This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Operator Terminal Adapter (OTA) SERTIT-101 |
ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 ANSSI-CC-2022/33 |
|
---|---|---|
name | Operator Terminal Adapter (OTA) | ID-One Cosmo v9.1 embedding VITALE application version 2.1.4 |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | NO | FR |
status | archived | active |
not_valid_after | 15.07.2024 | 06.09.2027 |
not_valid_before | 15.07.2019 | 06.09.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-101%20C_v%201.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2022_33.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-101%20CR_v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2022_33.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/3AQ%2024863%20AAAA%20377%20EN%20Security%20Target%20for%20OTA%20ed.%206.2.9.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2022_33en.pdf |
manufacturer | Thales Norway AS | Idemia |
manufacturer_web | https://www.thales.no/ | https://www.idemia.com |
security_level | EAL5+, ALC_FLR.3 | EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst | 332bae91ff39cc8f | e7198a866b44d208 |
heuristics/cert_id | SERTIT-101 | ANSSI-CC-2022/33 |
heuristics/extracted_sars | ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, AVA_VAN.4, ASE_CCL.1 | ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1 |
heuristics/extracted_versions | - | 9.1, 2.1.4 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2020/07, BSI-DSZ-CC-1110-V4-2021, ANSSI-CC-2019/41 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2017/49, ANSSI-CC-2019/28, BSI-DSZ-CC-1059-2018, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012, ANSSI-CC-2020/07, BSI-DSZ-CC-0945-V3-2018, BSI-DSZ-CC-1110-2019, BSI-DSZ-CC-0973-2016, ANSSI-CC-2019/41, BSI-DSZ-CC-0973-V2-2016, BSI-DSZ-CC-1110-V3-2020, BSI-DSZ-CC-0945-2017, BSI-DSZ-CC-1110-V2-2019, BSI-DSZ-CC-0945-V2-2018, BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/directly_referencing | {} | ANSSI-CC-2020/07, BSI-DSZ-CC-1110-V4-2021 |
heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2020/07, BSI-DSZ-CC-1110-V4-2021, BSI-DSZ-CC-1110-V2-2019 |
heuristics/protection_profiles | {} | d9553e7194783182, d918b28fd7bb5d79, 4a814d0e3c9f9082, 1f7ea2e05de5b88b, 27abdb9c6ab375a7 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf |
pdf_data/cert_filename | SERTIT-101 C_v 1.0.pdf | certificat-anssi-cc-2022_33.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | SERTIT-101 CR_v1.0.pdf | anssi-cc-2022_33.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 3AQ 24863 AAAA 377 EN Security Target for OTA ed. 6.2.9.pdf | anssi-cible-cc-2022_33en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |