This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| VESTEL SMART TV COMMON FIRMWARE V0.1 None |
ID-One COSMO X Code SAAAAR : 093363 ANSSI-CC-2021/29 |
|
|---|---|---|
| name | VESTEL SMART TV COMMON FIRMWARE V0.1 | ID-One COSMO X Code SAAAAR : 093363 |
| category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | TR | FR |
| not_valid_after | 27.10.2023 | 17.04.2023 |
| not_valid_before | 27.10.2023 | 05.07.2021 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Vestel.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_29.pdf |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Vestel%20Smart%20Tv%20Firmware%20V.1.0._CR.docx | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_29.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Embedded%20Common%20Firmware%20for%20Vestel%20Smart%20TVs%20V0.1%20Security%20Target_v1.3.docx | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_29en.pdf |
| manufacturer | Vestel A.S. | Idemia |
| manufacturer_web | https://www.vestel.com.tr | https://www.idemia.com |
| security_level | EAL2 | ALC_TAT.3, ATE_COV.3, ALC_CMC.5, AVA_VAN.5, ADV_IMP.2, ALC_DVS.2, ADV_TDS.5, EAL5+, ATE_FUN.2, ALC_FLR.1 |
| dgst | 010e49c8a813d92a | fecd58cf2be7914f |
| heuristics/cert_id | ANSSI-CC-2021/29 | |
| heuristics/extracted_sars | {} | ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ADV_INT.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ALC_COV.3, ASE_ECD.1, ALC_FLR.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions | 0.1 | 093363 |
| heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2022/34v2, ANSSI-CC-2023/29, NSCIB-CC-0362720-CR, NSCIB-CC-0362721-CR, ANSSI-CC-2022/16, ANSSI-CC-2022/14, ANSSI-CC-2022/36, ANSSI-CC-2021/36, ANSSI-CC-2022/34, ANSSI-CC-2022/15, ANSSI-CC-2022/18, ANSSI-CC-2022/17 |
| heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-1107-2020 |
| heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2022/16v2, ANSSI-CC-2022/34v2, ANSSI-CC-2023/29, ANSSI-CC-2022/18v2, NSCIB-CC-0362720-CR, NSCIB-CC-0362721-CR, ANSSI-CC-2022/14v2, ANSSI-CC-2022/16, ANSSI-CC-2022/14, ANSSI-CC-2022/15v2, ANSSI-CC-2022/36, ANSSI-CC-2021/36, ANSSI-CC-2022/34, ANSSI-CC-2022/15, ANSSI-CC-2022/18, ANSSI-CC-2022/17v2, ANSSI-CC-2022/17, ANSSI-CC-2021/36v2 |
| heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-1107-2020 |
| heuristics/st_references/directly_referenced_by | {} | NSCIB-CC-0362720-CR, NSCIB-CC-0362721-CR, ANSSI-CC-2022/16, ANSSI-CC-2022/14, ANSSI-CC-2022/36, ANSSI-CC-2021/36, ANSSI-CC-2022/34, ANSSI-CC-2022/15, ANSSI-CC-2022/18, ANSSI-CC-2022/17 |
| heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-1107-2020 |
| heuristics/st_references/indirectly_referenced_by | {} | NSCIB-CC-0362720-CR, NSCIB-CC-0362721-CR, ANSSI-CC-2022/16, ANSSI-CC-2022/14, ANSSI-CC-2022/36, ANSSI-CC-2021/36, ANSSI-CC-2022/34, ANSSI-CC-2022/15, ANSSI-CC-2022/18, ANSSI-CC-2023/24, ANSSI-CC-2022/17, ANSSI-CC-2021/36v2 |
| heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-1107-2020 |
| heuristics/protection_profiles | {} | 94167fd161e87d71 |
| maintenance_updates |
|
|
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0099b_pdf.pdf |
| pdf_data/cert_filename | Vestel.pdf | certificat-2021_29.pdf |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_claims |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | Vestel Smart Tv Firmware V.1.0._CR.docx | anssi-cc-2021_29.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr | ||
| pdf_data/report_keywords/cc_claims | ||
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto | ||
| pdf_data/report_keywords/pq_crypto | ||
| pdf_data/report_keywords/hash_function | ||
| pdf_data/report_keywords/crypto_scheme | ||
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness | ||
| pdf_data/report_keywords/cipher_mode | ||
| pdf_data/report_keywords/ecc_curve | ||
| pdf_data/report_keywords/crypto_engine | ||
| pdf_data/report_keywords/tls_cipher_suite | ||
| pdf_data/report_keywords/crypto_library | ||
| pdf_data/report_keywords/vulnerability | ||
| pdf_data/report_keywords/side_channel_analysis | ||
| pdf_data/report_keywords/technical_report_id | ||
| pdf_data/report_keywords/device_model | ||
| pdf_data/report_keywords/tee_name | ||
| pdf_data/report_keywords/os_name | ||
| pdf_data/report_keywords/cplc_data | ||
| pdf_data/report_keywords/ic_data_group | ||
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version | ||
| pdf_data/report_keywords/javacard_api_const | ||
| pdf_data/report_keywords/javacard_packages | ||
| pdf_data/report_keywords/certification_process | ||
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | Embedded Common Firmware for Vestel Smart TVs V0.1 Security Target_v1.3.docx | anssi-cible-cc-2021_29en.pdf |
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/javacard_api_const |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/convert_ok | False | True |
| state/report/extract_ok | False | True |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |