heuristics/extracted_versions | 2.0.0.0, 1.2.1.8, 3.2.0.3, 02.03.10, 5.0.2.6 | 1.01, 2.02.010, 2.03.008 |
heuristics/report_references/directly_referenced_by | None | BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/76, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0961-V2-2018, ANSSI-CC-2017/21, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2017/19, ANSSI-CC-2017/07, ANSSI-CC-2017/20, ANSSI-CC-2017/83, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/81, ANSSI-CC-2017/22, NSCIB-CC-16-95781-CR, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
heuristics/report_references/directly_referencing | None | BSI-DSZ-CC-0891-2015 |
heuristics/report_references/indirectly_referenced_by | None | BSI-DSZ-CC-0980-2017, BSI-DSZ-CC-1148-V2-2023, ANSSI-CC-2020/56, ANSSI-CC-2020/07, NSCIB-CC-22-0286910-CR, BSI-DSZ-CC-1147-V2-2023, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0961-V2-2018, ANSSI-CC-2022/20, ANSSI-CC-2017/82, BSI-DSZ-CC-1110-V5-2022, NSCIB-CC-0075541-CR2, ANSSI-CC-2019/57-R01, BSI-DSZ-CC-1036-2019, ANSSI-CC-2020/64, ANSSI-CC-2020/61, BSI-DSZ-CC-1162-V2-2023, BSI-DSZ-CC-1034-2019, ANSSI-CC-2017/83, ANSSI-CC-2022/65, ANSSI-CC-2018/57v2, ANSSI-CC-2017/22, ANSSI-CC-2019/55, 2018-20-INF-4155, ANSSI-CC-2019/58, ANSSI-CC-2017/54, 2017-19-INF-3171, ANSSI-CC-2018/24, ANSSI-CC-2020/60, 2017-17-INF-3169, BSI-DSZ-CC-1003-2018, ANSSI-CC-2020/88-R01, BSI-DSZ-CC-0976-V3-2019, BSI-DSZ-CC-1077-V2-2024, BSI-DSZ-CC-1077-2020, NSCIB-CC-146301-CR2, JISEC-CC-CRP-C0648-01-2019, ANSSI-CC-2019/09, NSCIB-CC-175887-CR3, BSI-DSZ-CC-1172-2022, ANSSI-CC-2019/31, NSCIB-CC-0299278-CR, BSI-DSZ-CC-1147-V3-2023, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2018/21, ANSSI-CC-2020/57, ANSSI-CC-2022/67, ANSSI-CC-2022/33, BSI-DSZ-CC-1148-2020, BSI-DSZ-CC-1055-2018, BSI-DSZ-CC-1176-2023, ANSSI-CC-2020/59, BSI-DSZ-CC-0891-V3-2018, KECS-ISIS-1031-2020, NSCIB-CC-0112113-CR, ANSSI-CC-2020/62, NSCIB-CC-0299277-CR, ANSSI-CC-2020/49, ANSSI-CC-2018/32v2, BSI-DSZ-CC-0961-V6-2022, ANSSI-CC-2022/08, BSI-DSZ-CC-0891-V5-2021, ANSSI-CC-2018/58v2, BSI-DSZ-CC-1098-2020, ANSSI-CC-2018/32, ANSSI-CC-2020/63, ANSSI-CC-2017/76, BSI-DSZ-CC-1148-V3-2023, ANSSI-CC-2020/43, ANSSI-CC-2018/53, ANSSI-CC-2020/55, ANSSI-CC-2020/44, ANSSI-CC-2020/08, ANSSI-CC-2020/33, BSI-DSZ-CC-0891-V6-2021, NSCIB-CC-0286907-CR, BSI-DSZ-CC-0891-V7-2024, BSI-DSZ-CC-1162-2021, BSI-DSZ-CC-1110-V6-2023, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1110-V3-2020, ANSSI-CC-2017/19, BSI-DSZ-CC-0976-V4-2021, ANSSI-CC-2017/07, BSI-DSZ-CC-1076-2020, ANSSI-CC-2022/68, ANSSI-CC-2017/20, ANSSI-CC-2019/58-R01, ANSSI-CC-2018/56v2, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/87-R01, BSI-DSZ-CC-1147-2020, ANSSI-CC-2020/45, BSI-DSZ-CC-0961-V4-2019, BSI-DSZ-CC-1243-2024, ANSSI-CC-2019/07, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-1110-V2-2019, ANSSI-CC-2022/07, ANSSI-CC-2022/64, NSCIB-CC-16-95781-CR, BSI-DSZ-CC-0976-V2-2018, ANSSI-CC-2018/11, ANSSI-CC-2022/19, ANSSI-CC-2019/56, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2018/57, ANSSI-CC-2020/42, ANSSI-CC-2019/56-R01, 2021-43-INF-4154, ANSSI-CC-2018/58, 2021-44-INF-4142, ANSSI-CC-2019/55-R01, BSI-DSZ-CC-0891-V4-2019, ANSSI-CC-2019/57, ANSSI-CC-2017/21, BSI-DSZ-CC-1112-V2-2021, 2017-18-INF-3170, BSI-DSZ-CC-1117-2019, ANSSI-CC-2018/56, BSI-DSZ-CC-0961-V5-2020, ANSSI-CC-2020/87, ANSSI-CC-2020/88, ANSSI-CC-2020/58, BSI-DSZ-CC-1112-2020, ANSSI-CC-2017/81, BSI-DSZ-CC-0961-V3-2018, JISEC-CC-CRP-C0649-01-2019, BSI-DSZ-CC-1211-2023 |
heuristics/report_references/indirectly_referencing | None | BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/st_references/directly_referenced_by | None | BSI-DSZ-CC-1003-2018, ANSSI-CC-2017/76, 2016-32-INF-2110, ANSSI-CC-2017/21, ANSSI-CC-2020/33, ANSSI-CC-2018/21, ANSSI-CC-2017/82, ANSSI-CC-2017/19, ANSSI-CC-2017/07, ANSSI-CC-2017/20, ANSSI-CC-2017/83, 2016-31-INF-2102, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/81, ANSSI-CC-2017/22, 2016-30-INF-2094, NSCIB-CC-16-95781-CR, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
heuristics/st_references/indirectly_referenced_by | None | 2017-17-INF-3169, BSI-DSZ-CC-1003-2018, BSI-DSZ-CC-0869-V2-2019, ANSSI-CC-2020/42, NSCIB-CC-146301-CR2, ANSSI-CC-2017/76, ANSSI-CC-2020/43, 2016-32-INF-2110, ANSSI-CC-2019/09, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-1000-2023, ANSSI-CC-2017/21, ANSSI-CC-2020/44, ANSSI-CC-2020/33, BSI-DSZ-CC-1112-V2-2021, BSI-DSZ-CC-1033-2019, BSI-DSZ-CC-1033-V2-2021, ANSSI-CC-2018/21, 2017-18-INF-3170, ANSSI-CC-2017/82, ANSSI-CC-2017/19, BSI-DSZ-CC-1036-2019, ANSSI-CC-2017/07, ANSSI-CC-2017/20, BSI-DSZ-CC-1034-2019, ANSSI-CC-2017/83, 2016-31-INF-2102, BSI-DSZ-CC-1034-V2-2021, ANSSI-CC-2020/45, 2017-19-INF-3171, BSI-DSZ-CC-1112-2020, OCSI/CERT/CCL/14/2022/RC, BSI-DSZ-CC-0891-V3-2018, ANSSI-CC-2017/81, ANSSI-CC-2017/22, NSCIB-CC-0112113-CR, BSI-DSZ-CC-1105-2020, ANSSI-CC-2020/49, 2016-30-INF-2094, NSCIB-CC-16-95781-CR, ANSSI-CC-2017/54, ANSSI-CC-2018/11, ANSSI-CC-2018/24 |
pdf_data/report_filename | 0772a_pdf.pdf | 0891V2a_pdf.pdf |
pdf_data/report_frontpage/DE |
|
|
pdf_data/report_frontpage/DE/cert_id | BSI-DSZ-CC-0772-2014 | BSI-DSZ-CC-0891-V2-2016 |
pdf_data/report_frontpage/DE/cert_item | Kanguru Defender Elite 200 Kanguru Defender 2000 Universal Kanguru Local Administrator, v3.2.0.3 Kanguru Remote Management Console, v5.0.2.6 | Infineon Security Controller, M7892 Design Steps D11 and G12, with optional RSA2048/4096 v2.03.008, EC v2.03.008, SHA-2 v1.01 and Toolbox v2.03.008 libraries, symmetric crypto library v2.02.010 and with specific IC dedicated software (firmware |
pdf_data/report_frontpage/DE/developer | Kanguru Solutions | Infineon Technologies AG |
pdf_data/report_keywords/asymmetric_crypto | |
|
pdf_data/report_keywords/cc_cert_id/DE |
|
|
pdf_data/report_keywords/cc_claims | |
|
pdf_data/report_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/report_keywords/cc_sar/ADV/ADV_FSP.5 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_INT.2 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ADV/ADV_TDS.4 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_CMC.5 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_CMS.5 | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DEL.1 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_DVS.2 | 1 | 3 |
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR.1 | 5 | 6 |
pdf_data/report_keywords/cc_sar/ALC/ALC_LCD.1 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.2 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ALC/ALC_TAT.3 | 1 | 2 |
pdf_data/report_keywords/cc_sar/ATE/ATE_COV.1 | 2 | 1 |
pdf_data/report_keywords/cc_sar/ATE/ATE_DPT.3 | 1 | 2 |
pdf_data/report_keywords/cc_sar/AVA/AVA_VAN.5 | 1 | 2 |
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL 2 | 8 | 4 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 4 | 7 | 9 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 5 | 6 | 10 |
pdf_data/report_keywords/cc_security_level/EAL/EAL 6 | 3 | 8 |
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process/ConfidentialDocument |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/randomness/RNG/RNG | 2 | 1 |
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/side_channel_analysis/FI |
|
|
pdf_data/report_keywords/side_channel_analysis/FI/physical tampering | 2 | 1 |
pdf_data/report_keywords/standard_id/BSI |
|
|
pdf_data/report_keywords/standard_id/BSI/AIS 20 | 2 | 1 |
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 15408 | 2 | 4 |
pdf_data/report_keywords/standard_id/ISO/ISO/IEC 18045 | 2 | 4 |
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES |
|
|
pdf_data/report_keywords/symmetric_crypto/AES_competition/AES/AES | 4 | 5 |
pdf_data/report_keywords/technical_report_id/BSI |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_metadata//CreationDate | D:20141121083051+01'00' | D:20170112112116+01'00' |
pdf_data/report_metadata//Keywords | "Common Criteria, Certification, Zertifizierung, encrypted USB storage device, Kanguru Defender" | "Common Criteria, Certification, Zertifizierung, PP-0084, Sicherheits IC, Security IC, SmartCard" |
pdf_data/report_metadata//ModDate | D:20141121113713+01'00' | D:20170116131102+01'00' |
pdf_data/report_metadata//Title | Certification Report BSI-DSZ-CC-0772-2014 | Certification Report BSI-DSZ-CC-0891-V2-2016 |
pdf_data/report_metadata/pdf_file_size_bytes | 1643286 | 1274003 |
pdf_data/st_filename | 0772b_pdf.pdf | 0891V2b_pdf.pdf |
pdf_data/st_keywords/asymmetric_crypto | |
|
pdf_data/st_keywords/cc_cert_id/DE |
|
|
pdf_data/st_keywords/cc_claims | |
|
pdf_data/st_keywords/cc_protection_profile_id/BSI |
|
|
pdf_data/st_keywords/cc_sar/ADV |
|
|
pdf_data/st_keywords/cc_sar/ADV/ADV_SPM.1 | 2 | 6 |
pdf_data/st_keywords/cc_sar/ALC |
|
|
pdf_data/st_keywords/cc_sar/ALC/ALC_FLR.1 | 5 | 11 |
pdf_data/st_keywords/cc_sar/ASE |
|
|
pdf_data/st_keywords/cc_sar/ATE |
|
|
pdf_data/st_keywords/cc_sar/AVA |
|
|
pdf_data/st_keywords/cc_security_level/EAL |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_sfr/FAU |
|
|
pdf_data/st_keywords/cc_sfr/FCS |
|
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 | 9 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 | 1 | 4 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 | 9 | 29 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 | 9 | 23 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG | 2 | 7 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1 | 15 | 14 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.1 | 3 | 1 |
pdf_data/st_keywords/cc_sfr/FCS/FCS_RNG.1.2 | 3 | 1 |
pdf_data/st_keywords/cc_sfr/FDP |
|
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 | 14 | 23 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 | 13 | 20 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 | 1 | 16 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 | 2 | 25 |
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 | 2 | 25 |
pdf_data/st_keywords/cc_sfr/FIA |
|
|
pdf_data/st_keywords/cc_sfr/FMT |
|
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 | 8 | 18 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 | 1 | 19 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 | 6 | 14 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 | 2 | 1 |
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 | 12 | 6 |
pdf_data/st_keywords/cc_sfr/FPT |
|
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 | 9 | 18 |
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/CBC/CBC | 1 | 17 |
pdf_data/st_keywords/crypto_library | |
|
pdf_data/st_keywords/crypto_scheme | |
|
pdf_data/st_keywords/ecc_curve | |
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 | 1 | 5 |
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/randomness/RNG |
|
|
pdf_data/st_keywords/randomness/RNG/RNG | 14 | 9 |
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/side_channel_analysis/FI |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/standard_id/BSI |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES | 3 | 67 |
pdf_data/st_keywords/technical_report_id | |
|
pdf_data/st_keywords/vendor | |
|
pdf_data/st_metadata |
|
|
pdf_data/st_metadata//Author | Andreas Siegert (generated by CCTool version 2.8) | Oleg Rudakov |
pdf_data/st_metadata//CreationDate | D:20141006150157Z | D:20161202144109+01'00' |
pdf_data/st_metadata//Creator | Unknown | Microsoft® Word 2010 |
pdf_data/st_metadata//Keywords | Security Target, Common Criteria, USB Storage, Encryption, Protected Storage | Infineon AG |
pdf_data/st_metadata//ModDate | D:20141006150157Z | D:20161202144109+01'00' |
pdf_data/st_metadata//Producer | XEP 4.23 | Microsoft® Word 2010 |
pdf_data/st_metadata//Subject | Product Security Certification | |
pdf_data/st_metadata//Title | Kanguru Defender Security Target (version 1.10 as of 2014-10-06) | M7892 D11 and G12 Public Security Target |
pdf_data/st_metadata/pdf_file_size_bytes | 704587 | 1913905 |
pdf_data/st_metadata/pdf_hyperlinks | http://www.commoncriteriaportal.org/files/ccfiles/CCPART1V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART2V3.1R3.pdf, http://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R3.pdf | https://www.bsi.bund.de/, http://www.bsi.bund.de/, mailto:[email protected];[email protected]?subject=Document%20question%20, http://www.infineon.com/ |
pdf_data/st_metadata/pdf_number_of_pages | 41 | 101 |
dgst | eda06ca3c208ebd0 | 48330255bfb2c924 |