This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Cisco Email Security Appliance v9.1 CCEVS-VR-VID-10631-2015 |
Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR48B), version 1.4.5 Application IAS ANSSI-CC-2010/22 |
|
---|---|---|
name | Cisco Email Security Appliance v9.1 | Sagem Sécurité Carte CC IDeal Citiz (sur composant SB23YR48B), version 1.4.5 Application IAS |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | US | FR |
not_valid_after | 21.03.2016 | 01.09.2019 |
not_valid_before | 18.09.2015 | 09.04.2010 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10631-ci.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10631-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-22en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10631-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-22en.pdf |
manufacturer | Cisco Systems, Inc. | Sagem Sécurité / STMicroelectronics |
manufacturer_web | https://www.cisco.com | https://www.st.com/ |
security_level | {} | EAL5+, AVA_VAN.5, ALC_DVS.2 |
dgst | 6c2e9ef7bd27a81f | 66d42d18e23c95f4 |
heuristics/cert_id | CCEVS-VR-VID-10631-2015 | ANSSI-CC-2010/22 |
heuristics/cert_lab | US | CEA |
heuristics/cpe_matches | cpe:2.3:a:cisco:email_security_appliance:9.1.1-000:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-036:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-028:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2-023:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0-011:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.1:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.1-036:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.1-000:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.2:*:*:*:*:*:*:*, cpe:2.3:o:cisco:email_security_appliance_firmware:9.1.0-032:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0-032:*:*:*:*:*:*:*, cpe:2.3:a:cisco:email_security_appliance:9.1.0-101:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2020-3164, CVE-2016-1480, CVE-2022-20960, CVE-2020-3137, CVE-2019-15971, CVE-2016-6406, CVE-2016-1486, CVE-2020-3133, CVE-2019-15988, CVE-2022-20664, CVE-2020-3181, CVE-2015-6321, CVE-2016-9202, CVE-2016-6356, CVE-2019-12706, CVE-2020-3447, CVE-2016-6372, CVE-2023-20009, CVE-2016-1423, CVE-2020-3370, CVE-2015-0732, CVE-2020-3132, CVE-2015-6291, CVE-2016-1481, CVE-2020-3134 | {} |
heuristics/extracted_sars | AGD_OPE.1, ADV_FSP.1, AVA_VAN.1, AGD_PRE.1, ALC_CMS.1, ALC_CMC.1, ATE_IND.1 | ADV_IMP.1, AVA_VAN.5, ADV_INT.2, ADV_COMP.1, ATE_IND.2, AGD_PRE.1, ALC_FLR.1, ADV_TDS.4, ALC_CMC.4, AVA_SOF.1, ALC_TAT.2, AGD_OPE.1, ADV_HLD.2, AVA_MSU.3, ADV_RCR.1, ALC_COMP.1, ADV_LLD.1, ATE_COMP.1, ALC_DVS.2, AVA_VLA.4, ATE_COV.2, ALC_CMS.5, AGD_USR.1, ADV_SPM.1, ADV_ARC.3, ATE_DPT.3, ADV_FSP.5, ASE_COMP.1, AGD_ADM.1, ALC_DEL.1, ALC_LCD.1, ATE_FUN.1, AVA_COMP.1 |
heuristics/extracted_versions | 9.1 | 1.4.5 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2010/57 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2010/02, ANSSI-CC-2010/19 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2011/63, NSCIB-CC-11-32973-CR, ANSSI-CC-2010/57, NSCIB-CC-09-26151-CR |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2010/02, ANSSI-CC-2009/28, ANSSI-CC-2010/19, ANSSI-CC-2009/05, ANSSI-CC-2009/50, ANSSI-CC-2009/51, ANSSI-CC-2010/01, ANSSI-CC-2009/26, ANSSI-CC-2009/06, ANSSI-CC-2009/62 |
heuristics/st_references/directly_referencing | {} | ANSSI-CC-2010/02 |
heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2010/02 |
heuristics/protection_profiles | ac9abe3d5c5a31f0 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf | {} |
pdf_data/cert_filename | st_vid10631-ci.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | st_vid10631-vr.pdf | ANSSI-CC_2010-22en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | st_vid10631-st.pdf | ANSSI-CC-cible_2010-22en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/tls_cipher_suite |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |