This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
ST19 platform (0.6æ technology). ST19SF04ABxyz Integrated circuit ANSSI-CC-2000/12 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 |
|
---|---|---|
name | ST19 platform (0.6æ technology). ST19SF04ABxyz Integrated circuit | Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Detection Devices and Systems |
scheme | FR | US |
not_valid_after | 01.09.2019 | 01.11.2014 |
not_valid_before | 01.01.2000 | 01.10.2012 |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2000_12.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf | |
manufacturer | STMicroelectronics | Tenable Network Security, Inc. |
manufacturer_web | https://www.st.com/ | https://www.tenable.com/ |
security_level | ADV_IMP.2, AMA_EVA.1, ALC_FLR.1, AVA_VLA.4, AMA_SIA.2, AMA_AMP.1, EAL4+, ALC_DVS.2 | EAL2+, ALC_FLR.2 |
dgst | 549f87b12967f4e1 | 7a9d9dd29e76bfba |
heuristics/cert_id | ANSSI-CC-2000/12 | CCEVS-VR-VID-10443-2012 |
heuristics/cert_lab | [] | US |
heuristics/cpe_matches | {} | cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
heuristics/related_cves | {} | CVE-2022-33757, CVE-2021-45960, CVE-2016-1000028, CVE-2018-1148, CVE-2021-20106, CVE-2022-32973, CVE-2022-22826, CVE-2018-20843, CVE-2018-1147, CVE-2018-1141, CVE-2022-22822, CVE-2022-3499, CVE-2024-0955, CVE-2022-32974, CVE-2019-1559, CVE-2016-1000029, CVE-2022-0778, CVE-2016-4055, CVE-2020-5765, CVE-2022-22825, CVE-2019-3923, CVE-2022-22823, CVE-2021-3449, CVE-2019-3962, CVE-2021-46143, CVE-2021-20079, CVE-2021-20135, CVE-2021-3450, CVE-2018-5407, CVE-2019-3982, CVE-2017-5179, CVE-2024-0971, CVE-2023-3253, CVE-2020-5774, CVE-2023-3252, CVE-2022-28291, CVE-2023-6178, CVE-2022-22824, CVE-2023-3251, CVE-2022-22827, CVE-2023-6062, CVE-2022-4313, CVE-2022-23990, CVE-2016-9260, CVE-2022-23852, CVE-2017-18214, CVE-2019-3961 |
heuristics/extracted_sars | ATE_COV.2, ALC_FLR.1, ALC_TAT.1, AVA_VLA.4, AVA_MSU.2, ADV_RCR.1, ATE_FUN.1, ATE_IND.2, AGD_ADM.1, ALC_DVS.2, ADV_IMP.2, ADV_FSP.2 | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | 0.6 | 4.4, 5.0.1, 2.0.1, 3.6, 2.1 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2001/18, ANSSI-CC-2001/10 | {} |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2001/18, ANSSI-CC-2001/10 | {} |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | 44cdd911811b36d2 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
pdf_data/report_filename | 2000_12.pdf | st_vid10443-vr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10443-st.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto | ||
pdf_data/st_keywords/asymmetric_crypto | ||
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function | ||
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id | ||
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |