This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Kyocera TASKalfa PA4500ci, Copystar CS PA4500ci, TA Triumph-Adler P458ci, UTAX P458ci with SSD and with system firmware: 2Z2_S0IS.C03.002 CSEC2021011 |
ATMEL AT90SC6404RT rev. I microcontroller ANSSI-CC-2005/45 |
|
---|---|---|
name | Kyocera TASKalfa PA4500ci, Copystar CS PA4500ci, TA Triumph-Adler P458ci, UTAX P458ci with SSD and with system firmware: 2Z2_S0IS.C03.002 | ATMEL AT90SC6404RT rev. I microcontroller |
category | Multi-Function Devices | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | SE | FR |
status | active | archived |
not_valid_after | 14.09.2028 | 01.09.2019 |
not_valid_before | 14.09.2023 | 15.12.2005 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CCRAcertificate_KyoceraPA4500.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20Kyocera%20PA4500_1-0_21FMV6805-26.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2005_45.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_TASKalfa_PA4500ci_V102.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2005_45.pdf |
manufacturer | KYOCERA Document Solutions Inc. | ATMEL Smart Card ICs |
manufacturer_web | https://www.kyoceradocumentsolutions.com/ | https://www.atmel.com |
security_level | EAL2+, ALC_FLR.2 | ALC_DVS.2, ADV_IMP.2, EAL4+, AVA_VLA.4 |
dgst | 48d086e7744b9948 | eda470c4aeca4b7d |
heuristics/cert_id | CSEC2021011 | ANSSI-CC-2005/45 |
heuristics/extracted_sars | ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1 | ADV_IMP.2, ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ASE_TSS.1, ADV_HLD.2, ATE_DPT.1, ADV_FSP.2, AVA_VLA.4, ADV_SPM.1, ALC_TAT.1, ASE_DES.1, ALC_DVS.2, ASE_ENV.1, ATE_IND.2, ASE_PPC.1, AGD_ADM.1, ASE_SRE.1, ASE_INT.1, ATE_FUN.1, ADV_RCR.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1 |
heuristics/extracted_versions | 03.002 | - |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2006/14 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2005/21, ANSSI-CC-2005/03 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2006/14 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2004/05, ANSSI-CC-2005/03, ANSSI-CC-2004/36, ANSSI-CC-2003/28, ANSSI-CC-2002/24, ANSSI-CC-2005/21, ANSSI-CC-2003/11 |
maintenance_updates |
|
|
pdf_data/cert_filename | CCRAcertificate_KyoceraPA4500.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | Certification Report Kyocera PA4500_1-0_21FMV6805-26.pdf | 2005_45.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST_TASKalfa_PA4500ci_V102.pdf | cible2005_45.pdf |
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |