Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Dell MX7000 Modular Chassis with Management Module v1.00.10
383-4-484
LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
ANSSI-CC-2008/37
name Dell MX7000 Modular Chassis with Management Module v1.00.10 LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17, version 1.0
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA FR
not_valid_after 07.01.2025 01.09.2019
not_valid_before 07.01.2020 03.11.2008
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-484%20CT%20v1.0.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-484%20CR%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2008_37en.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-484%20ST%20v1.5.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2008_37en.pdf
manufacturer Dell Technologies Gemalto - Infineon Technologies AG
manufacturer_web https://delltechnologies.com/ https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 EAL4+, AVA_MSU.3, AVA_VLA.4
dgst 1206564ac8be86a9 18b005fb398b1c2b
heuristics/cert_id 383-4-484 ANSSI-CC-2008/37
heuristics/cert_lab [] CEACI
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_DVS.2, ALC_LCD.1, ADV_FSP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1
heuristics/extracted_versions 1.00.10 1.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0376-2006
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0376-2006, BSI-DSZ-CC-0269-2006
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0269-2006
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0269-2006
maintenance_updates
pdf_data/cert_filename 383-4-484 CT v1.0.pdf
pdf_data/cert_keywords/cc_cert_id
  • CA:
    • 383-4-484: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20190122115136-04'00'
  • /Creator: Adobe Illustrator CC 22.0 (Windows)
  • /ModDate: D:20200115101657-05'00'
  • /Producer: Adobe PDF library 15.00
  • /Title: cyber-centre-product-evaluation-certificate-e-bg
  • pdf_file_size_bytes: 1640355
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename 383-4-484 CR v1.0.pdf dcssi-2008_37en.pdf
pdf_data/report_frontpage
  • FR:
  • CA:
  • FR:
    • cc_security_level: EAL 4 augmented AVA_MSU.3, AVA_VLA.4
    • cc_version: Common Criteria version 2.3 compliant with ISO 15408:2005
    • cert_id: DCSSI-2008/37
    • cert_item: LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B- EP3B platform embedded on SLE88CFX4002P/m8834b17
    • cert_item_version: T1004530 A3 / Version 1.0
    • cert_lab: CEACI (Thales Security Systems – CNES) 18 avenue Edouard Belin, 31401 Toulouse Cedex 9, France Phone: +33 (0)5 61 28 16 51, email : [email protected]
    • developer: GEMALTO 6 rue de la verrerie, 92197 Meudon, France Infineon Technologies AG Automotive, Industrial & Multimarket, Chipcard & Security IC´s, Am Campeon 1- 12, 85579 Neubiberg, Germany Sponsor GEMALTO 6 rue de la verrerie, 92197 Meudon, France
    • match_rules: ['Certification report reference(.+)Product name(.+)Product reference(.+)Protection profile conformity(.+)Evaluation criteria and version(.+)Evaluation level(.+)Developers(.+)Evaluation facility(.+)Recognition arrangements']
    • ref_protection_profiles: none
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-484: 1
  • DE:
    • BSI-DSZ-CC-0376-2006: 1
  • FR:
    • DCSSI-2008/37: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 1
    • BSI-PP-0006-2002T: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2+: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 4: 2
    • EAL 4 augmented: 2
    • EAL 5: 1
    • EAL 7: 1
    • EAL4: 3
    • EAL5: 1
    • EAL5+: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 and: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS: 1
  • ADV:
    • ADV_FSP: 1
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
  • AGD:
    • AGD_ADM: 1
    • AGD_USR: 1
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_CCA: 1
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 1
    • AVA_VLA: 1
    • AVA_VLA.4: 2
pdf_data/report_keywords/cc_claims
  • OE:
    • OE.HI_VAD: 1
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 1
  • Infineon:
    • Infineon: 4
    • Infineon Technologies AG: 4
  • Thales:
    • Thales: 1
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025: 2
  • BSI:
    • AIS 34: 2
    • AIS34: 1
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
    • CCMB-2005-08-004: 1
  • ISO:
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18045:2005: 1
pdf_data/report_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2.1: 2
pdf_data/report_metadata
  • /Author: J. Chuzel
  • /Comments: Developpeur
  • /Company: SGDN/DCSSI
  • /CreationDate: D:20081103113048+01'00'
  • /Creator: Acrobat PDFMaker 8.0 for Word
  • /Keywords: CER/F/07.5
  • /ModDate: D:20081103113130+01'00'
  • /Producer: Acrobat Distiller 8.0.0 (Windows)
  • /SourceModified: D:20081103103036
  • /Subject: LINQUS USIM 128K Smartcard: ESIGN PKI signature application loaded on GemXplore Generations G152B-EP3B platform embedded on SLE88CFX4002P/m8834b17
  • /Title: DCSSI-2008/37
  • pdf_file_size_bytes: 237599
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename 383-4-484 ST v1.5.pdf cible2008_37en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0269-2006: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP: 1
    • BSI-PP-0002: 1
    • BSI-PP-0004-2002T-: 1
    • BSI-PP-0005-2002T-03-04-2002: 1
    • BSI-PP-0006-2002T-: 1
    • BSI-PP-0006-2002T-03-04-2002: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL2+: 1
  • EAL:
    • EAL4: 2
    • EAL4 augmented: 2
    • EAL4+: 1
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
    • ACM_XXX: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.3: 4
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 22
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 4
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 18
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 18
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 16
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_PHP.1: 1
    • FPT_PHP.2: 7
    • FPT_PHP.2.1: 1
    • FPT_PHP.2.2: 1
    • FPT_PHP.2.3: 1
    • FPT_SCB: 1
    • FPT_SCB_EXT.1: 9
    • FPT_SCB_EXT.1.1: 2
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TST.1: 1
  • FRU:
    • FRU_FLT.1: 6
    • FRU_FLT.1.1: 1
    • FRU_FLT.2: 1
  • FTP:
    • FTP_TRP.1: 7
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FCS:
    • FCS_CKM: 1
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 3
    • FCS_CKM.3: 3
    • FCS_CKM.4: 4
    • FCS_COP: 1
    • FCS_COP.1: 9
  • FDP:
    • FDP_ACC.1: 7
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 4
    • FDP_ACF.1.2: 4
    • FDP_ETC.1: 5
    • FDP_ITC.1: 8
    • FDP_RIP.1: 4
    • FDP_SDI.2: 8
    • FDP_UIT.1: 13
    • FDP_UIT.1.2: 2
  • FIA:
    • FIA_AFL.1: 4
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 4
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UID.1: 5
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 5
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 4
    • FMT_MSA.3: 4
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 5
    • FMT_SMF: 2
    • FMT_SMF.1: 4
    • FMT_SMR.1: 4
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 4
    • FPT_FLS.1: 4
    • FPT_PHP.1: 4
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 4
    • FPT_SEP: 1
    • FPT_SEP.1: 2
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TST.1: 5
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 3
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 11
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 4
    • FTP_ITC.1.3: 4
    • FTP_TRP.1: 3
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NETWORK: 3
  • O:
    • O.ACCESS: 7
    • O.ADMIN: 9
    • O.ALERT: 9
    • O.AUDIT: 5
    • O.CRYPTO: 7
    • O.IDENTAUTH: 9
    • O.PROTECT: 9
    • O.SECURE: 5
    • O.TIME: 7
  • OE:
    • OE.ADMIN: 4
    • OE.NETWORK: 4
    • OE.PHYSICAL: 4
  • T:
    • T.ACCOUNT: 3
    • T.MISUSE: 2
    • T.PRIVILEGE: 3
    • T.UNDETECT: 2
  • A:
    • A.CGA: 1
    • A.SCA: 1
  • D:
    • D.DTBS: 8
    • D.RAD: 13
    • D.SCD: 11
    • D.SIGNATURE: 4
    • D.SIGN_APPLI: 3
    • D.SVD: 6
    • D.USER_PIN: 1
    • D.VAD: 5
  • OE:
    • OE.HI_VAD: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 53
  • Infineon:
    • Infineon: 4
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA-Canada: 1
  • Intertek:
    • Intertek: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 1
      • HMAC-SHA-256: 1
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • 3DES:
      • 3-DES: 1
      • Triple-DES: 1
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
      • TLS1.2: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 9
  • FI:
    • Physical tampering: 1
    • malfunction: 1
    • physical tampering: 5
  • SCA:
    • DPA: 2
    • SPA: 1
    • timing attacks: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-4: 2
    • FIPS 186-4: 1
    • FIPS 197: 1
    • FIPS 198: 2
    • FIPS2: 1
  • SCP:
    • SCP02: 2
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
  • JavaCard:
    • JC2.2.1: 5
    • Java Card 2.2.1: 3
    • JavaCard 2.2.1: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • verification of correct passcode stored in SIM at perso time. NB: The passcode functionality is out of scope of this Security target. 2.3 TOE LIFE CYCLE The TOE is composed of a JavaCard and a EEPROMed Java: 1
pdf_data/st_metadata
  • /Author: Teresa MacArthur
  • /Client Full Name: Dell Technologies
  • /Client Short Name: Dell
  • /Comments: CC V3.1 Security Target Template Version 1_0
  • /Company: EWA-Canada
  • /CreationDate: D:20191223082340-05'00'
  • /Creator: Acrobat PDFMaker 17 for Word
  • /Document Number: 2100-000-D102
  • /ModDate: D:20191223082359-05'00'
  • /Producer: Adobe PDF Library 15.0
  • /Product_Name: Dell MX7000 Modular Chassis
  • /ST_Date: 23 December 2019
  • /ST_Version: 1.5
  • /SourceModified: D:20191223132318
  • /Title: Security Target
  • pdf_file_size_bytes: 894805
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
  • /Author:
  • /CreationDate: D:20081020110655
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20081020110655
  • /Producer: GPL Ghostscript 8.54
  • /Subject:
  • /Title: ASE10448v1.4_Lite
  • pdf_file_size_bytes: 410066
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different