Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
EUR Form Client 05-07
JISEC-CC-CRP-C0068
S3FT9MH/S3FT9MV/S3FT9MG
ANSSI-CC-2018/33
name EUR Form Client 05-07 S3FT9MH/S3FT9MV/S3FT9MG
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 28.12.2010 22.08.2023
not_valid_before 15.12.2006 22.08.2018
report_link https://www.commoncriteriaportal.org/files/epfiles/c0068_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018_33.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/ https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2018_33.pdf
manufacturer Hitachi, Ltd. Samsung Electronics Co., Ltd.
manufacturer_web https://www.samsung.com
security_level ALC_FLR.1, EAL2+ ASE_TSS.2, EAL6+
dgst 3065549d198f4f8d 39ce1fc984ec608c
heuristics/cert_id JISEC-CC-CRP-C0068 ANSSI-CC-2018/33
heuristics/cert_lab [] CEA
heuristics/extracted_sars ALC_FLR.1 ASE_INT.1, ASE_SPD.1, ASE_TSS.2, ALC_CMC.5, ASE_CCL.1, ADV_INT.3, ADV_IMP.2, ALC_LCD.1, ALC_TAT.3, ADV_FSP.5, ASE_REQ.2, ATE_FUN.2, ASE_OBJ.2, AVA_VAN.5, ASE_ECD.1, ALC_CMS.5, ALC_DEL.1, ATE_DPT.3, AGD_PRE.1, AGD_OPE.1, ADV_SPM.1, ALC_DVS.2, ADV_ARC.1, ADV_TDS.5, ATE_COV.3, ATE_IND.2
heuristics/extracted_versions 05, 07 -
heuristics/report_references/directly_referenced_by {} ANSSI-CC-2020/12
heuristics/report_references/directly_referencing {} ANSSI-CC-2017/24
heuristics/report_references/indirectly_referenced_by {} ANSSI-CC-2020/93, ANSSI-CC-2020/12
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2017/24, ANSSI-CC-2015/66, ANSSI-CC-2016/59
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0068
  • certification_date: 01.12.2006
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2+ALC_FLR.1
    • description: PRODUCT DESCRIPTION TOE is an application software product for electronic form systems. By using TOE, the end-user can view, fill in the electronic form easily via Web client as if it is a paper application form, and send the entered data to the system securely. TOE provides following security functions, in order to enforce the security policy declared in the EUR Form files. - Attach the XML signatures to the entered data - Verify the XML signatures - Initiate the HTTPS Channel
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: EUR Form Client
    • product_type: IT Product (software for electronic form systems)
    • toe_version: 05-07
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.01.2011
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0068_it6089.html
  • toe_japan_name: EUR Form Client 05-07
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles {} cf0f01bcd7be3e9c
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/report_filename c0068_ecvr.pdf anssi-cc-2018_33.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
    • cc_security_level: EAL 6 augmenté ASE_TSS.2
    • cc_version: Critères Communs version 3.1 révision 5
    • cert_id: ANSSI-CC-2018/33
    • cert_item: S3FT9MH/S3FT9MV/S3FT9MG
    • cert_item_version: S3FT9MH/S3FT9MV/S3FT9MG_rev0-1_SW10-49-50-70-10-204_GU115-16-203-133-26-22-24-14
    • cert_lab: CEA - LETI 17 rue des martyrs, 38054 Grenoble Cedex 9, France
    • developer: Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud Trusted Labs 5, rue du Baillage 78000 Versailles, France Commanditaire Samsung Electronics Co. Ltd. 17 Floor, B-Tower, 1-1, Samsungjeonja-ro Hwaseong-si, Gyeonggi-do 445-330 Corée du Sud
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: Security IC Platform Protection Profile with Augmentation Packages, version 1.0 certifié BSI-CC-PP-0084-2014 le 19 février 2014 avec conformité aux packages “Authentication of the security IC” “Loader dedicated for usage in Secured Environment only” “Loader dedicated for usage by authorized users only
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0068: 1
  • FR:
    • ANSSI-CC-2017/24: 2
    • ANSSI-CC-2018/33: 18
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084-2014: 1
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 6: 2
    • EAL2: 2
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 2
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 2
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 14
pdf_data/report_keywords/eval_facility
  • CEA-LETI:
    • CEA - LETI: 1
    • CEA-LETI: 2
  • CESTI:
    • CESTI: 3
  • TrustedLabs:
    • Trusted Labs: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 16
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
pdf_data/report_metadata
  • /CreationDate: D:20061215165848+09'00'
  • /ModDate: D:20061215165848+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 13486
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: cdu
  • /Category: S3FT9MH/S3FT9MV/S3FT9MG_rev0-1_SW10-49-50-70-10-204_GU115-16-203-133-26-22-24-14
  • /Comments: Samsung Electronics Co. Ltd.
  • /Company: SGDSN/ANSSI
  • /CreationDate: D:20180904120947+02'00'
  • /Creator: Acrobat PDFMaker 11 pour Word
  • /Keywords: ANSSI-CC-CER-F-07.026
  • /ModDate: D:20180904120950+02'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20180904100943
  • /Subject: S3FT9MH/S3FT9MV/S3FT9MG
  • /Title: ANSSI-CC-2018/33
  • pdf_file_size_bytes: 275465
  • pdf_hyperlinks: mailto:[email protected], http://www.ssi.gouv.fr/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename anssi-cible-cc-2018_33.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0084: 2
    • BSI-CC-PP-0084-: 1
    • BSI-PP-0084: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL 5: 2
    • EAL 5 augmented: 2
    • EAL6: 5
    • EAL6 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 5
    • ADV_FSP: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 3
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT.3: 1
    • ADV_SPM.1: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 2
    • ALC_CMS.4: 1
    • ALC_CMS.5: 3
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_ECD: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 2
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 11
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT.3: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.5: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 1
    • FAU_SAS: 8
    • FAU_SAS.1: 12
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM: 16
    • FCS_CKM.1: 24
    • FCS_CKM.2: 4
    • FCS_CKM.4: 11
    • FCS_COP: 49
    • FCS_COP.1: 21
    • FCS_RNG: 24
    • FCS_RNG.1: 16
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC: 10
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 1
    • FDP_ACF: 13
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 3
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_ITT: 1
    • FDP_ITT.1: 18
    • FDP_ITT.1.1: 1
    • FDP_SDC: 4
    • FDP_SDC.1: 14
    • FDP_SDI: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 8
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_API: 6
    • FIA_API.1: 12
    • FIA_API.1.1: 2
  • FMT:
    • FMT_CKM.4: 1
    • FMT_LIM: 22
    • FMT_LIM.1: 28
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 32
    • FMT_LIM.2.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 6
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 22
    • FPT_FLS.1.1: 1
    • FPT_ITT: 1
    • FPT_ITT.1: 16
    • FPT_ITT.1.1: 1
    • FPT_PHP: 3
    • FPT_PHP.3: 21
    • FPT_PHP.3.1: 1
  • FRU:
    • FRU_FLT: 1
    • FRU_FLT.1: 1
    • FRU_FLT.2: 17
  • FTP:
    • FTP_ITC.1: 13
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 12
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.AES: 5
    • O.ECC: 7
    • O.MEM_ACCESS: 1
    • O.RND: 6
    • O.RSA: 7
    • O.SHA: 7
    • O.TDES: 6
  • T:
    • T.RND: 5
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 17
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 32
  • DES:
    • 3DES:
      • TDEA: 1
      • TDES: 18
      • Triple-DES: 6
    • DES:
      • DES: 10
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 30
    • ECDH:
      • ECDH: 9
    • ECDSA:
      • ECDSA: 14
  • FF:
    • DH:
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 4
  • RSA:
    • RSA-CRT: 1
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 2
    • SHA2:
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 2
      • SHA224: 6
      • SHA256: 6
      • SHA384: 6
      • SHA512: 5
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 11
    • RNG: 17
  • TRNG:
    • DTRNG: 42
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • ECB:
    • ECB: 3
pdf_data/st_keywords/ecc_curve
  • Brainpool:
    • brainpoolP192r1: 4
    • brainpoolP192t1: 4
    • brainpoolP224r1: 4
    • brainpoolP224t1: 4
    • brainpoolP256r1: 4
    • brainpoolP256t1: 4
    • brainpoolP320r1: 4
    • brainpoolP320t1: 4
    • brainpoolP384r1: 4
    • brainpoolP384t1: 4
    • brainpoolP512r1: 4
    • brainpoolP512t1: 4
  • NIST:
    • P-192: 8
    • P-224: 8
    • P-256: 8
    • P-384: 8
    • secp192k1: 4
    • secp192r1: 4
    • secp224k1: 4
    • secp224r1: 4
    • secp256k1: 4
    • secp256r1: 4
    • secp384r1: 4
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 4
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 4
    • Malfunction: 26
    • malfunction: 13
    • physical tampering: 3
  • SCA:
    • DPA: 8
    • Leak-Inherent: 23
    • Physical Probing: 4
    • Physical probing: 2
    • SPA: 7
    • physical probing: 9
    • side channel: 2
    • side-channel: 4
    • timing attack: 2
    • timing attacks: 1
  • other:
    • reverse engineering: 5
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
  • ICVersion:
    • IC Version: 1
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 11
    • BSI-AIS31: 3
  • CC:
    • CCMB-2017-04-001: 3
    • CCMB-2017-04-002: 3
    • CCMB-2017-04-003: 3
    • CCMB-2017-04-004: 3
  • FIPS:
    • FIPS 197: 1
    • FIPS PUB 180-3: 6
    • FIPS197: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different