| name |
bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software Version: A0R50Y0-0100-G00-11 (System Controller), A0R50Y0-1D00-G00-10 (BIOS Controller) |
Connected eSE 5.3.4 v1.2 Platform (Revision 1.0) (ANSSI-CC-2025/04) |
| category |
Other Devices and Systems |
ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme |
JP |
FR |
| status |
archived |
active |
| not_valid_after |
09.12.2013 |
12.02.2030 |
| not_valid_before |
30.10.2008 |
12.02.2025 |
| cert_link |
|
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2025_04fr.pdf |
| report_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_erpt.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2025_04fr.pdf |
| st_link |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0190_est.pdf |
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2025_04en.pdf |
| manufacturer |
Konica Minolta Business Technologies, Inc |
THALES DIS FRANCE SA |
| manufacturer_web |
https://www.konicaminolta.com/ |
https://www.thalesgroup.com/en/europe/france |
| security_level |
EAL3 |
EAL4+, AVA_VAN.5, ALC_DVS.2, ALC_FLR.1 |
| dgst |
fe2f02fb20d5a072 |
d0c4cec3c348cb26 |
| heuristics/cert_id |
JISEC-CC-CRP-C0190 |
ANSSI-CC-2025/04 |
| heuristics/cert_lab |
[] |
[] |
| heuristics/cpe_matches |
{} |
{} |
| heuristics/verified_cpe_matches |
{} |
{} |
| heuristics/related_cves |
{} |
{} |
| heuristics/direct_transitive_cves |
{} |
{} |
| heuristics/indirect_transitive_cves |
{} |
{} |
| heuristics/extracted_sars |
ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_FSP.3, ALC_LCD.1, AVA_VLA.1, ASE_SPD.1, ATE_COV.2, ALC_CMC.3, ADV_TDS.2, ALC_DVS.1, ALC_CMS.3, AGD_OPE.1, ASE_TSS.1, ADV_ARC.1 |
ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_DPT.1, ASE_ECD.1, ALC_FLR.1, ADV_IMP.1, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 |
| heuristics/extracted_versions |
11, 501, 10, 0100, 421, 361 |
1.0, 1.2, 5.3.4 |
| heuristics/prev_certificates |
{} |
{} |
| heuristics/next_certificates |
{} |
{} |
| heuristics/report_references/directly_referenced_by |
{} |
{} |
| heuristics/report_references/directly_referencing |
{} |
NSCIB-CC-2300182-01-CR |
| heuristics/report_references/indirectly_referenced_by |
{} |
{} |
| heuristics/report_references/indirectly_referencing |
{} |
NSCIB-CC-2300182-01-CR |
| heuristics/scheme_data |
- cert_id: JISEC-CC-CRP-C0190
- certification_date: 01.10.2008
- claim: EAL3
- enhanced:
- assurance_level: EAL3
- cc_version: 3.1
- cert_link: https://www.ipa.go.jp/en/security/c0190_eimg.pdf
- description: PRODUCT DESCRIPTION Description of TOE TOE controls the entire operation of MFP, including the operation control processing and the image data management that are accepting from the panel of the main body of digital MFP (Multi Functional Peripheral, and hereinafter referred to as "MFP") or through the network. And TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in HDD for the danger of taking HDD that is the medium that stores the image data in MFP out illegally by using the HDD lock function loaded on the HDD. Besides, TOE has the deletion method to follow various overwrite deletion standards and it deletes all the data of HDD completely. TOE security functions TOE provides the following security functions. - Administrator Function - SNMP Administrator Function - Service Mode Function - User Function - User Box Function - Secure Print Function - Overwrite deletion Function for all area - Encryption Key Generation Function - HDD validation Function - CF validation Function - Authentication Failure Counter Reset Function - Trust Channel Function - S/MIME Encryption Processing Function - External server authentication operation support Function - Encryption kit operation support Function - HDD lock operation support Function - CF lock operation support Function
- evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
- product: Japanese: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software English: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Control Software
- product_type: Control Software for digital MFP
- report_link: https://www.ipa.go.jp/en/security/c0190_erpt.pdf
- target_link: https://www.ipa.go.jp/en/security/c0190_est.pdf
- toe_version: A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
- vendor: Konica Minolta Business Technologies, Inc.
- expiration_date: 01.12.2013
- revalidations: [frozendict({'date': '2009-01', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215_01.html'})]
- supplier: Konica Minolta Business Technologies, Inc.
- toe_japan_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 Zentai Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
- toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0190_it8215.html
- toe_overseas_name: bizhub 501 / bizhub 421 / bizhub 361 / ineo 501/ ineo 421 / ineo 361 / VarioLink 5022 / VarioLink 4222 / VarioLink 3622 Control Software A0R50Y0-0100-G00-11 (System Controller) A0R50Y0-1D00-G00-10 (BIOS Controller)
|
|
| heuristics/st_references/directly_referenced_by |
{} |
{} |
| heuristics/st_references/directly_referencing |
{} |
NSCIB-CC-2300182-01-CR |
| heuristics/st_references/indirectly_referenced_by |
{} |
{} |
| heuristics/st_references/indirectly_referencing |
{} |
NSCIB-CC-2300182-01-CR |
| heuristics/protection_profiles |
{} |
{} |
| maintenance_updates |
|
|
| protection_profiles |
|
|
| protection_profile_links |
{} |
{} |
| pdf_data/cert_filename |
|
Certificat-ANSSI-CC-2025_04fr.pdf |
| pdf_data/cert_frontpage |
|
|
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR.1: 1
- AVA:
|
| pdf_data/cert_keywords/cc_sfr |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
- Serma:
- Serma Safety & Security: 2
|
| pdf_data/cert_keywords/symmetric_crypto |
|
|
| pdf_data/cert_keywords/asymmetric_crypto |
|
|
| pdf_data/cert_keywords/pq_crypto |
|
|
| pdf_data/cert_keywords/hash_function |
|
|
| pdf_data/cert_keywords/crypto_scheme |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode |
|
|
| pdf_data/cert_keywords/ecc_curve |
|
|
| pdf_data/cert_keywords/crypto_engine |
|
|
| pdf_data/cert_keywords/tls_cipher_suite |
|
|
| pdf_data/cert_keywords/crypto_library |
|
|
| pdf_data/cert_keywords/vulnerability |
|
|
| pdf_data/cert_keywords/side_channel_analysis |
|
|
| pdf_data/cert_keywords/technical_report_id |
|
|
| pdf_data/cert_keywords/device_model |
|
|
| pdf_data/cert_keywords/tee_name |
|
|
| pdf_data/cert_keywords/os_name |
|
|
| pdf_data/cert_keywords/cplc_data |
|
|
| pdf_data/cert_keywords/ic_data_group |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/cert_keywords/javacard_version |
|
|
| pdf_data/cert_keywords/javacard_api_const |
|
|
| pdf_data/cert_keywords/javacard_packages |
|
|
| pdf_data/cert_keywords/certification_process |
|
|
| pdf_data/cert_metadata |
|
- /CreationDate: D:20250213155808+01'00'
- /Creator: Acrobat PDFMaker 23 pour Word
- /Keywords:
- /ModDate: D:20250213155922+01'00'
- /Producer: Adobe PDF Library 23.1.175
- pdf_file_size_bytes: 169332
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 2
|
| pdf_data/report_filename |
c0190_erpt.pdf |
ANSSI-CC-2025_04fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
- JP:
- CRP-C0190-01: 1
- Certification No. C0190: 1
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
- ALC:
- ALC_DVS.2: 1
- ALC_FLR: 1
- ALC_FLR.1: 2
- AVA:
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
- A:
- A.ADMIN: 1
- A.NETWORK: 1
- A.SECRET: 1
- A.SERVICE: 1
- A.SETTING: 1
- T:
- T.ACCESS-GROUP-B: 1
- T.ACCESS-GROUP-BOX: 1
- T.ACCESS-NET-SET: 1
- T.ACCESS-PRIVATE: 1
- T.ACCESS-PRIVATE-BOX: 1
- T.ACCESS-PUBLIC-: 1
- T.ACCESS-PUBLIC-BOX: 1
- T.ACCESS-SECURE-: 1
- T.ACCESS-SECURE-PRINT: 1
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTOR: 1
- T.BACKUP-RESTORE: 1
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STOR: 1
- T.BRING-OUT-STORAGE: 1
- T.DISCARD-MFP: 2
- T.UNEXPECTEC-TRANSMISSION: 1
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/pq_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/cipher_mode |
|
|
| pdf_data/report_keywords/ecc_curve |
|
|
| pdf_data/report_keywords/crypto_engine |
|
|
| pdf_data/report_keywords/tls_cipher_suite |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/technical_report_id |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/tee_name |
|
|
| pdf_data/report_keywords/os_name |
|
|
| pdf_data/report_keywords/cplc_data |
|
|
| pdf_data/report_keywords/ic_data_group |
|
|
| pdf_data/report_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 2
- CCMB-2007-09-002: 2
- CCMB-2007-09-003: 2
- CCMB-2007-09-004: 2
- X509:
|
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_keywords/javacard_api_const |
|
|
| pdf_data/report_keywords/javacard_packages |
|
|
| pdf_data/report_keywords/certification_process |
- ConfidentialDocument:
- body of MFP or through the network. TOE offers the protection function from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data stored in: 1
|
|
| pdf_data/report_metadata |
- /CreationDate: D:20081211163158+09'00'
- /ModDate: D:20081211163158+09'00'
- /Producer: Acrobat Distiller 8.1.0 (Windows)
- /Title: untitled
- pdf_file_size_bytes: 308979
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 35
|
|
| pdf_data/st_filename |
c0190_est.pdf |
Cible-ANSSI-CC-2025_04en.pdf |
| pdf_data/st_frontpage |
|
|
| pdf_data/st_keywords/cc_cert_id |
|
- NL:
- CC-1: 2
- CC-2: 3
- CC-3: 3
- NSCIB-CC-2300182-01: 1
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
- BSI:
- BSI-CC-PP-0084-2014: 1
- BSI-CC-PP-0099-V2-2020: 1
|
| pdf_data/st_keywords/cc_security_level |
|
- EAL:
- EAL4: 4
- EAL4 augmented: 2
- EAL4+: 2
- EAL6+: 1
|
| pdf_data/st_keywords/cc_sar |
- ADV:
- ADV_ARC.1: 1
- ADV_FSP.3: 1
- ADV_TDS.2: 1
- AGD:
- AGD_OPE.1: 1
- AGD_PRE.1: 1
- ALC:
- ALC_CMC.3: 1
- ALC_CMS.3: 1
- ALC_DVS.1: 1
- ALC_LCD.1: 1
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 1
- ASE_INT.1: 1
- ASE_OBJ.2: 1
- ASE_REQ.2: 1
- ASE_SPD.1: 1
- ASE_TSS.1: 1
- ATE:
- ATE_COV.2: 1
- ATE_DPT.1: 1
- ATE_FUN.1: 1
- ATE_IND.2: 1
- AVA:
|
- ADV:
- ADV_ARC: 1
- ADV_ARC.1: 5
- ADV_FSP.1: 3
- ADV_FSP.2: 2
- ADV_FSP.4: 9
- ADV_IMP.1: 4
- ADV_TDS.1: 2
- ADV_TDS.2: 1
- ADV_TDS.3: 5
- AGD:
- AGD_OPE.1: 9
- AGD_PRE.1: 3
- ALC:
- ALC_CMC.4: 1
- ALC_CMS.1: 1
- ALC_CMS.4: 1
- ALC_DEL.1: 1
- ALC_DVS.1: 1
- ALC_DVS.2: 4
- ALC_FLR.1: 4
- ALC_FLR.2: 1
- ALC_LCD.1: 3
- ALC_TAT.1: 3
- ASE:
- ASE_CCL.1: 1
- ASE_ECD.1: 4
- ASE_INT.1: 4
- ASE_OBJ.2: 2
- ASE_REQ.1: 2
- ASE_REQ.2: 1
- ASE_SPD.1: 3
- ASE_TSS.1: 1
- ATE:
- ATE_COV.1: 2
- ATE_COV.2: 3
- ATE_DPT.1: 2
- ATE_FUN.1: 5
- AVA:
|
| pdf_data/st_keywords/cc_sfr |
- FAU:
- FCS:
- FCS_CAP.1: 2
- FCS_CKM: 2
- FCS_CKM.1: 10
- FCS_CKM.1.1: 1
- FCS_CKM.2: 1
- FCS_CKM.4: 4
- FCS_COP.1: 9
- FCS_COP.1.1: 1
- FDP:
- FDP_ACC.1: 57
- FDP_ACC.1.1: 3
- FDP_ACF.1: 41
- FDP_ACF.1.1: 3
- FDP_ACF.1.2: 3
- FDP_ACF.1.3: 3
- FDP_ACF.1.4: 3
- FDP_ACP.1: 1
- FDP_IFC.1: 6
- FDP_ITC: 1
- FDP_ITC.1: 4
- FDP_ITC.2: 2
- FDP_RIP.1: 1
- FDP_UAU.7: 1
- FIA:
- FIA_AFL.1: 61
- FIA_AFL.1.1: 8
- FIA_AFL.1.2: 8
- FIA_ATD.1: 26
- FIA_ATD.1.1: 1
- FIA_EID: 2
- FIA_EID.1: 16
- FIA_EID.1.1: 3
- FIA_EID.1.2: 1
- FIA_NEW.1.2: 2
- FIA_SOS: 1
- FIA_SOS.1: 47
- FIA_SOS.1.1: 6
- FIA_SOS.2: 9
- FIA_SOS.2.1: 1
- FIA_SOS.2.2: 1
- FIA_SSL.3: 1
- FIA_UAU.1: 23
- FIA_UAU.2: 67
- FIA_UAU.2.1: 6
- FIA_UAU.6: 11
- FIA_UAU.6.1: 1
- FIA_UAU.7: 18
- FIA_UAU.7.1: 1
- FIA_UID.1: 31
- FIA_UID.2: 49
- FIA_UID.2.1: 7
- FIA_USB.1: 22
- FIA_USB.1.1: 1
- FIA_USB.1.2: 1
- FIA_USB.1.3: 1
- FMT:
- FMT_MAS.1: 1
- FMT_MOF.1: 31
- FMT_MOF.1.1: 4
- FMT_MSA: 3
- FMT_MSA.1: 32
- FMT_MSA.1.1: 3
- FMT_MSA.3: 31
- FMT_MSA.3.1: 5
- FMT_MSA.3.2: 5
- FMT_MTD.1: 101
- FMT_MTD.1.1: 12
- FMT_SMF.1: 107
- FMT_SMF.1.1: 1
- FMT_SMR.1: 164
- FMT_SMR.1.1: 6
- FMT_SMR.1.2: 6
- FMT_SMS.1: 1
- FMT_SOS.1: 1
- FTA:
- FTA_SSL.3: 6
- FTA_SSL.3.1: 1
- FTP:
- FTP_ITC.1: 5
- FTP_ITC.1.1: 1
- FTP_ITC.1.2: 1
- FTP_ITC.1.3: 1
|
- FAU:
- FAU_ARP.1: 15
- FAU_ARP.1.1: 2
- FAU_GEN: 1
- FAU_SAA.1: 3
- FAU_SAR: 2
- FAU_SAS: 1
- FAU_SAS.1: 1
- FCO:
- FCO_NRO: 28
- FCO_NRO.2: 9
- FCO_NRR: 5
- FCO_NRR.1: 3
- FCS:
- FCS_CKM: 72
- FCS_CKM.1: 31
- FCS_CKM.2: 9
- FCS_CKM.4: 65
- FCS_CKM.4.1: 1
- FCS_CKM.5: 7
- FCS_CKM.5.1: 1
- FCS_COP: 160
- FCS_COP.1: 31
- FCS_RNG: 1
- FCS_RNG.1: 11
- FCS_RNG.1.1: 2
- FCS_RNG.1.2: 2
- FDP:
- FDP_ACC: 66
- FDP_ACC.1: 27
- FDP_ACC.2: 5
- FDP_ACF: 58
- FDP_ACF.1: 38
- FDP_IFC: 67
- FDP_IFC.1: 23
- FDP_IFC.2: 6
- FDP_IFF: 53
- FDP_IFF.1: 27
- FDP_ITC: 32
- FDP_ITC.1: 23
- FDP_ITC.2: 33
- FDP_ITT.1: 1
- FDP_RIP: 127
- FDP_RIP.1: 9
- FDP_ROL: 32
- FDP_ROL.1: 11
- FDP_SDC.1: 1
- FDP_SDI: 25
- FDP_SDI.2: 10
- FDP_SDI.2.2: 1
- FDP_UCT: 6
- FDP_UCT.1: 1
- FDP_UIT: 9
- FDP_UIT.1: 2
- FIA:
- FIA_AFL: 11
- FIA_AFL.1: 8
- FIA_API.1: 1
- FIA_ATD: 13
- FIA_ATD.1: 3
- FIA_UAU: 27
- FIA_UAU.1: 4
- FIA_UAU.4: 1
- FIA_UID: 34
- FIA_UID.1: 14
- FIA_UID.2: 1
- FIA_USB: 7
- FIA_USB.1: 3
- FMT:
- FMT_LIM: 6
- FMT_MSA: 189
- FMT_MSA.1: 19
- FMT_MSA.2: 2
- FMT_MSA.3: 30
- FMT_MTD: 38
- FMT_MTD.1: 5
- FMT_MTD.3: 2
- FMT_SMF: 78
- FMT_SMF.1: 28
- FMT_SMF.1.1: 1
- FMT_SMR: 82
- FMT_SMR.1: 43
- FMT_SMR.1.1: 1
- FMT_SMR.1.2: 1
- FPR:
- FPR_UNO: 12
- FPR_UNO.1: 14
- FPR_UNO.1.1: 1
- FPT:
- FPT_FLS: 58
- FPT_FLS.1: 7
- FPT_ITT.1: 1
- FPT_PHP.3: 1
- FPT_RCV: 24
- FPT_RCV.3: 10
- FPT_RCV.4: 1
- FPT_STM: 3
- FPT_STM.1: 5
- FPT_TDC: 9
- FPT_TDC.1: 9
- FPT_TDC.1.1: 1
- FPT_TDC.1.2: 1
- FRU:
- FTP:
- FTP_ITC: 34
- FTP_ITC.1: 13
- FTP_TRP: 10
- FTP_TRP.1: 11
|
| pdf_data/st_keywords/cc_claims |
- A:
- A.ADMIN: 3
- A.NETWORK: 4
- A.SECRET: 2
- A.SERVICE: 2
- A.SETTING: 3
- O:
- O.AUTH-CAPABILITY: 9
- O.CHECK-CF: 4
- O.CHECK-HDD: 6
- O.CONFIG: 11
- O.CRYPT-KEY: 5
- O.CRYPTO-CAPABILITY: 4
- O.CRYPTO-MAIL: 4
- O.GROUP-BOX: 5
- O.LOCK-CF-CAPABILITY: 4
- O.LOCK-HDD-CAPABILITY: 6
- O.OVERWRITE-ALL: 6
- O.PRIVATE-BOX: 5
- O.PUBLIC-BOX: 7
- O.REGISTERED-USER: 13
- O.SECURE-PRINT: 7
- O.TRUSTED-PASS: 6
- OE:
- OE.ADMIN: 2
- OE.CRYPT: 3
- OE.CRYPTO: 1
- OE.FEED-BACK: 10
- OE.LOCK-CF: 3
- OE.LOCK-HDD: 3
- OE.NETWORK: 2
- OE.SECRET: 2
- OE.SERVER: 5
- OE.SERVICE: 2
- OE.SESSION: 2
- OE.SETTING-SECURITY: 2
- T:
- T.ACCESS-GROUP-BOX: 3
- T.ACCESS-NET-SETTING: 1
- T.ACCESS-PRIVATE-BOX: 3
- T.ACCESS-PUBLIC-BOX: 2
- T.ACCESS-SECURE-PRINT: 2
- T.ACCESS-SETTING: 2
- T.BACKUP-RESTORE: 3
- T.BRING-OUT-CF: 2
- T.BRING-OUT-STORAGE: 2
- T.DISCARD-MFP: 3
- T.UNEXPECTEC-TRANSMISSION: 1
- T.UNEXPECTED-TRANSMISSION: 1
|
- A:
- A.ADMIN: 3
- A.APPS-PROVIDER: 3
- A.CAP_FILE: 4
- A.CONTROLLING-: 1
- A.CONTROLLING-AUTHORITY: 2
- A.ISSUER: 3
- A.KEY-ESCROW: 3
- A.KEYS-PROT: 3
- A.OS-UPDATE-: 1
- A.OS-UPDATE-EVIDENCE: 2
- A.PERSONALISER: 3
- A.PRODUCTION: 4
- A.SCP-SUPP: 3
- A.SECURE_ACODE_: 1
- A.SECURE_ACODE_MANAGEMENT: 2
- A.VERIFICA: 1
- A.VERIFICATION: 2
- A.VERIFICATION-: 1
- A.VERIFICATION-AUTHORITY: 2
- D:
- D.API_DATA: 3
- D.APP_CODE: 7
- D.APP_C_DATA: 5
- D.APP_I_DATA: 9
- D.APP_KEYS: 9
- D.APSD_DAP_KEYS: 1
- D.APSD_KEYS: 3
- D.CASD_DAP_KEYS: 1
- D.CASD_KEYS: 1
- D.CCCM_KEYS: 1
- D.CLFDB-DK: 1
- D.CONFIRMATION-: 1
- D.CONFIRMATION-DATA: 1
- D.CRYPTO: 4
- D.CTL_PRO: 5
- D.CTL_REGISTRY: 5
- D.CVM_MGMT_STATE: 3
- D.CVM_PIN: 3
- D.DAP_BLOCK: 1
- D.ELF_AID: 3
- D.ELF_APP_INS: 3
- D.ELF_RG_DATA: 1
- D.ELF_SESSION_ST: 2
- D.GP_CODE: 1
- D.GP_REGISTRY: 6
- D.GS-PARAMETERS: 1
- D.ISD_KEYS: 3
- D.JCS_CODE: 6
- D.JCS_DATA: 10
- D.NEW_ELF: 3
- D.OLD_ELF: 3
- D.OS: 1
- D.OS-: 3
- D.OS-UPDATE-CODE-: 1
- D.OS-UPDATE-CODE-ID: 1
- D.OS-UPDATE_ADDITIONALCODE: 3
- D.OS-UPDATE_DEC-: 1
- D.OS-UPDATE_DEC-KEY: 1
- D.OS-UPDATE_SGNVER-KEY: 1
- D.PIN: 6
- D.RECEIPT-: 1
- D.RECEIPT-GENERATION-KEY: 1
- D.SEC_DATA: 8
- D.TOE_IDENTIFIER: 1
- D.TOKEN-: 1
- D.TOKEN-VERIFICATION-KEY: 1
- O:
- O.ALARM: 16
- O.APPLET: 16
- O.APPLI-AUTH: 5
- O.ARRAY_VIEWS_: 1
- O.ARRAY_VIEWS_CONFID: 4
- O.ARRAY_VIEWS_I: 1
- O.ARRAY_VIEWS_INTEG: 4
- O.CARD-: 11
- O.CARD-MANAGEMENT: 22
- O.CCCM: 9
- O.CIPHER: 9
- O.CLFDB-DECIPHER: 5
- O.CODE_: 1
- O.CODE_CAP_FILE: 12
- O.CODE_PKG: 1
- O.COMM-: 1
- O.COMM-AUTH: 10
- O.COMM-CONFIDENTIALITY: 7
- O.COMM-INTEGRITY: 10
- O.CONFID-OS-: 1
- O.CONFID-OS-UPDATE: 6
- O.CRS_COUNTERS: 5
- O.CRS_PRIVILEGES: 5
- O.CRT-MNGT: 5
- O.CTL_REGISTRY: 5
- O.CTL_SC: 5
- O.CVM-BLOCK: 9
- O.CVM-MGMT: 9
- O.DELETION: 5
- O.DOMAIN-RIGHTS: 9
- O.ELF_APP_DATA: 7
- O.ELF_AUTHORISED: 5
- O.ELF_DATA_PRO: 5
- O.ELF_DELE_IRR: 5
- O.ELF_INTEGRITY: 5
- O.ELF_SESSION: 7
- O.FIREWALL: 19
- O.GLOBAL-CVM: 5
- O.GLOBAL_ARRAY: 2
- O.GLOBAL_ARRAYS_CONFID: 6
- O.GLOBAL_ARRAYS_INTEG: 6
- O.INSTALL: 11
- O.JAVAO: 1
- O.JAVAOB: 4
- O.JAVAOBJE: 1
- O.JAVAOBJECT: 42
- O.KEY-MNGT: 9
- O.LC-MANAGEMENT: 6
- O.LOAD: 11
- O.MTC-CTR-: 1
- O.MTC-CTR-MNGT: 4
- O.NATIVE: 11
- O.NO-KEY-REUSE: 5
- O.OBJ-DELETION: 5
- O.OPERATE: 23
- O.PIN-: 1
- O.PIN-MNGT: 7
- O.PRIVILEGES-: 1
- O.PRIVILEGES-MANAGEMENT: 4
- O.REALLOCATION: 7
- O.RECEIPT: 5
- O.RESOURCES: 7
- O.RND: 1
- O.RNG: 8
- O.SCP: 45
- O.SECURE_AC_ACTIV: 1
- O.SECURE_AC_ACTIVATION: 6
- O.SECURE_LOAD_AC: 1
- O.SECURE_LOAD_ACODE: 10
- O.SECURITY-: 2
- O.SECURITY-DOMAINS: 3
- O.SENSITIVE_ARR: 1
- O.SENSITIVE_ARRAYS_INTEG: 4
- O.SENSITIVE_RES: 1
- O.SENSITIVE_RESULTS_INTEG: 4
- O.SID: 15
- O.TOE-: 1
- O.TOE_IDENTIFICATI: 1
- O.TOE_IDENTIFICATION: 6
- O.TOKEN: 5
- O.TRANSACTION: 7
- OE:
- OE.ADMIN: 3
- OE.AID-MANAGEMENT: 3
- OE.AP-KEYS: 3
- OE.APPLICATIONS: 3
- OE.APPS-PROVIDER: 3
- OE.CA-KEYS: 3
- OE.CAP_FILE: 6
- OE.CLFDB-ENC-PR: 3
- OE.CODE-: 5
- OE.CODE-EVIDENCE: 12
- OE.CONTROLLING-: 1
- OE.CONTROLLING-AUTHORITY: 2
- OE.DAP_BLOCK_GEN: 3
- OE.ISD-KEYS: 3
- OE.ISSUER: 3
- OE.KEY-CHANGE: 3
- OE.KEY-ESCROW: 3
- OE.KEY-GENERATION: 3
- OE.KEYS-PROT: 3
- OE.LOADING: 3
- OE.OS-UPDATE-: 1
- OE.OS-UPDATE-ENCRYPTION: 4
- OE.OS-UPDATE-EVIDENCE: 3
- OE.PERSONALISER: 3
- OE.PRODUCTION: 4
- OE.RECEIPT-VER: 3
- OE.SCP: 3
- OE.SCP-SUPP: 3
- OE.SECURE_ACODE_MANA: 1
- OE.SECURE_ACODE_MANAGEMENT: 2
- OE.SERVERS: 3
- OE.TOKEN-GEN: 3
- OE.VERIFICATION: 35
- OE.VERIFICATION-: 1
- OE.VERIFICATION-AUTHORITY: 2
- OP:
- OP.ARRAY_AASTORE: 3
- OP.ARRAY_ACCESS: 4
- OP.ARRAY_LENGTH: 4
- OP.ARRAY_T_ALOAD: 3
- OP.ARRAY_T_ASTORE: 3
- OP.CREATE: 7
- OP.DELETE_APPLET: 4
- OP.DELETE_CAP_FILE: 3
- OP.DELETE_CAP_FILE_APPLET: 3
- OP.INSTANCE_FIELD: 3
- OP.INVK_INTERFACE: 7
- OP.INVK_VIRTUAL: 6
- OP.JAVA: 5
- OP.PUT: 5
- OP.PUTFIELD: 1
- OP.PUTSTATIC: 1
- OP.THROW: 5
- OP.TYPE_ACCESS: 5
- OSP:
- OSP.ADDITIONAL_CODE_EN: 1
- OSP.ADDITIONAL_CODE_ENCRYPTION: 2
- OSP.ADDITIONAL_CODE_SIG: 1
- OSP.ADDITIONAL_CODE_SIGNING: 2
- OSP.AID-MANAGEMENT: 3
- OSP.APPLICATIONS: 3
- OSP.APSD-KEYS: 3
- OSP.ATOMIC_ACTIVATION: 3
- OSP.CASD-KEYS: 3
- OSP.CCCM: 3
- OSP.CLFDB-ENC-PR: 3
- OSP.DAP_BLOCK_GEN: 3
- OSP.ELF_DELE_OP: 3
- OSP.ISD-KEYS: 3
- OSP.KEY-CHANGE: 3
- OSP.KEY-GENERATION: 3
- OSP.LOADING: 3
- OSP.RECEIPT-VER: 3
- OSP.SECURITY-DOMAINS: 3
- OSP.SERVERS: 3
- OSP.TOE_IDENTIFICATION: 3
- OSP.TOKEN-GEN: 3
- OSP.VERIFICATION: 3
- R:
- T:
- T.BRUTE-FORCE-CVM: 3
- T.BRUTE-FORCE-SCP: 3
- T.CLFDB-DISC: 3
- T.COM-EXPLOIT: 4
- T.CONFID-APPLI-: 1
- T.CONFID-APPLI-DATA: 3
- T.CONFID-JCS-: 2
- T.CONFID-JCS-CODE: 2
- T.CONFID-JCS-DATA: 2
- T.CONFID-OS-UPDATE-: 1
- T.CONFID-OS-UPDATE-LOAD: 2
- T.COUNTERS-FREEZE: 3
- T.CRS-BYPASS: 3
- T.CTL-AUTH-FORGE: 3
- T.CTL-REGISTRY-: 1
- T.CTL-REGISTRY-OVERWRITE: 2
- T.CVM-IMPERSONATE: 3
- T.CVM-UPDATE: 3
- T.DELETION: 4
- T.ELF-DATA-ACCESS: 3
- T.ELF-DATA-INTEGRITY: 3
- T.ELF-ILL-COMMAND: 3
- T.ELF-RES-DATA: 3
- T.ELF-SESSION: 3
- T.ELF-UNAUTHORISED: 3
- T.ELF-VERSION: 3
- T.EXE-CODE: 7
- T.FAKE-SGNVER-KEY: 3
- T.INSTALL: 4
- T.INTEG-APPLI-: 4
- T.INTEG-APPLI-CODE: 4
- T.INTEG-APPLI-DATA: 5
- T.INTEG-JCS-: 1
- T.INTEG-JCS-CODE: 2
- T.INTEG-JCS-DATA: 3
- T.INTEG-OS-UPDATE-: 1
- T.INTEG-OS-UPDATE-LOAD: 2
- T.LIFE-CYCLE: 4
- T.NATIVE: 3
- T.OBJ-DELETION: 3
- T.PHYSICAL: 9
- T.RECEIPT: 3
- T.RESOURCES: 3
- T.RND: 1
- T.SID: 8
- T.TOKEN: 3
- T.UNAUTHORISED-: 1
- T.UNAUTHORISED-CARD-MGMT: 4
- T.UNAUTHORISED-TOE-: 1
- T.UNAUTHORISED-TOE-CODE-: 1
- T.UNAUTHORISED-TOE-CODE-UPDATE: 1
- T.WRONG-UPDATE-: 1
- T.WRONG-UPDATE-STATE: 2
|
| pdf_data/st_keywords/vendor |
|
- STMicroelectronics:
- Thales:
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
- AES_competition:
- DES:
- constructions:
- MAC:
- CBC-MAC: 2
- CMAC: 4
- HMAC: 15
- KMAC: 3
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
- SHA:
- SHA1:
- SHA2:
- SHA-224: 1
- SHA-256: 5
- SHA-384: 5
- SHA-512: 4
- SHA224: 3
- SHA256: 4
- SHA384: 4
- SHA512: 4
- SHA3:
- SHA3-224: 1
- SHA3-256: 1
- SHA3-384: 1
- SHA3-512: 1
|
| pdf_data/st_keywords/crypto_scheme |
|
- KA:
- Key Agreement: 8
- Key agreement: 5
- KEX:
- MAC:
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
- TLS:
- TLS_PSK_WITH_AES_128_CBC_S: 1
- TLS_PSK_WITH_NULL_SHA: 1
- TLS_PSK_WITH_NULL_SHA256: 1
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
- FI:
- Malfunction: 5
- malfunction: 4
- physical tampering: 1
- SCA:
- DPA: 1
- Leak-Inherent: 3
- Physical Probing: 2
- physical probing: 3
- side channel: 1
- other:
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/device_model |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
- CC:
- CCMB-2006-09-001: 1
- CCMB-2007-09-002: 1
- CCMB-2007-09-003: 1
- CCMB-2007-09-004: 1
- FIPS:
- FIPS 180-2: 1
- FIPS 186: 1
- FIPS 186-1: 1
- FIPS 186-2: 4
- FIPS PUB 197: 3
- X509:
|
- BSI:
- CC:
- CCMB-2017-04-001: 1
- CCMB-2017-04-002: 1
- CCMB-2017-04-003: 1
- FIPS:
- FIPS 180: 1
- FIPS 180-4: 5
- FIPS 197: 4
- FIPS 197126: 1
- FIPS 198: 2
- FIPS 202: 4
- FIPS PUB 180-4: 1
- FIPS PUB 186-4: 2
- FIPS PUB 186-4184: 1
- FIPS PUB 197: 3
- FIPS PUB 46-3: 2
- FIPS PUB 81: 2
- ICAO:
- ISO:
- ISO/IEC 10116: 4
- ISO/IEC 14888-2: 2
- ISO/IEC 18032: 4
- ISO/IEC 18032:2020: 1
- ISO/IEC 18033-3: 2
- ISO/IEC 3309206: 2
- ISO/IEC 9796-2: 1
- ISO/IEC 9797-1: 7
- ISO/IEC 9797-2: 2
- PKCS:
- PKCS #1: 1
- PKCS#1: 9
- PKCS#5: 1
- PKCS#5157: 1
- PKCS#5161: 1
- RFC:
- RFC 5246: 2
- RFC 5758: 2
- RFC 5869: 2
- RFC2104: 2
- RFC2409: 1
- RFC2409174: 1
- RFC3610165: 1
- SCP:
- SCP02: 16
- SCP03: 13
- SCP10: 2
- SCP11: 13
- SCP22: 2
- SCP80: 12
- SCP81: 11
- X509:
|
| pdf_data/st_keywords/javacard_version |
|
- GlobalPlatform:
- JavaCard:
|
| pdf_data/st_keywords/javacard_api_const |
|
- ALG:
- AES:
- ALG_AES_BLOCK_128_CBC_NOPAD: 2
- ALG_AES_BLOCK_128_ECB_NOPAD: 2
- ALG_AES_CBC_ISO9797_M1: 2
- ALG_AES_CBC_ISO9797_M2: 2
- ALG_AES_CBC_PKCS5: 2
- ALG_AES_CCM: 2
- ALG_AES_CMAC_128: 4
- ALG_AES_CTR: 2
- ALG_AES_ECB_ISO9797_M1: 2
- ALG_AES_ECB_ISO9797_M2: 2
- ALG_AES_ECB_PKCS5: 2
- ALG_AES_GCM: 2
- ALG_AES_MAC_128_NOPAD: 2
- ALG_AES_MAC_192_NOPAD: 1
- ALG_AES_MAC_256_NOPAD: 1
- DES:
- ALG_DES_CBC_ISO9797_M1: 2
- ALG_DES_CBC_ISO9797_M2: 2
- ALG_DES_CBC_NOPAD: 2
- ALG_DES_CBC_PKCS5: 2
- ALG_DES_ECB_ISO9797_M1: 2
- ALG_DES_ECB_ISO9797_M2: 2
- ALG_DES_ECB_NOPAD: 2
- ALG_DES_ECB_PKCS5: 2
- ALG_DES_MAC4_ISO9797_1_M1_ALG3: 2
- ALG_DES_MAC4_ISO9797_1_M2_ALG3: 2
- ALG_DES_MAC4_ISO9797_M1: 2
- ALG_DES_MAC4_ISO9797_M2: 2
- ALG_DES_MAC4_NOPAD: 2
- ALG_DES_MAC4_PKCS5: 2
- ALG_DES_MAC8_ISO9797_1_M1_ALG3: 2
- ALG_DES_MAC8_ISO9797_1_M2_ALG3: 2
- ALG_DES_MAC8_ISO9797_M1: 2
- ALG_DES_MAC8_ISO9797_M2: 2
- ALG_DES_MAC8_NOPAD: 2
- ALG_DES_MAC8_PKCS5: 2
- EC:
- ALG_EC_FP: 6
- ALG_EC_SVDP_DHC_KDF: 2
- ALG_EC_SVDP_DHC_PLAIN: 1
- ALG_EC_SVDP_DH_KDF: 2
- ALG_EC_SVDP_DH_PLAIN: 1
- ALG_EC_SVDP_DH_PLAIN_XY: 2
- ECDSA:
- ALG_ECDSA_SHA: 2
- ALG_ECDSA_SHA_224: 2
- ALG_ECDSA_SHA_256: 2
- ALG_ECDSA_SHA_384: 2
- ALG_ECDSA_SHA_512: 2
- HMAC:
- ALG_HMAC_SHA1: 8
- ALG_HMAC_SHA_256: 8
- ALG_HMAC_SHA_384: 2
- ALG_HMAC_SHA_512: 2
- ISO3309:
- ALG_ISO3309_CRC16: 2
- ALG_ISO3309_CRC32: 2
- RSA:
- ALG_RSA_NOPAD: 2
- ALG_RSA_PKCS1: 1
- ALG_RSA_PKCS1_OAEP: 2
- ALG_RSA_SHA_224_PKCS1: 2
- ALG_RSA_SHA_224_PKCS1_PSS: 2
- ALG_RSA_SHA_256_PKCS1: 2
- ALG_RSA_SHA_256_PKCS1_PSS: 2
- ALG_RSA_SHA_384_PKCS1: 2
- ALG_RSA_SHA_384_PKCS1_PSS: 2
- ALG_RSA_SHA_512_PKCS1: 2
- ALG_RSA_SHA_512_PKCS1_PSS: 2
- ALG_RSA_SHA_ISO9796: 2
- ALG_RSA_SHA_ISO9796_MR: 2
- ALG_RSA_SHA_PKCS1: 2
- ALG_RSA_SHA_PKCS1_PSS: 2
- ALG_RSA_SHA_RFC2409: 2
- SHA:
- ALG_SHA_224: 4
- ALG_SHA_256: 6
- ALG_SHA_384: 4
- ALG_SHA_512: 4
- SHA3:
- ALG_SHA3_224: 4
- ALG_SHA3_256: 4
- ALG_SHA3_384: 4
- ALG_SHA3_512: 4
- curves:
- BRAINPOOLP192R1: 1
- BRAINPOOLP224R1: 1
- BRAINPOOLP256R1: 2
- BRAINPOOLP256T1: 1
- BRAINPOOLP320R1: 2
- BRAINPOOLP320T1: 1
- BRAINPOOLP384R1: 2
- BRAINPOOLP384T1: 1
- BRAINPOOLP512R1: 2
- BRAINPOOLP512T1: 1
- SECP192R1: 1
- SECP256R1: 2
- SECP384R1: 1
- SECP521R1: 2
- misc:
- CIPHER_AES_CCM: 2
- CIPHER_AES_GCM: 2
- LENGTH_AES_128: 2
- LENGTH_EC_FP_160: 3
- LENGTH_EC_FP_192: 2
- LENGTH_EC_FP_224: 3
- LENGTH_EC_FP_256: 2
- LENGTH_EC_FP_384: 3
- LENGTH_EC_FP_521: 2
- LENGTH_HMAC_SHA_1_BLOCK_64: 1
- LENGTH_HMAC_SHA_256_BLOCK_64: 1
- LENGTH_HMAC_SHA_384_BLOCK_128: 1
- LENGTH_HMAC_SHA_384_BLOCK_64: 1
- LENGTH_HMAC_SHA_512_BLOCK_128: 1
- LENGTH_HMAC_SHA_512_BLOCK_64: 1
- LENGTH_RSA_1024: 1
- LENGTH_RSA_1536: 1
- LENGTH_RSA_2048: 1
- LENGTH_SHA: 8
- LENGTH_SHA3_224: 2
- LENGTH_SHA3_384: 2
- LENGTH_SHA_224: 2
- LENGTH_SHA_384: 2
- PAD_PKCS1_OAEP: 1
- PAD_PKCS1_OAEP_SHA256: 1
- PAD_PKCS1_OAEP_SHA3_256: 1
- PAD_PKCS1_OAEP_SHA3_512: 1
- PAD_PKCS1_OAEP_SHA512: 1
- SIG_CIPHER_AES_CMAC128: 2
- SIG_CIPHER_AES_MAC128: 2
- SIG_CIPHER_DES_MAC4: 2
- SIG_CIPHER_DES_MAC8: 2
- SIG_CIPHER_ECDSA: 2
- SIG_CIPHER_ECDSA_PLAIN: 2
- SIG_CIPHER_HMAC: 2
- SIG_CIPHER_RSA: 2
- TYPE_ACCESS: 5
- TYPE_EC_FP_PRIVATE: 6
- TYPE_EC_FP_PRIVATE_TRANSIENT_RESET: 1
- TYPE_HMAC: 6
- TYPE_HMAC_TRANSIENT_RESET: 1
|
| pdf_data/st_keywords/javacard_packages |
|
- javacard:
- javacard.framework: 5
- javacard.security: 8
- javacardx:
- javacardx.crypto: 1
- javacardx.framework.time: 1
- javacardx.security: 3
- javacardx.security.cert: 1
- javacardx.security.util: 2
|
| pdf_data/st_keywords/certification_process |
- ConfidentialDocument:
- the main body of MFP or through the network. TOE offers the protection from exposure of the highly confidential document stored in the MFP. Moreover, TOE can prevent the unauthorized access to the image data written in: 1
|
- OutOfScope:
- GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1: 1
- of software patches (GemActivate). The platform implements the following modes, but they are out of scope of the TOE: ▪ mEAC v1. ▪ Integrated mapping (DH and ECDH). ▪ Generic mapping (DH) ▪ PACE and mEAC: 1
- out of scope: 3
- protection of the confidentiality and integrity of user data, and for entity authentication. CSP is out of scope of the TOE. CSP provides service, including: Connected eSE 5.3.4 v1.2 Platform Security Target: 1
- v1.2 Platform Security Target Lite © Copyright Thales DIS France SAS - 2024 Page: 62 / 171 point is out of scope of this Protection Profile, though. Finally, the objectives O.SCP.RECOVERY and O.SCP.SUPPORT are: 1
|
| pdf_data/st_metadata |
- /Author: e02518
- /CreationDate: D:20081205143523+09'00'
- /Creator: PScript5.dll Version 5.2
- /ModDate: D:20081205143523+09'00'
- /Producer: Acrobat Distiller 7.0.5 (Windows)
- /Title: Microsoft Word - 【C0190】英文ST掲載用081205.doc
- pdf_file_size_bytes: 735960
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 108
|
- /CreationDate: D:20241031112531+01'00'
- /Creator: Microsoft® Word for Microsoft 365
- /ModDate: D:20241031112531+01'00'
- /Producer: Microsoft® Word for Microsoft 365
- pdf_file_size_bytes: 2293709
- pdf_hyperlinks: {}
- pdf_is_encrypted: False
- pdf_number_of_pages: 171
|
| state/cert/convert_garbage |
None |
None |
| state/cert/convert_ok |
False |
True |
| state/cert/download_ok |
False |
True |
| state/cert/extract_ok |
False |
True |
| state/cert/pdf_hash |
Different |
Different |
| state/cert/txt_hash |
Different |
Different |
| state/report/convert_garbage |
None |
None |
| state/report/convert_ok |
True |
True |
| state/report/download_ok |
True |
True |
| state/report/extract_ok |
True |
True |
| state/report/pdf_hash |
Different |
Different |
| state/report/txt_hash |
Different |
Different |
| state/st/convert_garbage |
None |
None |
| state/st/convert_ok |
True |
True |
| state/st/download_ok |
True |
True |
| state/st/extract_ok |
True |
True |
| state/st/pdf_hash |
Different |
Different |
| state/st/txt_hash |
Different |
Different |