name |
IDmove v5 on SCR404U in EAC configuration with AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 (ANSSI-CC-2023/64)
|
Samsung TEEgris on Exynos 2200 (Version 5.0.0.0) (ANSSI-CC-2023/71)
|
category |
ICs, Smart Cards and Smart Card-Related Devices and Systems
|
Trusted Computing
|
not_valid_before |
2024-01-19
|
2024-02-01
|
not_valid_after |
2029-01-19
|
2029-02-01
|
scheme |
FR
|
FR
|
st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_64en.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_71en.pdf
|
status |
active
|
active
|
manufacturer |
Idemia
|
Samsung Electronics Co., Ltd.
|
manufacturer_web |
https://www.idemia.com
|
https://www.samsung.com
|
security_level |
AVA_VAN.5, ADV_INT.3, ALC_CMC.5, ATE_FUN.2, ATE_COV.3, ALC_TAT.3, ADV_IMP.2, ADV_TDS.5, EAL5+, ALC_DVS.2, ALC_FLR.3 |
EAL2+ |
report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_64fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_71fr.pdf
|
cert_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_64fr.pdf
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_71fr.pdf
|
protection_profiles |
frozendict({'_type': 'sec_certs.sample.protection_profile.ProtectionProfile', 'pp_name': "Machine Readable Travel Document with 'ICAO Application', Extended Access Control, Version ...", 'pp_eal': None, 'pp_link': 'https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0026b.pdf', 'pp_ids': None}) |
|
maintenance_updates |
|
|
state/cert/convert_garbage |
False
|
False
|
state/cert/convert_ok |
True
|
True
|
state/cert/download_ok |
True
|
True
|
state/cert/extract_ok |
True
|
True
|
state/cert/pdf_hash |
18e75901410f9d2760a3c3f738da4574eb4635409562f6190a971ca0eaef797c
|
bdc4ae02f7fe264ef28db9879f54f50e9405b087b868e71971b6daf1a2c3a509
|
state/cert/txt_hash |
0782b4e9ee53e391d8b8da304a6a386f753fa7b8198f0df7d6f9f194417348bc
|
b19a9df8f1ca95c65efeef96f461d512501d96443dc5cdbac700ee32c09b4ca5
|
state/report/convert_garbage |
False
|
False
|
state/report/convert_ok |
True
|
True
|
state/report/download_ok |
True
|
True
|
state/report/extract_ok |
True
|
True
|
state/report/pdf_hash |
6ee10136be66984f691058e7f8389669ba463b404c5113398a0f3910ccb298b9
|
2c613c0d2b9c0e06d38b41b98da13bae012de0200ef3f438d574970a0c3f3a13
|
state/report/txt_hash |
e43bdc1793348ff50b5613244eabfd25c36ba31eb4c6fd27da5a068bc3ff3e8c
|
0b454786d28451a2c632cb8566953695867656ba000f3f87c39ac858713f2e46
|
state/st/convert_garbage |
False
|
False
|
state/st/convert_ok |
True
|
True
|
state/st/download_ok |
True
|
True
|
state/st/extract_ok |
True
|
True
|
state/st/pdf_hash |
a7ce4aecd22df7f73f149b6afff7a15774a007b7da8b96680ff85dcb80b5fa77
|
3335ea97556a238d5e10afb2b1f2be8a6062ca6d0713af20d650f2f213698809
|
state/st/txt_hash |
1f41a84c9727b029afed66923158f7389b345a297d5ee29e3a010f310df70e86
|
29d46bd6abb7d82fb0cfc4275921552246cefdff76653ae24402a00854962958
|
heuristics/annotated_references |
None
|
None
|
heuristics/cert_id |
ANSSI-CC-2023/64
|
ANSSI-CC-2023/71
|
heuristics/cert_lab |
None
|
None
|
heuristics/cpe_matches |
None
|
cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:* |
heuristics/direct_transitive_cves |
None
|
None
|
heuristics/extracted_versions |
2023, 64 |
5.0.0.0 |
heuristics/indirect_transitive_cves |
None
|
None
|
heuristics/related_cves |
None
|
None
|
heuristics/report_references/directly_referenced_by |
None
|
None
|
heuristics/report_references/directly_referencing |
ANSSI-CC-2023/37 |
None
|
heuristics/report_references/indirectly_referenced_by |
None
|
None
|
heuristics/report_references/indirectly_referencing |
ANSSI-CC-2023/37 |
None
|
heuristics/scheme_data/cert_id |
ANSSI-CC-2023/64
|
ANSSI-CC-2023/71
|
heuristics/scheme_data/description |
Le produit évalué est « IDmove v5 on SCR404U in EAC configuration with AA in option, OS Commercial Version : 0x 098912;OS Unique Identifier : 0xB7BC0108 et E48C0108 » développé par IDEMIA.
Le produit est de type « carte à puce » pouvant être utilisé en modes avec et sans contact. Il implémente les fonctions de document de voyage électronique conformément aux spécifications de l’organisation de l’
|
Le produit évalué est « Samsung TEEgris on Exynos 2200, Version 5.0.0.0 » développé par Samsung Electronics Ltd., Co..
Ce produit, appelé également Samsung Secure OS, est l’implémentation de Samsung d’un TEE (Trusted Execution Environment), basé sur la technologie ARM Trust Zone.
|
heuristics/scheme_data/developer |
IDEMIA
|
Samsung Electronics Ltd., Co.
|
heuristics/scheme_data/enhanced |
- cert_id:
ANSSI-CC-2023/64
- certification_date:
19/01/2024
- expiration_date:
19/01/2029
- category:
Cartes à puce
- cc_version:
Critères Communs version 3.1r5
- developer:
IDEMIA
- sponsor:
IDEMIA
- evaluation_facility:
SERMA SAFETY & SECURITY
- level:
EAL5+
- protection_profile:
Machine Readable Travel Document with "ICAO Application", Extended Access Control, version 1.10, certifié BSI-CC-PP-0056-2009 le 25 mars 2009
- mutual_recognition:
CCRA
SOG-IS
- augmented:
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_TAT.3, ALC_FLR.3, ALC_DVS.2, ATE_COV.3, ATE_FUN.2, AVA_VAN.5
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_64fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_64en.pdf
|
- cert_id:
ANSSI-CC-2023/71
- certification_date:
01/02/2024
- expiration_date:
01/02/2029
- category:
Divers
- cc_version:
Critères Communs version 3.1r5
- developer:
Samsung Electronics Ltd., Co.
- sponsor:
Samsung Electronics Ltd., Co.
- evaluation_facility:
THALES / CNES
- level:
EAL2+
- protection_profile:
GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02
- mutual_recognition:
CCRA
SOG-IS
- augmented:
AVA_VAN_AP.3
- report_link: https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-CC-2023_71fr.pdf
- target_link:
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf
- cert_link:
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf
|
heuristics/scheme_data/enhanced/augmented |
ADV_IMP.2, ADV_INT.3, ADV_TDS.5, ALC_CMC.5, ALC_TAT.3, ALC_FLR.3, ALC_DVS.2, ATE_COV.3, ATE_FUN.2, AVA_VAN.5
|
AVA_VAN_AP.3
|
heuristics/scheme_data/enhanced/category |
Cartes à puce
|
Divers
|
heuristics/scheme_data/enhanced/cc_version |
Critères Communs version 3.1r5
|
Critères Communs version 3.1r5
|
heuristics/scheme_data/enhanced/cert_id |
ANSSI-CC-2023/64
|
ANSSI-CC-2023/71
|
heuristics/scheme_data/enhanced/cert_link |
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_64fr.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/Certificat-CC-2023_71fr.pdf
|
heuristics/scheme_data/enhanced/certification_date |
19/01/2024
|
01/02/2024
|
heuristics/scheme_data/enhanced/developer |
IDEMIA
|
Samsung Electronics Ltd., Co.
|
heuristics/scheme_data/enhanced/evaluation_facility |
SERMA SAFETY & SECURITY
|
THALES / CNES
|
heuristics/scheme_data/enhanced/expiration_date |
19/01/2029
|
01/02/2029
|
heuristics/scheme_data/enhanced/level |
EAL5+
|
EAL2+
|
heuristics/scheme_data/enhanced/mutual_recognition |
CCRA
SOG-IS
|
CCRA
SOG-IS
|
heuristics/scheme_data/enhanced/protection_profile |
Machine Readable Travel Document with "ICAO Application", Extended Access Control, version 1.10, certifié BSI-CC-PP-0056-2009 le 25 mars 2009
|
GlobalPlatform Technology TEE Protection Profile, réf. GPD_SPE_021 version 1.3, ANSSI-CC-PP-2014/01-M02
|
heuristics/scheme_data/enhanced/sponsor |
IDEMIA
|
Samsung Electronics Ltd., Co.
|
heuristics/scheme_data/enhanced/target_link |
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_64en.pdf
|
https://cyber.gouv.fr/sites/default/files/document_type/ANSSI-cible-CC-2023_71en.pdf
|
heuristics/scheme_data/expiration_date |
19 Janvier 2029
|
1 Février 2029
|
heuristics/scheme_data/level |
EAL5+
|
EAL2+
|
heuristics/scheme_data/product |
IDmove v5 on SCR404U in EAC configuration with AA in option (OS Commercial Version : 0x 098912;OS Unique Identifier : 0xB7BC0108 et E48C0108)
|
Samsung TEEgris on Exynos 2200 Version 5.0.0.0
|
heuristics/scheme_data/sponsor |
IDEMIA
|
Samsung Electronics Ltd., Co.
|
heuristics/scheme_data/url |
https://cyber.gouv.fr/produits-certifies/idmove-v5-scr404u-eac-configuration-aa-option-os-commercial-version-0x-098912os
|
https://cyber.gouv.fr/produits-certifies/samsung-teegris-exynos-2200-version-5000
|
heuristics/st_references/directly_referenced_by |
None
|
None
|
heuristics/st_references/directly_referencing |
ANSSI-CC-2023/37 |
None
|
heuristics/st_references/indirectly_referenced_by |
None
|
None
|
heuristics/st_references/indirectly_referencing |
ANSSI-CC-2023/37 |
None
|
heuristics/verified_cpe_matches |
None
|
None
|
pdf_data/cert_filename |
Certificat-CC-2023_64fr.pdf
|
Certificat-CC-2023_71fr.pdf
|
pdf_data/cert_frontpage |
None
|
None
|
pdf_data/cert_keywords/asymmetric_crypto |
|
|
pdf_data/cert_keywords/cc_cert_id/FR |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
- ANSSI:
- ANSSI-CC-PP-2014/01-M02:
1
|
pdf_data/cert_keywords/cc_sar |
- ADV:
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- ALC:
- ALC_CMC.5:
1
- ALC_TAT.3:
1
- ALC_FLR.3:
2
- ALC_DVS.2:
1
- ATE:
- ATE_COV.3:
1
- ATE_FUN.2:
1
- AVA:
|
|
pdf_data/cert_keywords/cc_security_level/EAL |
|
|
pdf_data/cert_keywords/cc_security_level/EAL/EAL2 |
1
|
2
|
pdf_data/cert_keywords/cc_sfr |
|
|
pdf_data/cert_keywords/certification_process |
|
|
pdf_data/cert_keywords/cipher_mode |
|
|
pdf_data/cert_keywords/cplc_data |
|
|
pdf_data/cert_keywords/crypto_engine |
|
|
pdf_data/cert_keywords/crypto_library |
|
|
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/crypto_scheme |
|
|
pdf_data/cert_keywords/device_model |
|
|
pdf_data/cert_keywords/ecc_curve |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/ic_data_group |
|
|
pdf_data/cert_keywords/javacard_api_const |
|
|
pdf_data/cert_keywords/javacard_packages |
|
|
pdf_data/cert_keywords/javacard_version |
|
|
pdf_data/cert_keywords/os_name |
|
|
pdf_data/cert_keywords/pq_crypto |
|
|
pdf_data/cert_keywords/randomness |
|
|
pdf_data/cert_keywords/side_channel_analysis |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/technical_report_id |
|
|
pdf_data/cert_keywords/tee_name |
|
|
pdf_data/cert_keywords/tls_cipher_suite |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/vulnerability |
|
|
pdf_data/cert_metadata//CreationDate |
D:20240123144245+01'00'
|
D:20240215120518+01'00'
|
pdf_data/cert_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Acrobat PDFMaker 23 pour Word
|
pdf_data/cert_metadata//Keywords |
|
|
pdf_data/cert_metadata//ModDate |
D:20240123145402+01'00'
|
D:20240215120555+01'00'
|
pdf_data/cert_metadata//Producer |
Adobe PDF Library 23.1.175
|
Adobe PDF Library 23.1.175
|
pdf_data/cert_metadata/pdf_file_size_bytes |
158619
|
154878
|
pdf_data/cert_metadata/pdf_hyperlinks |
|
|
pdf_data/cert_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/cert_metadata/pdf_number_of_pages |
2
|
2
|
pdf_data/report_filename |
ANSSI-CC-2023_64fr.pdf
|
ANSSI-CC-2023_71fr.pdf
|
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/cc_cert_id/FR |
- ANSSI-CC-2023/64:
2
- ANSSI-CC-2023/37:
2
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056-2009:
2
- BSI-PP-0084-2014:
1
- BSI-CC-PP-0090-2016:
1
|
- ANSSI:
- ANSSI-CC-PP-2014/01-M02:
2
|
pdf_data/report_keywords/cc_sar |
- ADV:
- ADV_IMP.2:
1
- ADV_INT.3:
1
- ADV_TDS.5:
1
- AGD:
- ALC:
- ALC_CMC.5:
1
- ALC_TAT.3:
1
- ALC_FLR.3:
2
- ALC_DVS.2:
1
- ALC_FLR:
1
- ATE:
- ATE_COV.3:
1
- ATE_FUN.2:
1
- AVA:
|
|
pdf_data/report_keywords/cc_sar/ALC |
- ALC_CMC.5: 1
- ALC_TAT.3: 1
- ALC_FLR.3: 2
- ALC_DVS.2: 1
- ALC_FLR:
1
|
|
pdf_data/report_keywords/cc_sar/ALC/ALC_FLR |
1
|
1
|
pdf_data/report_keywords/cc_security_level/EAL |
|
|
pdf_data/report_keywords/cc_security_level/EAL/EAL2 |
2
|
3
|
pdf_data/report_keywords/cc_security_level/EAL/EAL7 |
1
|
1
|
pdf_data/report_keywords/cc_security_level/ITSEC |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/cplc_data |
|
|
pdf_data/report_keywords/crypto_engine |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/ecc_curve |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/javacard_api_const |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_keywords/os_name |
|
|
pdf_data/report_keywords/pq_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
- ICAO:
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CC:
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/standard_id/CC |
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
- CCMB-2017-04-001:
1
- CCMB-2017-04-002:
1
- CCMB-2017-04-003:
1
|
pdf_data/report_keywords/symmetric_crypto |
- AES_competition:
- AES:
- AES-128:
1
- AES-192:
1
- AES-:
1
- DES:
|
|
pdf_data/report_keywords/symmetric_crypto/DES |
|
|
pdf_data/report_keywords/symmetric_crypto/DES/DES |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/tls_cipher_suite |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_metadata//CreationDate |
D:20240123144341+01'00'
|
D:20240215115644+01'00'
|
pdf_data/report_metadata//Creator |
Acrobat PDFMaker 23 pour Word
|
Microsoft® Word 2019
|
pdf_data/report_metadata//Keywords |
|
|
pdf_data/report_metadata//ModDate |
D:20240123145402+01'00'
|
D:20240215120554+01'00'
|
pdf_data/report_metadata//Producer |
Adobe PDF Library 23.1.175
|
Microsoft® Word 2019
|
pdf_data/report_metadata/pdf_file_size_bytes |
403244
|
427132
|
pdf_data/report_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/report_metadata/pdf_number_of_pages |
15
|
15
|
pdf_data/st_filename |
ANSSI-cible-CC-2023_64en.pdf
|
ANSSI-cible-CC-2023_71en.pdf
|
pdf_data/st_frontpage |
None
|
None
|
pdf_data/st_keywords/asymmetric_crypto/ECC |
|
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDH/ECDH |
1
|
5
|
pdf_data/st_keywords/asymmetric_crypto/ECC/ECDSA/ECDSA |
2
|
13
|
pdf_data/st_keywords/asymmetric_crypto/FF |
|
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/DH |
1
|
5
|
pdf_data/st_keywords/asymmetric_crypto/FF/DH/Diffie-Hellman |
1
|
2
|
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_claims |
- OT:
- OE:
- OE.BAC_PP:
4
- OE.BAC-PP:
1
|
- O:
- O.CA_TA_IDENTIFICATION:
11
- O.KEYS_USAGE:
4
- O.TEE_ID:
11
- O.INITIALISATION:
10
- O.INSTANCE_TIME:
11
- O.OPERATION:
8
- O.RNG:
12
- O.RUNTIME_CONFIDENTIALITY:
10
- O.RUNTIME_INTEGRITY:
21
- O.TA_AUTHENTICITY:
7
- O.TA_ISOLATION:
15
- O.TEE_DATA_PROTECTION:
11
- O.TEE_ISOLATION:
14
- O.TRUSTED_STORAGE:
9
- O.DEBUG:
12
- O.ROLLBACK_PROTECTION:
5
- O.TA_PERSISTENT_TIME:
12
- O.PERIPHERAL_INITIALISATION:
3
- O.INITIALIZATION:
1
- O.PROTECTED_COMMUNICATION_CHANNEL:
12
- O.PREVENT_RESIDUAL_DATA:
3
- O.DATA_ACCESS:
11
- O.FUNCTION_ACCESS:
4
- O.SAFE_RELEASE:
11
- O.CAPTURE:
2
- T:
- T.ABUSE_FUNCT:
3
- T.CLONE:
3
- T.FLASH_DUMP:
3
- T.IMPERSONATION:
3
- T.ROGUE_CODE_EXECUTION:
2
- T.PERTURBATION:
3
- T.RAM:
3
- T.RNG:
3
- T.SPY:
3
- T.TEE_FIRMWARE_DOWNGRADE:
2
- T.STORAGE_CORRUPTION:
3
- T.ABUSE_DEBUG:
3
- T.ROLLBACK:
3
- T.TA_PERSISTENT_TIME_ROLLBACK:
2
- T.SHARED_FUNCTION_ACCESS:
2
- T.EXTRACT_EXCHANGED_DATA:
2
- T.MODIFY_EXCHANGED_DATA:
2
- T.INJECT_EXCHANGED_DATA:
2
- T.MODIFY_FIRMWARE:
3
- T.INJECT_DATA:
3
- T.EXTRACT_DATA:
3
- T.MODIFY_DATA:
3
- T.RESIDUAL:
3
- T.CORRUPT_RUNTIME_DATA:
2
- T.CORRUPT_SETUP:
5
- T.PERIPHERAL_ACCESS:
3
- T.ROGUE_CODE_:
1
- T.TEE_FIRMWARE_:
1
- T.TA_PERSISTENT_TIME_:
1
- T.SHARED_FUNCTION_:
1
- T.EXTRACT_EXCHANGED_:
1
- T.MODIFY_EXCHANGED_:
1
- T.INJECT_EXCHANGED_:
1
- T.CORRUPT_RUNTIME_:
1
- A:
- A.PROTECTION_AFTER_DELIVERY:
2
- A.TA_MANAGEMENT:
5
- A.TA_DEVELOPMENT:
4
- A.ROLLBACK:
1
- A.TA_DEVELOPMENT_TUI:
3
- A.NO_RESIDUAL_DATA:
3
- A.PROTECTION_AFTER_:
1
- OP:
- OP.USE_KEY:
4
- OP.EXTRACT_KEY:
4
- OP.LOAD:
3
- OP.STORE:
4
- OP.AUTHENTICATE:
2
- OP.DEBUG:
7
- OP.ACTIVATE:
1
- OE:
- OE.INTEGRATION_CONFIGURATION:
7
- OE.SECRETS:
2
- OE.PROTECTION_AFTER_DELIVERY:
7
- OE.TA_MANAGEMENT:
3
- OE.TA_DEVELOPMENT:
6
- OE.ROLLBACK:
1
- OE.DISABLED_DEBUG:
1
- OE.NO_RESIDUAL_DATA:
2
- OE.TA_DEVELOPMENT_TUI:
5
- OSP:
- OSP.INTEGRATION_CONFIGURATION:
2
- OSP.SECRETS:
3
- OSP.INTEGRATION_:
1
|
pdf_data/st_keywords/cc_claims/OE |
- OE.BAC_PP:
4
- OE.BAC-PP:
1
|
- OE.INTEGRATION_CONFIGURATION:
7
- OE.SECRETS:
2
- OE.PROTECTION_AFTER_DELIVERY:
7
- OE.TA_MANAGEMENT:
3
- OE.TA_DEVELOPMENT:
6
- OE.ROLLBACK:
1
- OE.DISABLED_DEBUG:
1
- OE.NO_RESIDUAL_DATA:
2
- OE.TA_DEVELOPMENT_TUI:
5
|
pdf_data/st_keywords/cc_protection_profile_id |
- BSI:
- BSI-CC-PP-0056:
1
- BSI-CC-PP-0090-2016:
2
- BSI-PP-0084-2014:
1
- BSI-PP-0056:
1
- BSI-CC-PP-0056-V2-:
1
- BSI-CC-PP-0087-V2-:
1
|
|
pdf_data/st_keywords/cc_sar/ADV |
- ADV_IMP.2: 5
- ADV_INT.3: 4
- ADV_TDS.5: 8
- ADV_ARC.1:
6
- ADV_FSP.4: 1
- ADV_TDS.3: 3
- ADV_IMP.1: 2
- ADV_TDS.1:
2
- ADV_FSP.5: 4
- ADV_FSP.1:
2
- ADV_FSP.2:
2
|
- ADV_ARC.1:
7
- ADV_FSP.2:
15
- ADV_TDS.1:
10
- ADV_FSP.1:
3
|
pdf_data/st_keywords/cc_sar/ADV/ADV_ARC.1 |
6
|
7
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.1 |
2
|
3
|
pdf_data/st_keywords/cc_sar/ADV/ADV_FSP.2 |
2
|
15
|
pdf_data/st_keywords/cc_sar/ADV/ADV_TDS.1 |
2
|
10
|
pdf_data/st_keywords/cc_sar/AGD |
- AGD_PRE: 7
- AGD_OPE: 2
- AGD_OPE.1:
6
- AGD_PRE.1:
2
|
- AGD_OPE.1:
10
- AGD_PRE.1:
9
|
pdf_data/st_keywords/cc_sar/AGD/AGD_OPE.1 |
6
|
10
|
pdf_data/st_keywords/cc_sar/AGD/AGD_PRE.1 |
2
|
9
|
pdf_data/st_keywords/cc_sar/ALC |
- ALC_DVS.2: 10
- ALC_CMC.5: 4
- ALC_TAT.3: 6
- ALC_FLR.3: 4
- ALC_DEL: 1
- ALC_STM: 2
- ALC_SCT: 2
- ALC_TAT.1: 2
- ALC_CMS.5: 1
- ALC_LCD.1: 2
- ALC_DEL.1:
1
|
- ALC_CMC.2: 1
- ALC_CMS.1: 1
- ALC_CMS.2: 1
- ALC_DEL.1:
1
|
pdf_data/st_keywords/cc_sar/ALC/ALC_DEL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE |
- ASE_CCL.1:
1
- ASE_ECD.1:
1
- ASE_INT.3: 2
- ASE_REQ.2:
1
- ASE_INT.1:
1
- ASE_OBJ.2:
3
- ASE_SPD.1:
2
- ASE_TSS.1:
1
- ASE_REQ.1:
1
|
- ASE_CCL.1:
1
- ASE_ECD.1:
4
- ASE_INT.1:
5
- ASE_REQ.1:
2
- ASE_REQ.2:
2
- ASE_OBJ.2:
3
- ASE_SPD.1:
2
- ASE_TSS.1:
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_CCL.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ASE/ASE_ECD.1 |
1
|
4
|
pdf_data/st_keywords/cc_sar/ASE/ASE_INT.1 |
1
|
5
|
pdf_data/st_keywords/cc_sar/ASE/ASE_OBJ.2 |
3
|
3
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.1 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ASE/ASE_REQ.2 |
1
|
2
|
pdf_data/st_keywords/cc_sar/ASE/ASE_SPD.1 |
2
|
2
|
pdf_data/st_keywords/cc_sar/ASE/ASE_TSS.1 |
1
|
1
|
pdf_data/st_keywords/cc_sar/ATE |
- ATE_COV.3: 5
- ATE_FUN.2: 6
- ATE_DPT.1: 2
- ATE_FUN.1:
1
- ATE_COV.1:
2
- ATE_IND.2: 1
- ATE_DPT.3: 1
|
- ATE_COV.1:
5
- ATE_FUN.1:
4
|
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.1 |
2
|
5
|
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 |
1
|
4
|
pdf_data/st_keywords/cc_sar/AVA |
- AVA_VAN.5:
9
- AVA_VAN.3:
1
|
|
pdf_data/st_keywords/cc_security_level/EAL |
- EAL5:
7
- EAL4:
2
- EAL5 augmented:
1
- EAL4 augmented:
2
|
- EAL 2:
6
- EAL 2+:
1
- EAL 2 augmented:
2
|
pdf_data/st_keywords/cc_sfr/FAU |
- FAU_SAS:
10
- FAU_SAS.1:
12
- FAU_GEN:
1
- FAU_SAS.1.1:
3
|
- FAU_ARP.1:
12
- FAU_ARP.1.1:
1
- FAU_SAR.1:
5
- FAU_SAR.1.1:
1
- FAU_SAR.1.2:
1
- FAU_STG.1:
5
- FAU_STG.1.1:
1
- FAU_STG.1.2:
1
- FAU_SAA.1:
2
- FAU_GEN.1:
4
|
pdf_data/st_keywords/cc_sfr/FCS |
- FCS_RND: 6
- FCS_CKM.1:
24
- FCS_CKM.4:
38
- FCS_COP.1:
34
- FCS_RND.1: 17
- FCS_RND.1.1: 3
- FCS_CKM.1.1: 1
- FCS_CKM.4.1: 2
- FCS_CKM:
68
- FCS_COP:
97
- FCS_CKM.2:
2
|
- FCS_RNG: 3
- FCS_RNG.1: 10
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FCS_CKM:
48
- FCS_CKM.1:
17
- FCS_COP:
68
- FCS_CKM.4:
23
- FCS_COP.1:
14
- FCS_CKM.2:
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM |
68
|
48
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.1 |
24
|
17
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.2 |
2
|
2
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_CKM.4 |
38
|
23
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP |
97
|
68
|
pdf_data/st_keywords/cc_sfr/FCS/FCS_COP.1 |
34
|
14
|
pdf_data/st_keywords/cc_sfr/FDP |
- FDP_ACC.1:
20
- FDP_ACF.1:
42
- FDP_UCT.1: 6
- FDP_UIT.1: 10
- FDP_ITC.1:
12
- FDP_IFC:
9
- FDP_IFF:
10
- FDP_RIP.1:
6
- FDP_ACF:
50
- FDP_ACC.1.1: 1
- FDP_ACF.1.1: 1
- FDP_ACF.1.2: 1
- FDP_ACF.1.3: 1
- FDP_ACF.1.4: 1
- FDP_UCT.1.1: 1
- FDP_UIT.1.1: 1
- FDP_UIT.1.2: 1
- FDP_ACC:
43
- FDP_RIP:
6
- FDP_ITC.2:
4
- FDP_IFC.1:
8
- FDP_UCT: 14
- FDP_UIT: 15
- FDP_ITC: 10
- FDP_IFF.1:
7
|
- FDP_ITT.1: 4
- FDP_IFC:
13
- FDP_IFF:
11
- FDP_ITT: 11
- FDP_ACC:
40
- FDP_ACF:
35
- FDP_ROL: 7
- FDP_IFC.2: 2
- FDP_IFF.1:
8
- FDP_RIP:
10
- FDP_RIP.1:
2
- FDP_ACC.1:
15
- FDP_ACF.1:
21
- FDP_SDI.2: 15
- FDP_SDI.2.1: 1
- FDP_SDI.2.2: 1
- FDP_ROL.1: 2
- FDP_SDI: 6
- FDP_TRP: 1
- FDP_IFC.1:
8
- FDP_ITC.1:
15
- FDP_ITC.2:
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC |
43
|
40
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 |
20
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF |
50
|
35
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 |
42
|
21
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC |
9
|
13
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFC.1 |
8
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF |
10
|
11
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_IFF.1 |
7
|
8
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.1 |
12
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_ITC.2 |
4
|
15
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP |
6
|
10
|
pdf_data/st_keywords/cc_sfr/FDP/FDP_RIP.1 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FIA |
- FIA_API: 12
- FIA_UID.1:
16
- FIA_UAU.1: 12
- FIA_UAU.4: 11
- FIA_UAU.5: 11
- FIA_UAU.6:
6
- FIA_AFL.1: 8
- FIA_API.1: 10
- FIA_SOS.2: 1
- FIA_API.1.1: 2
- FIA_UID.1.1: 2
- FIA_UID.1.2: 2
- FIA_UAU.1.1: 2
- FIA_UAU.1.2: 2
- FIA_UAU.4.1: 2
- FIA_UAU.5.1: 1
- FIA_UAU.5.2: 1
- FIA_UAU.6.1: 1
- FIA_AFL: 12
- FIA_UID:
6
- FIA_UAU:
37
|
- FIA_ATD.1: 10
- FIA_ATD.1.1: 1
- FIA_UID.2: 8
- FIA_UID.2.1: 1
- FIA_USB.1: 9
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FIA_UID:
8
- FIA_ATD: 7
- FIA_USB: 6
- FIA_UAU.6:
2
- FIA_UAU:
12
- FIA_UAU.2: 1
- FIA_UID.1:
3
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU |
37
|
12
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UAU.6 |
6
|
2
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID |
6
|
8
|
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 |
16
|
3
|
pdf_data/st_keywords/cc_sfr/FMT |
- FMT_LIM: 6
- FMT_MOF: 17
- FMT_SMF.1:
18
- FMT_SMR.1:
16
- FMT_LIM.1: 17
- FMT_LIM.2: 16
- FMT_MTD.1:
69
- FMT_MTD.3: 6
- FMT_LIM.1.1: 3
- FMT_LIM.2.1: 3
- FMT_MOF.1: 12
- FMT_SMF.1.1:
2
- FMT_SMR.1.1:
2
- FMT_SMR.1.2:
2
- FMT_MTD:
129
- FMT_MTD.3.1: 2
- FMT_SMF:
6
- FMT_SMR:
8
- FMT_MSA.3:
8
- FMT_MSA.1:
2
|
- FMT_MSA: 55
- FMT_SMF.1:
21
- FMT_SMR.1:
24
- FMT_SMR.1.1:
1
- FMT_SMR.1.2:
1
- FMT_MSA.1:
7
- FMT_MSA.3:
15
- FMT_SMF.1.1:
1
- FMT_SMR:
6
- FMT_MTD:
5
- FMT_MTD.1:
1
- FMT_SMF:
5
- FMT_MSA.2: 1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 |
2
|
7
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 |
8
|
15
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD |
129
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 |
69
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF |
6
|
5
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 |
18
|
21
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR |
8
|
6
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 |
16
|
24
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FPT |
- FPT_EMS: 7
- FPT_EMS.1: 20
- FPT_FLS.1:
10
- FPT_TST.1: 12
- FPT_PHP.3: 9
- FPT_EMS.1.1: 4
- FPT_EMS.1.2: 4
- FPT_FLS.1.1:
2
- FPT_TST.1.1: 2
- FPT_TST.1.2: 2
- FPT_TST.1.3: 2
- FPT_PHP.3.1: 2
- FPT_FLS:
5
- FPT_TST: 5
|
- FPT_INI: 4
- FPT_INI.1: 14
- FPT_INI.1.1: 2
- FPT_INI.1.2: 2
- FPT_INI.1.3: 2
- FPT_INI.1.4: 1
- FPT_FLS.1:
18
- FPT_ITT: 6
- FPT_ITT.1: 2
- FPT_FLS.1.1:
1
- FPT_TEE.1: 6
- FPT_TEE.1.1: 1
- FPT_TEE.1.2: 1
- FPT_STM: 10
- FPT_STM.1: 2
- FPT_FLS:
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS |
5
|
12
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1 |
10
|
18
|
pdf_data/st_keywords/cc_sfr/FPT/FPT_FLS.1.1 |
2
|
1
|
pdf_data/st_keywords/cc_sfr/FTP |
- FTP_ITC.1: 17
- FTP_ITC: 10
- FTP_TRP.1:
4
|
- FTP_TPR: 1
- FTP_TRP: 7
- FTP_TRP.1:
3
|
pdf_data/st_keywords/cc_sfr/FTP/FTP_TRP.1 |
4
|
3
|
pdf_data/st_keywords/certification_process |
|
- OutOfScope:
- out of scope:
1
- and this assumption applies only for Phase 7 - End usage. Note that the operational environment is out of scope of the evaluation. A.TA_MANAGEMENT A well-defined TA identification and TA signature policy exist:
1
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/cipher_mode/ECB/ECB |
2
|
1
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_scheme/MAC |
|
|
pdf_data/st_keywords/device_model |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1 |
|
|
pdf_data/st_keywords/hash_function/SHA/SHA1/SHA-1 |
4
|
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2 |
- SHA-256:
9
- SHA-224:
4
- SHA-384:
4
- SHA-512:
2
|
- SHA-256:
2
- SHA256: 2
- SHA224: 1
- SHA384: 1
- SHA512: 1
- SHA-224:
1
- SHA-384:
1
- SHA-512:
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-224 |
4
|
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-256 |
9
|
2
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-384 |
4
|
1
|
pdf_data/st_keywords/hash_function/SHA/SHA2/SHA-512 |
2
|
1
|
pdf_data/st_keywords/ic_data_group |
- EF:
- EF.DG1:
25
- EF.DG2:
7
- EF.DG3:
20
- EF.DG4:
20
- EF.DG5:
6
- EF.DG16:
25
- EF.DG13:
1
- EF.DG14:
5
- EF.DG15:
2
- EF.COM:
23
- EF.SOD:
19
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/os_name |
|
|
pdf_data/st_keywords/pq_crypto |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
- SCA:
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
- FI:
- Physical Tampering:
6
- physical tampering:
3
- Physical tampering:
1
- Malfunction:
7
- malfunction:
6
- fault injection:
1
- other:
|
|
pdf_data/st_keywords/side_channel_analysis/SCA |
- physical probing:
3
- DPA:
2
- SPA:
1
- timing attacks:
1
|
|
pdf_data/st_keywords/side_channel_analysis/other |
|
|
pdf_data/st_keywords/standard_id |
- FIPS:
- FIPS 180-2:
1
- FIPS 46-3:
1
- FIPS 186-5:
1
- FIPS 197:
1
- FIPS PUB 197:
1
- NIST:
- PKCS:
- RFC:
- ISO:
- ISO/IEC 18013:
10
- ISO/IEC 14443:
2
- ISO/IEC 7816-4:
1
- ISO/IEC 9797-1:
1
- ICAO:
- SCP:
- CC:
- CCMB-2012-09-001:
1
- CCMB-2012-09-002:
1
- CCMB-2012-09-003:
1
- CCMB-2012-09-004:
1
|
- FIPS:
- FIPS 180-4:
1
- FIPS 197:
1
- FIPS 46-3:
1
- FIPS 81:
1
- FIPS 186-2:
1
- FIPS 186-4:
2
- FIPS 140-2:
1
- PKCS:
- RFC:
- RFC 2119:
3
- RFC 1423:
1
- RFC 4231:
1
- RFC 2202:
1
- RFC 7748:
1
- RFC 8032:
1
|
pdf_data/st_keywords/standard_id/FIPS |
- FIPS 180-2: 1
- FIPS 46-3:
1
- FIPS 186-5: 1
- FIPS 197:
1
- FIPS PUB 197: 1
|
- FIPS 180-4: 1
- FIPS 197:
1
- FIPS 46-3:
1
- FIPS 81: 1
- FIPS 186-2: 1
- FIPS 186-4: 2
- FIPS 140-2: 1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 197 |
1
|
1
|
pdf_data/st_keywords/standard_id/FIPS/FIPS 46-3 |
1
|
1
|
pdf_data/st_keywords/standard_id/PKCS |
|
|
pdf_data/st_keywords/standard_id/RFC |
|
- RFC 2119:
3
- RFC 1423:
1
- RFC 4231:
1
- RFC 2202:
1
- RFC 7748:
1
- RFC 8032:
1
|
pdf_data/st_keywords/symmetric_crypto/AES_competition/AES/AES |
24
|
11
|
pdf_data/st_keywords/symmetric_crypto/DES/3DES |
|
|
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES |
19
|
7
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC |
|
- HMAC: 5
- HMAC-SHA-224: 1
- HMAC-SHA-384: 1
- HMAC-SHA-512: 1
- CMAC:
3
|
pdf_data/st_keywords/symmetric_crypto/constructions/MAC/CMAC |
4
|
3
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/vulnerability |
|
|
pdf_data/st_metadata |
- pdf_file_size_bytes:
2465770
- pdf_is_encrypted:
False
- pdf_number_of_pages:
130
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Enabled: true
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SetDate: 2023-08-11T07:20:53Z
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Method: Privileged
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_Name: Customer Restricted
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_SiteId: 7694d41c-5504-43d9-9e40-cb254ad755ec
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ActionId: 57dc287a-b1af-4552-944d-d130091d7fa3
- /MSIP_Label_4aa92827-4e57-481a-825f-7b85caa0c471_ContentBits: 2
- /Title:
IDmove v5 on SCR404U in EAC configuration with AA in option
- /Author:
Nicolas LOKIEC
- /Subject: FQR A0BC
- /Keywords: Security Passport
- /Creator: Microsoft® Word pour Microsoft 365
- /CreationDate:
D:20231121142517+01'00'
- /ModDate:
D:20231121142517+01'00'
- /Producer:
Microsoft® Word pour Microsoft 365
- pdf_hyperlinks:
|
- pdf_file_size_bytes:
1813549
- pdf_is_encrypted:
False
- pdf_number_of_pages:
98
- /Author:
rosep
- /CreationDate:
D:20240108141421+01'00'
- /ModDate:
D:20240108141421+01'00'
- /Producer:
Microsoft: Print To PDF
- /Title:
Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
- pdf_hyperlinks:
|
pdf_data/st_metadata//Author |
Nicolas LOKIEC
|
rosep
|
pdf_data/st_metadata//CreationDate |
D:20231121142517+01'00'
|
D:20240108141421+01'00'
|
pdf_data/st_metadata//ModDate |
D:20231121142517+01'00'
|
D:20240108141421+01'00'
|
pdf_data/st_metadata//Producer |
Microsoft® Word pour Microsoft 365
|
Microsoft: Print To PDF
|
pdf_data/st_metadata//Title |
IDmove v5 on SCR404U in EAC configuration with AA in option
|
Microsoft Word - Samsung_TEEgris_5.0_Security_Target_v2.10_20230809_clean.docx
|
pdf_data/st_metadata/pdf_file_size_bytes |
2465770
|
1813549
|
pdf_data/st_metadata/pdf_hyperlinks |
|
|
pdf_data/st_metadata/pdf_is_encrypted |
False
|
False
|
pdf_data/st_metadata/pdf_number_of_pages |
130
|
98
|
dgst |
eeaae6fbee303a61
|
01cb0a033c2b1c55
|