Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
LEO V2
ANSSI-CC-2012/37
CENTAGATE v3.010-build13
ISCB-3-RPT-C072-CR-v1
name LEO V2 CENTAGATE v3.010-build13
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme FR MY
not_valid_after 01.09.2019 06.06.2022
not_valid_before 19.07.2012 06.06.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2012-37fr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C072-CR-v1.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2012-37en.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2017-05-08-CTG-ST-3.0.pdf
manufacturer Ingenico Healthcare/e-ID SecureMetric Technology Sdn Bhd
manufacturer_web https://www.ingenico.com https://www.securemetric.com/
security_level ADV_FSP.4, ALC_FLR.3, AVA_VAN.3, ALC_TAT.1, ADV_IMP.1, EAL3+, ADV_TDS.3 EAL4+, ALC_FLR.2
dgst 33537b8a859fdc32 4149b933ed4230dd
heuristics/cert_id ANSSI-CC-2012/37 ISCB-3-RPT-C072-CR-v1
heuristics/cert_lab SERMA []
heuristics/extracted_sars ASE_INT.1, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FRL.2, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 3.010
heuristics/report_references/directly_referenced_by ANSSI-CC-2016/53 {}
heuristics/report_references/indirectly_referenced_by ANSSI-CC-2016/53 {}
heuristics/protection_profiles 86afa36bc4e78466 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-profil_PP-2012-01en.pdf {}
pdf_data/report_filename ANSSI-CC_2012-37fr.pdf ISCB-5-RPT-C072-CR-v1.pdf
pdf_data/report_frontpage
  • FR:
    • cc_security_level: EAL3 Augmenté ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, ALC_FLR.3, ALC_TAT.1 et AVA.VAN.3
    • cc_version: CC version 3.1 révision 3
    • cert_id: ANSSI-CC-2012/37
    • cert_item: LEO V2
    • cert_item_version: Référence PPD001-003-AXY, Version PK08.12
    • cert_lab: SERMA Technologies 30 avenue Gustave Eiffel, 33608 Pessac France
    • developer: Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France Commanditaire Ingenico Healthcare/e-ID 25 quai Gallieni, 92158 Suresnes Cedex France
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.+)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeur (.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP LSCIHM], version v1.6 Lecteur sécurisé de carte avec interface homme machine
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2011-31: 1
    • ANSSI-CC-2012/37: 14
    • ANSSI-CC-PP-2012/01: 1
  • MY:
    • ISCB-3-RPT-C072-CR-v1: 28
pdf_data/report_keywords/cc_protection_profile_id
  • ANSSI:
    • ANSSI-CC-PP-2012/01: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 3+: 1
    • EAL 5: 1
    • EAL 7: 1
    • EAL3: 2
    • EAL4: 2
  • ITSEC:
    • ITSEC E3 Elémentaire: 1
  • EAL:
    • EAL4: 5
    • EAL4 augmented: 1
    • EAL4+: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_FSP.4: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 2
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_FLR.3: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 1
  • ALC:
    • ALC_FLR.2: 7
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 2
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • OTP Hardware token, where this is out of the evaluation. SMS service to register the device is also out of scope. 18 Potential consumers of the TOE are advised that some functions and services may not have been: 1
    • out of scope: 1
pdf_data/report_metadata
  • /CreationDate: D:20120720163953+02'00'
  • /Creator: PDFCreator Version 0.9.0
  • /Keywords:
  • /ModDate: D:20120727112114+02'00'
  • /Producer: AFPL Ghostscript 8.53
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 124103
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
  • /Author: ISCB Department
  • /CreationDate: D:20170720054033+00'00'
  • /Creator: Microsoft Word
  • /Keywords: MyCB_TMP_002
  • /ModDate: D:20170720054033+00'00'
  • /Subject: CENTAGATE v3.0.10-build13
  • /Title: C072 Certification Report
  • pdf_file_size_bytes: 649341
  • pdf_hyperlinks: http://www.cybersecurity.my/mycc, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename ANSSI-CC-cible_2012-37en.pdf 2017-05-08-CTG-ST-3.0.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 2
    • EAL3 augmented: 1
    • EAL3+: 19
  • EAL:
    • EAL 4: 1
    • EAL 4 augmented: 1
    • EAL4: 3
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FRL.2: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC.1: 2
    • FDP_IFC.1.1: 3
    • FDP_IFF.1: 2
    • FDP_IFF.1.1: 3
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 3
    • FDP_IFF.1.5: 3
    • FDP_PHP.1.1: 2
    • FDP_PHP.1.2: 2
    • FDP_RIP: 1
    • FDP_RIP.2: 1
    • FDP_RIP.2.1: 3
  • FMT:
    • FMT_MSA.3: 1
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1.1: 3
  • FAU:
    • FAU_ARP: 3
    • FAU_ARP.1: 5
    • FAU_ARP.1.1: 1
    • FAU_GEN: 2
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_SAA: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAA.2: 6
    • FAU_SAA.2.1: 1
    • FAU_SAA.2.2: 1
    • FAU_SAA.2.3: 1
    • FAU_SAR: 2
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 3
    • FAU_SAR.2.1: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 11
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 12
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 1
    • FDP_ITC.1: 3
    • FDP_ITC.2: 3
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 8
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 7
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 5
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_TAH: 3
    • FTA_TAH.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.USER: 5
    • A.USER_DIS: 2
    • A.USER_KEYPAD: 1
    • A.USER_PIN: 2
    • A.USER_UNOBSERVED: 2
    • A.USER_USAGE: 1
  • O:
    • O.HARD_EVIDENT: 7
    • O.REVEAL: 5
    • O.SIGNAL: 3
  • OE:
    • OE.MANUAL: 3
    • OE.PRIVATE: 2
  • OP:
    • OP.D_CONTROL: 1
    • OP.P_ENTRY: 2
    • OP.P_VERIFY: 1
  • OSP:
    • OSP.USER: 2
  • T:
    • T.DIS: 1
    • T.PIN_DISCLOSE: 1
    • T.PIN_DISCLOSEE: 1
    • T.PIN_MODIFY: 2
  • A:
    • A.COMPENT_ADMIN: 1
    • A.COMPENT_ADMINSTRATORS: 1
    • A.FIREWALL: 2
    • A.MAIL_SERVER: 2
    • A.MALICIOUS_CODE: 1
    • A.NO_EVIL: 2
    • A.OPERATING_SYSTEM: 1
    • A.PORT_PROTECT: 2
    • A.TIME_STAMP: 2
  • D:
    • D: 1
  • O:
    • O.ALERT: 6
    • O.AUDIT: 7
    • O.AUTH_MECH: 8
    • O.MOBILE_SENSITVE: 2
    • O.MOBILE_SENSITVE_: 1
    • O.MOBILE_SENSITVE_PROTECTION: 5
    • O.TRAFFIC_PROTECTION: 23
    • O.USER_ACC: 1
    • O.USER_ACC_CONTROL: 19
  • OE:
    • OE.COMPENT_: 1
    • OE.COMPENT_ADMINSTRATORS: 1
    • OE.FIREWALL: 2
    • OE.MAIL_SERVER: 2
    • OE.MALICIOUS_CODE_N: 1
    • OE.MALICIOUS_CODE_NOT_SIGN: 1
    • OE.NO_EVIL: 2
    • OE.OPERATING_SYSTEM: 1
    • OE.PHYSICAL_PROTECTION: 1
    • OE.PORT_PROTECT: 2
    • OE.TIME_STAMP: 2
  • T:
    • T.CUMMUNICATION: 1
    • T.CUMMUNICATION_ATTACK: 1
    • T.DATA_ACCESS: 2
    • T.MOBILE: 1
    • T.MOBILE_ATTACK: 1
    • T.USER_ACC_CONTROL: 1
    • T.WEB_ATTACK: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 14
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 7816: 2
  • PKCS:
    • PKCS#11: 2
    • PKCS#12: 3
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Workstation. The PC may be a Microsoft Windows, Mac or Linux OS powered. The security of the PC is out of scope of the TOE. As a Personal Identification Number (also known and referred as ‘PIN’) is required for: 1
    • entry functionality can be activated from a software application loaded in the PC (not provided and out of scope of this TOE), and used in conjunction with a secure smartcard (not provided and out of scope of: 1
    • not provided and out of scope of this TOE: 2
    • out of scope: 3
  • OutOfScope:
    • Out of Scope: 1
    • issuer certificate validity, certificate status, and the certificate owner Mobile audio pass (Out of Scope) TOE will generate challenge and PKI certificate will be used to sign the challenge. The signature: 1
    • out of scope: 5
    • procedure. Table 21: Authentication Components Authentication Method of authentication PKI token (out of scope) The user prompted to select the valid certificate from the list, and then TOE will verify the: 1
    • serial number / fingerprint that stored in the DB. Hardware CR OTP (out of scope) User needs to have CR OTP token to use this feature. User will request for a challenge from the: 1
    • then be sent back to the TOE by the mobile application and verified for its validity. FIDO (out of scope) User need to plugged in the token then click on the button of the token to submit the validation: 1
    • token. This is out of the scope of the evaluation. Also, using SMS to register the device is also out of scope of evaluation. SecureMetric Technology Sdn Bhd 2016 Page 17 of 76 For QR code registration: 1
    • which will then be used by the user to generate the OTP. Hardware OTP (out of scope) User needs to have OTP token to use this feature. User will generate an OTP from the OTP token and: 1
pdf_data/st_metadata
  • /Author: Rajiv;Biau
  • /CreationDate: D:20170523024954+00'00'
  • /Creator: Microsoft Word
  • /Keywords: ST
  • /ModDate: D:20170720134505+08'00'
  • /Title: Centagat Security Target
  • pdf_file_size_bytes: 1592329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 76
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different