This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0640-2010 |
Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 or v2.07.003 or v2.09.002, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003 or v2.09.002, and Toolbox v1.02.013 or v2.07.003 or v2.09.002 libraries and with specific IC dedicated software (firmware) None |
|
---|---|---|
name | Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software | Infineon Security Controller M7892 B11 with optional RSA2048/4096 v1.02.013 or v2.07.003 or v2.09.002, EC v1.02.013 or v2.07.003 or v2.09.002, SHA-2 v1.01, SCL v2.02.012, Base v1.02.013 or v2.07.003 or v2.09.002, and Toolbox v1.02.013 or v2.07.003 or v2.09.002 libraries and with specific IC dedicated software (firmware) |
status | archived | active |
not_valid_after | 01.09.2019 | 26.11.2025 |
not_valid_before | 28.07.2010 | 07.11.2024 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V6c_pdf.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640a_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V6a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640b_pdf.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0782V6b_pdf.pdf |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ALC_FLR.1, EAL6+ |
dgst | 454b704420e1b9ab | f5808a97db98a544 |
heuristics/cert_id | BSI-DSZ-CC-0640-2010 | |
heuristics/cert_lab | BSI | [] |
heuristics/cpe_matches | {} | cpe:2.3:a:infineon:rsa_library:1.02.013:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2017-15361 |
heuristics/indirect_transitive_cves | CVE-2017-15361 | {} |
heuristics/extracted_sars | ASE_SPD.1, APE_INT.1, ALC_DVS.2, AGD_OPE.1, ALC_TAT.2, APE_REQ.2, ATE_FUN.1, ATE_IND.2, ASE_REQ.2, APE_SPD.1, ADV_FSP.5, ALC_CMS.5, ADV_IMP.1, ASE_ECD.1, ALC_FLR.3, ADV_SPM.1, ALC_CMC.4, ADV_TDS.4, ASE_TSS.1, ADV_INT.2, APE_CCL.1, ALC_DEL.1, ALC_LCD.1, ATE_COV.2, AVA_VAN.5, ASE_INT.1, APE_OBJ.2, ASE_CCL.1, AGD_PRE.1, ADV_ARC.1, APE_ECD.1, ATE_DPT.3, ASE_OBJ.2 | ALC_FLR.1 |
heuristics/extracted_versions | 1.1, 1.1.18 | 1.02.013, 1.01, 2.07.003, 2.02.012, 2.09.002 |
heuristics/report_references/directly_referenced_by | BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0732-2011, BSI-DSZ-CC-0728-2011 | {} |
heuristics/report_references/indirectly_referenced_by | BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2013/32, ANSSI-CC-2015/02, ANSSI-CC-2014/48, ANSSI-CC-2014/86, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0764-2012, ANSSI-CC-2015/39, ANSSI-CC-2012/41, ANSSI-CC-2015/09, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0898-2014, ANSSI-CC-2013/11, ANSSI-CC-2013/33, ANSSI-CC-2014/14, ANSSI-CC-2013/34, ANSSI-CC-2016/04, BSI-DSZ-CC-0729-2011, ANSSI-CC-2013/10, CRP290, ANSSI-CC-2014/09, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/51, BSI-DSZ-CC-0722-2011, ANSSI-CC-2015/04, ANSSI-CC-2016/03, BSI-DSZ-CC-0695-2011, ANSSI-CC-2012/38, BSI-DSZ-CC-0835-2013, BSI-DSZ-CC-0813-2012, ANSSI-CC-2012/85, ANSSI-CC-2013/64, BSI-DSZ-CC-0889-2013, ANSSI-CC-2015/01, ANSSI-CC-2014/13, ANSSI-CC-2014/06, ANSSI-CC-2012/31, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0851-2013, ANSSI-CC-2015/30, BSI-DSZ-CC-0677-2010, ANSSI-CC-2014/50, BSI-DSZ-CC-0761-2013, ANSSI-CC-2013/40, ANSSI-CC-2015/25, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/62, ANSSI-CC-2016/75, ANSSI-CC-2014/07, ANSSI-CC-2012/50, ANSSI-CC-2016/73, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0904-2015, ANSSI-CC-2015/37, BSI-DSZ-CC-0952-2014, ANSSI-CC-2012/40, ANSSI-CC-2013/55, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0850-2013, BSI-DSZ-CC-0762-2012, ANSSI-CC-2015/15, ANSSI-CC-2014/08, BSI-DSZ-CC-0836-V2-2017, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0733-2011, ANSSI-CC-2012/32, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2014/49, ANSSI-CC-2016/74, BSI-DSZ-CC-0732-2011, BSI-DSZ-CC-0818-2013, ANSSI-CC-2014/11, ANSSI-CC-2013/42, ANSSI-CC-2014/12, ANSSI-CC-2015/08, ANSSI-CC-2013/35, ANSSI-CC-2015/03, BSI-DSZ-CC-0904-V2-2021, ANSSI-CC-2015/38, ANSSI-CC-2014/61, ANSSI-CC-2012/44, ANSSI-CC-2015/40, BSI-DSZ-CC-0922-2014, ANSSI-CC-2015/41, ANSSI-CC-2013/39, BSI-DSZ-CC-0763-2012, BSI-DSZ-CC-0728-2011 | {} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by | BSI-DSZ-CC-0728-2011, ANSSI-CC-2012/31, ANSSI-CC-2012/32, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0732-2011, ANSSI-CC-2012/41, ANSSI-CC-2012/40, ANSSI-CC-2012/50, ANSSI-CC-2012/51, ANSSI-CC-2013/11, ANSSI-CC-2013/40, ANSSI-CC-2013/10 | {} |
heuristics/st_references/indirectly_referenced_by | BSI-DSZ-CC-0813-2012, ANSSI-CC-2013/32, ANSSI-CC-2014/48, ANSSI-CC-2012/41, ANSSI-CC-2014/13, ANSSI-CC-2015/09, ANSSI-CC-2014/06, ANSSI-CC-2016/73, BSI-DSZ-CC-0829-2012, ANSSI-CC-2013/33, ANSSI-CC-2013/11, BSI-DSZ-CC-0898-2014, ANSSI-CC-2016/74, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2014/14, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/31, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0952-2014, ANSSI-CC-2013/34, BSI-DSZ-CC-0732-2011, ANSSI-CC-2012/40, BSI-DSZ-CC-0818-2013, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0729-2011, BSI-DSZ-CC-0760-2013, BSI-DSZ-CC-0819-2012, ANSSI-CC-2012/51, ANSSI-CC-2014/09, ANSSI-CC-2013/10, ANSSI-CC-2014/11, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0677-2010, ANSSI-CC-2014/08, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0761-2013, ANSSI-CC-2014/12, ANSSI-CC-2013/35, ANSSI-CC-2013/40, BSI-DSZ-CC-0733-2011, ANSSI-CC-2014/61, BSI-DSZ-CC-0836-2013, ANSSI-CC-2014/62, ANSSI-CC-2012/44, ANSSI-CC-2012/38, ANSSI-CC-2016/75, ANSSI-CC-2012/32, BSI-DSZ-CC-0922-2014, ANSSI-CC-2014/07, BSI-DSZ-CC-0835-2013, ANSSI-CC-2013/39, ANSSI-CC-2012/50, BSI-DSZ-CC-0728-2011 | {} |
maintenance_updates |
|
|
pdf_data/report_filename | 0640a_pdf.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol | ||
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 0640b_pdf.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol | ||
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/report/convert_ok | True | False |
state/report/download_ok | True | False |
state/report/extract_ok | True | False |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |