This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
S3FV9QM/S3FV9QK 32-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Library ANSSI-CC-2018/43 |
Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional ATP1 Secure Library and Fingerprint Library including specific IC Dedicated software ANSSI-CC-2022/63 |
|
---|---|---|
name | S3FV9QM/S3FV9QK 32-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Library | Secure Element S3B512C/SC3512C (32-bit RISC Microcontroller) with optional ATP1 Secure Library and Fingerprint Library including specific IC Dedicated software |
category | Trusted Computing | ICs, Smart Cards and Smart Card-Related Devices and Systems |
status | archived | active |
not_valid_after | 05.11.2023 | 12.12.2027 |
not_valid_before | 05.11.2018 | 12.12.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2022_63.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2018-43fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2022_63fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2018_43en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2022_63en.pdf |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | ASE_TSS.2, EAL6+ |
dgst | 49fdbc726cff0629 | e279fe001a601d81 |
heuristics/cert_id | ANSSI-CC-2018/43 | ANSSI-CC-2022/63 |
heuristics/cert_lab | CEA | [] |
heuristics/extracted_sars | ALC_CMS.5, AVA_VAN.5, ADV_ARC.1, ATE_IND.2, ALC_CMC.4, AGD_OPE.1, ADV_TDS.4, ADV_FSP.5, ASE_SPD.1, ASE_CCL.1, ASE_OBJ.2, ALC_TAT.2, ASE_TSS.1, ASE_ECD.1, ATE_COV.2, ATE_FUN.1, ADV_IMP.1, ASE_INT.1, ALC_DEL.1, AGD_PRE.1, ADV_INT.2, ALC_LCD.1, ATE_DPT.3, ALC_DVS.2, ASE_REQ.2 | ATE_FUN.2, ADV_SPM.1, ALC_CMS.5, AVA_VAN.5, ADV_TDS.5, ADV_ARC.1, ATE_IND.2, ATE_COV.3, AGD_OPE.1, ADV_FSP.5, ASE_SPD.1, ASE_CCL.1, ASE_OBJ.2, ALC_TAT.3, ASE_TSS.2, ASE_ECD.1, ADV_IMP.2, ASE_INT.1, ADV_INT.3, ALC_DEL.1, AGD_PRE.1, ALC_LCD.1, ALC_CMC.5, ALC_DVS.2, ATE_DPT.3, ASE_REQ.2 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2021/02 | {} |
heuristics/report_references/directly_referencing | ANSSI-CC-2017/16 | ANSSI-CC-2021/62-R01 |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2021/02-R01, ANSSI-CC-2021/02, ANSSI-CC-2021/02-R02 | {} |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2014/22, ANSSI-CC-2014/75, ANSSI-CC-2017/16 | ANSSI-CC-2021/62, ANSSI-CC-2021/62-R01 |
protection_profiles |
|
|
pdf_data/cert_filename | certificat-CC-2022_63.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | anssi-cc-2018-43fr.pdf | ANSSI-CC-2022_63fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cible-2018_43en.pdf | ANSSI-cible-CC-2022_63en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |