Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
BooleBox On Premises V 4.2
OCSI/CERT/IMQ/06/2018/RC
Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
ANSSI-CC-2016/03
name BooleBox On Premises V 4.2 Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA (Version du patch : 1.3)
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme IT FR
status active archived
not_valid_after 23.04.2025 09.02.2021
not_valid_before 23.04.2020 09.02.2016
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/rc_boolebox_42_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2016_03.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_boolebox_42_v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_03_LITE.pdf
manufacturer Boole Server S.r.l. Gemalto / NXP Semiconductors
manufacturer_web https://www.booleserver.com/ https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 EAL5+, ALC_DVS.2, AVA_VAN.5
dgst efccd1dfa8e8195d e1d220b96e4ddfd1
heuristics/cert_id OCSI/CERT/IMQ/06/2018/RC ANSSI-CC-2016/03
heuristics/cert_lab [] SERMA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ALC_DVS.2, AVA_VAN.5
heuristics/extracted_versions 4.2 3.1, 4.2.0, 1.3
heuristics/report_references/directly_referencing {} ANSSI-CC-2015/15, ANSSI-CC-2015/37, BSI-DSZ-CC-0845-V2-2013
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2014/14, ANSSI-CC-2014/06, ANSSI-CC-2015/37, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0837-V2-2014, BSI-DSZ-CC-0845-V2-2013, BSI-DSZ-CC-0845-2012, BSI-DSZ-CC-0837-2013, ANSSI-CC-2014/86, ANSSI-CC-2015/08, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0666-2012, ANSSI-CC-2015/15
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0845-V2-2013
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0845-V2-2013
heuristics/protection_profiles {} d918b28fd7bb5d79, 27abdb9c6ab375a7
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf
pdf_data/report_filename rc_boolebox_42_v1.0.pdf ANSSI-CC-2016_03.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 5 augmenté ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2016/03
    • cert_item: Application IAS V4.2.0.B sur la plateforme JavaCard ouverte MultiApp V3.1 masquée sur le composant P60D144PVA
    • cert_item_version: Version de l’application IAS : 4.2.0.B Version de l’application MOCA Server : 1.0 Version de la plateforme Java Card MultiApp : 3.1 Version du patch : 1.3
    • cert_lab: Serma Technologies 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France NXP Semiconductors Box 54 02 40, D-22502 Hambourg, Allemagne Commanditaire Gemalto 6 rue de la Verrerie, 92197 Meudon cedex, France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Protection profiles for secure signature creation device – Part 2 : Device with key generation, version 2.0.1, maintenu sous la référence [PP-SSCD-Part2]. Protection profiles for secure signature creation device – Part 3 : Device with key import, version 1.0.2, certifié sous la référence [PP-SSCD-Part3
pdf_data/report_keywords/cc_cert_id
  • IT:
    • OCSI/CERT/IMQ/06/2018/RC: 27
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 2
  • FR:
    • ANSSI-CC-2015/15: 3
    • ANSSI-CC-2015/37: 1
    • ANSSI-CC-2016/03: 22
    • ANSSI-CC-PP-2010/03-M01: 1
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2010/03-M01: 1
  • BSI:
    • BSI-CC-PP- 0059-2009-MA-01: 1
    • BSI-CC-PP- 0075-2012: 1
  • other:
    • PP-SSCD-: 2
    • PP-SSCD-Part2: 2
    • PP-SSCD-Part3: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 7
    • EAL2+: 1
    • EAL4: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 2
    • EAL 7: 1
    • EAL4: 2
    • EAL5: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 3
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 6
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 7
  • Gemalto:
    • Gemalto: 9
  • NXP:
    • NXP: 4
    • NXP Semiconductors: 1
pdf_data/report_keywords/eval_facility
  • IMQLPS:
    • IMQ/LPS: 3
  • CESTI:
    • CESTI: 1
  • Serma:
    • Serma Technologies: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
      • AES-256: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
  • PACE:
    • PACE: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 6
pdf_data/report_keywords/javacard_packages
  • com:
    • com.gemalto.javacardx.pace: 1
  • javacardx:
    • javacardx.pace: 1
pdf_data/report_metadata
  • /Author: OCSI
  • /CreationDate: D:20200422093535+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20200423165945+00'00'
  • /Producer: Modified using InfoCert Dike
  • /Subject: ---
  • /Title: Rapporto di Certificazione del prodotto “BooleBox On Premises V Ѐ⸂”
  • pdf_file_size_bytes: 623576
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 27
  • /Author:
  • /CreationDate:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title: ANSSI-CC-2016_03
  • pdf_file_size_bytes: 1913442
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename st_boolebox_42_v1.5.pdf anssi_cible_2016_03_LITE.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0845-V2-2013: 2
  • NL:
    • CC-1: 4
    • CC-2: 3
    • CC-3: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0059-2009-MA-01: 1
    • BSI-CC-PP-0075-2012: 1
    • BSI-PP-0035: 1
  • other:
    • PP-SSCD: 3
    • PP-SSCD-KG: 28
    • PP-SSCD-KI: 22
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 1
    • EAL2+: 3
  • EAL:
    • EAL 5+: 1
    • EAL5: 3
    • EAL5 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_DVS.2: 3
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 9
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
  • FDP:
    • FDP_ACC.1: 26
    • FDP_ACC.1.1: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 3
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 22
    • FDP_IFC.1.1: 1
    • FDP_IFF: 1
    • FDP_IFF.1: 10
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 7
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_UCT.1: 7
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_XXX.1: 1
    • FIA_XXX.1.1: 2
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 3
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_PSE.1: 7
    • FPR_PSE.1.1: 1
    • FPR_PSE.1.2: 1
    • FPR_PSE.1.3: 1
    • FPR_UNO.1: 7
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_STM.1: 2
    • FPT_TDC: 1
    • FPT_TDC.1: 8
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE: 2
    • FPT_TEE.1: 7
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
  • FCS:
    • FCS_CKM: 45
    • FCS_CKM.1: 10
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.4: 12
    • FCS_CKM.4.1: 2
    • FCS_COP: 20
    • FCS_COP.1: 6
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 44
    • FDP_ACC.1: 28
    • FDP_ACC.1.1: 4
    • FDP_ACF: 32
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ACF.1.3: 4
    • FDP_ACF.1.4: 4
    • FDP_IFC.1: 17
    • FDP_ITC: 10
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 8
    • FDP_RIP: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
    • FDP_SDI: 17
    • FDP_SDI.1: 2
    • FDP_SDI.2: 2
    • FDP_SDI.2.1: 2
    • FDP_SDI.2.2: 2
    • FDP_UCT: 8
    • FDP_UCT.1: 2
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 1
  • FIA:
    • FIA_AFL: 14
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU: 14
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UID: 14
    • FIA_UID.1: 13
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 70
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 9
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MSA.4: 1
    • FMT_MSA.4.1: 2
    • FMT_MTD: 16
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 27
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 36
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_EMS: 5
    • FPT_EMS.1: 15
    • FPT_EMS.1.1: 3
    • FPT_EMS.1.2: 3
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 9
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 2
    • FPT_TST.1: 10
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ICT: 1
    • FTP_ITC: 8
    • FTP_ITC.1: 3
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ALIGNEDBACKUPS: 2
    • A.ASSUMPTION: 1
    • A.CERTIFICATE: 3
    • A.DBMS_ACCESS: 3
    • A.DOC_ACCESS: 2
    • A.OS_ACCESS: 2
    • A.OS_RESTRICT: 3
    • A.SECCOMM: 3
    • A.STORAGE_ACCESS: 3
    • A.TIME: 3
    • A.TOE_EVALUATED: 2
    • A.TRAINING: 2
    • A.TRUST: 3
    • A.UPDATE: 2
  • O:
    • O.ACCESS: 13
    • O.ANTI_BRUTE: 9
    • O.AUDIT: 7
    • O.AUDIT_PROT: 4
    • O.CONFIDENTIAL: 3
    • O.CONFIG: 7
    • O.CRYPTO: 10
    • O.IDENTIFY: 15
    • O.INTEGRITY: 5
    • O.MANAGE: 7
    • O.OTP: 5
    • O.PRIVACY: 4
    • O.STRONG_PERSONALKEY: 6
    • O.USER: 6
  • OE:
    • OE.ALIGNEDBACKUP: 6
    • OE.AUDIT: 5
    • OE.AUDIT_PROTECT: 1
    • OE.BACKUP: 1
    • OE.CERTIFICATE: 4
    • OE.CONTINUITY: 3
    • OE.CRYPTO: 8
    • OE.DB: 3
    • OE.DOC: 4
    • OE.IDENTIFY: 6
    • OE.INTEGRITY: 4
    • OE.LOG_STORE: 4
    • OE.PERSONALKEY: 4
    • OE.PHYSICAL_ACCESS: 6
    • OE.SO: 8
    • OE.STAFF: 18
    • OE.STORAGE: 3
    • OE.TIME: 8
  • T:
    • T.CONFIDENTIALITY: 2
    • T.CONFIG: 3
    • T.CRASH: 1
    • T.EXHAUST: 3
    • T.INSTALL: 2
    • T.INTEGRITY: 3
    • T.INTERCEPT: 2
    • T.INTERR: 2
    • T.KEY_ACCESS: 2
    • T.KEY_GUESS: 3
    • T.LOSSOF: 3
    • T.MASQUERADE: 3
    • T.NOTRACE: 2
    • T.PRIVACY: 2
    • T.PRIVIL: 1
    • T.REPLAY: 3
    • T.SCREEN: 3
    • T.THREAT: 1
  • A:
    • A.CGA: 4
    • A.CSP: 4
    • A.SCA: 4
    • A.SCP: 1
  • OE:
    • OE.HID_VAD: 4
    • OE.SVD_AUTH: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 10
  • Gemalto:
    • Gemalto: 79
  • NXP:
    • NXP: 2
pdf_data/st_keywords/eval_facility
  • Serma:
    • SERMA: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 7
      • AES-256: 10
      • AES256: 2
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 4
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 2
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 2
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 6
      • SHA256: 1
  • SHA:
    • SHA2:
      • SHA-224: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS 1.2: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 2
  • RNG:
    • RND: 1
    • RNG: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 1
    • fault injection: 1
    • physical tampering: 4
  • SCA:
    • DPA: 1
    • Leak-Inherent: 1
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 15408: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS PUB 46-3: 1
    • FIPS180-2: 1
    • FIPS197: 2
    • FIPS46-3: 1
  • ICAO:
    • ICAO: 1
  • PKCS:
    • PKCS#1: 2
    • PKCS#3: 3
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. See Table 18: file sharing permissions configurable in a sharing template [142] Guest (G) Guest: 1
    • activities (through Print Screen system functionalities and video grabbing software) while viewing confidential documents. The Windows OS is indispensable on the END USER side in order to use this security function. [22: 1
    • and editable only in their BooleBox storage. [25] Watermark With BooleBox users can protect their confidential documents and the intellectual property of their shared files through an indelible watermark displaying key: 1
    • confidential information through e-mail in total security. With BooleBox it is possible to attach confidential documents to e-mails with the assurance that no one can intercept since the email message itself is: 1
pdf_data/st_metadata
  • /Author: Boole Server S.r.l.
  • /CreationDate: D:20200507102310Z00'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20200507102310Z00'00'
  • /Producer: Mac OS X 10.13.6 Quartz PDFContext
  • /Title: BooleBox on Premises v4.2 Security Target v1.5
  • pdf_file_size_bytes: 2607031
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/cc
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 85
  • /Author: Antoine de Lavernette
  • /CreationDate: D:20150723160335+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /Keywords: Security Target, CC, eTravel
  • /ModDate: D:20150723160335+02'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: MRTD
  • /Title: eTravel v1.0 Security Target MAÏA3
  • pdf_file_size_bytes: 1056655
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 60
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different