This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Javacard/VOP GemXpresso 211 platform V2 (Philips P8WE5032/MPH04 embedded component, A000000018434D Card Manager) ANSSI-CC-2000/06 |
Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) ANSSI-CC-2024/40 |
|
|---|---|---|
| name | Javacard/VOP GemXpresso 211 platform V2 (Philips P8WE5032/MPH04 embedded component, A000000018434D Card Manager) | Strong Customer Authentication for Apple Pay on iPhone 15 Pro with A17 Pro running iOS 17.4(iOS 17.4 (Build 21E219)) |
| status | archived | active |
| not_valid_after | 01.09.2019 | 08.01.2030 |
| not_valid_before | 01.01.2000 | 08.01.2025 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2024_40fr.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2000_06.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2024_40fr.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-Cible-CC-2024_40en.pdf | |
| manufacturer | Philips Semiconductors, Gemplus | Apple Inc. |
| manufacturer_web | https://www.philips.com/ | https://www.apple.com/ |
| security_level | EAL1+, AVA_VLA.2 | ADV_FSP.3, EAL2+, ALC_FLR.3 |
| dgst | 149e170978b5bd17 | ecbeeaa7c47eedea |
| heuristics/cert_id | ANSSI-CC-2000/06 | ANSSI-CC-2024/40 |
| heuristics/extracted_sars | ASE_ENV.1, AGD_ADM.1, ADV_RCR.1, AVA_VLA.2, AGD_USR.1, ASE_INT.1, ATE_IND.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1, ASE_PPC.1, ASE_SRE.1, ASE_DES.1, ADV_FSP.1 | ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_FSP.3, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 |
| heuristics/extracted_versions | 211 | 17.4 |
| pdf_data/cert_filename | Certificat-ANSSI-CC-2024_40fr.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id | ||
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility | ||
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | 2000_06.pdf | ANSSI-CC-2024_40fr.pdf |
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/javacard_version |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | ANSSI-Cible-CC-2024_40en.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor | ||
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function | ||
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness | ||
| pdf_data/st_keywords/cipher_mode | ||
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library | ||
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis | ||
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/extract_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |