This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
eTravel 2.4 en configuration BAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2018/36v2-R01) ANSSI-CC-2018/36v2 |
Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5) ANSSI-CC-2015/09 |
|
---|---|---|
name | eTravel 2.4 en configuration BAC sur plateforme ID Motion V2 (Version de l’application eTravel : 2.4) (ANSSI-CC-2018/36v2-R01) | Application eTravel EAC v2.0, en configuration "EACon BAC" sur la plateforme fermée MultiApp V3masquée sur le composant M7820 A11(Version du patch : 1.5) |
status | active | archived |
not_valid_after | 12.02.2030 | 24.02.2020 |
not_valid_before | 12.02.2025 | 24.02.2015 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2018_36v2-R01.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018_36v2-R01fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2015_09.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2018_36v2-R01en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible_2015_09_Lite_v1.1p.pdf |
manufacturer | THALES DIS FRANCE SA | Gemalto - Infineon Technologies AG |
manufacturer_web | https://www.thalesgroup.com/en/europe/france | https://www.gemalto.com/ |
security_level | EAL4+, ALC_DVS.2 | EAL5+, AVA_VAN.5, ALC_DVS.2 |
dgst | 260b4eded9655fd9 | fab2b3734a8a20b4 |
heuristics/cert_id | ANSSI-CC-2018/36v2 | ANSSI-CC-2015/09 |
heuristics/cert_lab | [] | SERMA |
heuristics/extracted_versions | 2.4 | 2.0, 1.5 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2014/06, ANSSI-CC-2014/48, BSI-DSZ-CC-0829-2012 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2014/06, BSI-DSZ-CC-0728-2011, ANSSI-CC-2014/48, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0829-2012 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0813-2012 |
heuristics/protection_profiles | 60455fc9564e2545 | 78bcc246f0f43034 |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056b.pdf |
pdf_data/cert_filename | certificat-CC-2018_36v2-R01.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ANSSI-CC-2018_36v2-R01fr.pdf | ANSSI-CC-2015_09.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ANSSI-cible-CC-2018_36v2-R01en.pdf | cible_2015_09_Lite_v1.1p.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |