This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
McAfee® Deep Defender™ 1.0.1 and ePolicy Orchestrator 4.6.1 383-4-220 |
IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 ( ANSSI-CC-2023/65) ANSSI-CC-2023/65 |
|
---|---|---|
name | McAfee® Deep Defender™ 1.0.1 and ePolicy Orchestrator 4.6.1 | IDmove v5 on SCR404U in EAC with PACE configuration and LDSv2, AA in optionOS Commercial Version : 0x098912 ; OS Unique Identifier : 0xB7BC0108 et E48C0108 ( ANSSI-CC-2023/65) |
category | Detection Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | archived | active |
not_valid_after | 19.04.2018 | 19.01.2029 |
not_valid_before | 12.10.2012 | 19.01.2024 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-CC-2023_65fr.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-220%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_65fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-220%20ST%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2023_65en.pdf |
manufacturer | McAfee, Inc. | Idemia |
manufacturer_web | https://www.mcafee.com/ | https://www.idemia.com |
security_level | EAL2+, ALC_FLR.2 | ADV_IMP.2, ALC_CMC.5, EAL5+, AVA_VAN.5, ATE_COV.3, ALC_TAT.3, ADV_TDS.5, ATE_FUN.2, ADV_INT.3, ALC_DVS.2, ALC_FLR.3 |
dgst | 14fb8b217e6e40cd | 5efff34ba9f691ec |
heuristics/cert_id | 383-4-220 | ANSSI-CC-2023/65 |
heuristics/cert_lab | CANADA | [] |
heuristics/extracted_sars | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 | ALC_DVS.2, ADV_TDS.5, ASE_INT.3, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3 |
heuristics/extracted_versions | 1.0.1, 4.6.1 | 2023, 65 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2023/37 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2023/37 |
heuristics/st_references/directly_referencing | {} | ANSSI-CC-2023/37 |
heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2023/37 |
heuristics/protection_profiles | {} | 78bcc246f0f43034 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
pdf_data/cert_filename | Certificat-CC-2023_65fr.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-220 CR v1.0e.pdf | ANSSI-CC-2023_65fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-220 ST v1.0.pdf | ANSSI-cible-CC-2023_65en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |