This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Dell EMC™ SupportAssist Enterprise 4.0 with Policy Manager 6.8 487-EWA-2019 |
Oberthur Card ID-One ePass 64K: application ID-One ePass 64K embedded on Philips (NXP) P5CD072/V0P and P5CD072/V0Q components ANSSI-CC-2007/06 |
|
---|---|---|
name | Dell EMC™ SupportAssist Enterprise 4.0 with Policy Manager 6.8 | Oberthur Card ID-One ePass 64K: application ID-One ePass 64K embedded on Philips (NXP) P5CD072/V0P and P5CD072/V0Q components |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | active | archived |
not_valid_after | 06.08.2025 | 01.09.2019 |
not_valid_before | 06.08.2020 | 23.03.2007 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/487%20EWA%202019%20CT%20v1.0.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/487%20EWA%202019%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_06en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/487%20EWA%202019%20ST%20v1.2.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_06en.pdf |
manufacturer | Dell EMC | Oberthur Card System / Philips (NXP) |
manufacturer_web | https://www.dellemc.com/en-ca/index.htm | https://www.oberthur.com/ |
security_level | EAL2+, ALC_FLR.2 | ADV_IMP.2, EAL4+, ALC_DVS.2 |
dgst | 6be8a83ddab92fc2 | a49f52088f921f52 |
heuristics/cert_id | 487-EWA-2019 | ANSSI-CC-2007/06 |
heuristics/cert_lab | [] | CEA |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_MSU.2, AVA_VLA.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ALC_DVS.2, ADV_FSP.2, ADV_IMP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1 |
heuristics/extracted_versions | 4.0, 6.8 | - |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0348-2006, BSI-DSZ-CC-0349-2006 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0348-2006, BSI-DSZ-CC-0227-2004, BSI-DSZ-CC-0349-2006, BSI-DSZ-CC-0312-2005 |
heuristics/scheme_data |
|
|
maintenance_updates |
|
|
pdf_data/cert_filename | 487 EWA 2019 CT v1.0.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 487 EWA 2019 CR v1.0.pdf | 2007_06en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability |
|
|
pdf_data/report_keywords/ic_data_group |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 487 EWA 2019 ST v1.2.pdf | cible2007_06en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |