This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| BEA WebLogic Integration V8.1 SP6 with BEA07-169.00 Security Advisory Patch CCEVS-VR-VID-10029-2007 |
S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (Revision 1) ANSSI-CC-2021/30-R01 |
|
|---|---|---|
| name | BEA WebLogic Integration V8.1 SP6 with BEA07-169.00 Security Advisory Patch | S3NSEN4/S3NSEN3 with Bootloader & system API v1.1, DTRNG FRO M libraries v2.2, v3.3 & PTG.1 DTRNG FROM library v1.4 (Revision 1) |
| category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | US | FR |
| status | archived | active |
| not_valid_after | 20.07.2012 | 06.07.2027 |
| not_valid_before | 19.10.2007 | 06.07.2022 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_2021_30-r01fr.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10029-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_30-r01.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10029-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_30-r01.pdf |
| manufacturer | BAE Systems, Inc. | SAMSUNG ELECTRONICS INC. |
| manufacturer_web | https://www.baesystems.com/ | https://www.samsung.com/sec |
| security_level | EAL2+, ALC_FLR.1 | EAL6+, ASE_TSS.2 |
| dgst | 5a82ae64e7775111 | f93be9a7aeed78d6 |
| heuristics/cert_id | CCEVS-VR-VID-10029-2007 | ANSSI-CC-2021/30-R01 |
| heuristics/cert_lab | US | [] |
| heuristics/cpe_matches | {} | cpe:2.3:h:samsung:s3nsen4:-:*:*:*:*:*:*:* |
| heuristics/extracted_sars | ADV_HLD.1, AVA_VLA.1, ATE_FUN.1, ATE_IND.2, ATE_COV.1, ADV_RCR.1, AGD_ADM.1, AVA_SOF.1, AGD_USR.1, ALC_FLR.1, ADV_SPM.1, ADV_FSP.1 | ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ASE_REQ.2, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ALC_TAT.3, ALC_LCD.1, ALC_DVS.2, ADV_TDS.5, ASE_SPD.1, ATE_COV.3, ADV_INT.3, ASE_TSS.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ADV_SPM.1, ADV_ARC.1 |
| heuristics/extracted_versions | 8.1, 169.00 | 1.1, 1.4, 2.2, 3.3 |
| heuristics/report_references/directly_referencing | {} | ANSSI-CC-2021/30 |
| heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2018/30, ANSSI-CC-2021/30, ANSSI-CC-2019/29 |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
| pdf_data/cert_filename | certificat_2021_30-r01fr.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness |
|
|
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/cert_metadata |
|
|
| pdf_data/report_filename | st_vid10029-vr.pdf | anssi-cc-2021_30-r01.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_sfr |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | st_vid10029-st.pdf | anssi-cible-cc-2021_30-r01.pdf |
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/extract_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |