This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
NetScreen Appliance Model 500, 208, 204 with ScreenOS 4.0.2r7.0 None |
Application eTravel EAC v2.0 sur la carte à pucefermée MultiApp V3 masquée sur le composantM7820 A11(Version du patch : 5.0) ANSSI-CC-2014/61 |
|
---|---|---|
name | NetScreen Appliance Model 500, 208, 204 with ScreenOS 4.0.2r7.0 | Application eTravel EAC v2.0 sur la carte à pucefermée MultiApp V3 masquée sur le composantM7820 A11(Version du patch : 5.0) |
category | Boundary Protection Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | US | FR |
not_valid_after | 07.09.2012 | 16.09.2019 |
not_valid_before | 01.12.2003 | 16.09.2014 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4016a-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Rapport%20ANSSI-CC-2014_61fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4016a-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2014-61en.pdf |
manufacturer | NetScreen Technologies, Inc. | Gemalto - Infineon Technologies AG |
manufacturer_web | https://www.juniper.net/ | https://www.gemalto.com/ |
security_level | AVA_VLA.3, EAL4+ | ALC_DVS.2, EAL5+, AVA_VAN.5 |
dgst | 0c63997f3c12d23a | 58ad0c9a39f6504c |
heuristics/cert_id | ANSSI-CC-2014/61 | |
heuristics/cert_lab | [] | SERMA |
heuristics/extracted_sars | AVA_VLA.3 | AVA_VAN.5, ADV_ARC.1, ALC_DVS.2 |
heuristics/extracted_versions | 4.0.2, 7.0 | 5.0, 2.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2016/73 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2014/06, ANSSI-CC-2014/07, BSI-DSZ-CC-0829-2012 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2016/73 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, ANSSI-CC-2014/07, ANSSI-CC-2014/06, ANSSI-CC-2013/32, ANSSI-CC-2013/33, BSI-DSZ-CC-0640-2010 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles | {} | a33327d40f253f46 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
pdf_data/report_filename | Rapport ANSSI-CC-2014_61fr.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ANSSI-CC-cible_2014-61en.pdf | |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/report/convert_ok | False | True |
state/report/download_ok | False | True |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |