This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
EMC® Symmetrix® Access Control, Enginuity™ 5771 with EMC® Solutions Enabler 6.3 383-4-61 |
S3K170A / S3K140A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software version S3K170A_20201028 ANSSI-CC-2021/04 |
|
---|---|---|
name | EMC® Symmetrix® Access Control, Enginuity™ 5771 with EMC® Solutions Enabler 6.3 | S3K170A / S3K140A 32-bit RISC Microcontroller for Smart Card with optional AT1 Secure Libraries including specific IC Dedicated software version S3K170A_20201028 |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | archived | active |
not_valid_after | 29.09.2015 | 01.02.2026 |
not_valid_before | 13.11.2007 | 01.02.2021 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_04.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-symmetrix_cert-e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_04-kootenai2r4.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/emc-symmetrix_sec-e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible-anssi-cc-2021_04en.pdf |
manufacturer | EMC Corporation | SAMSUNG ELECTRONICS INC. |
manufacturer_web | https://www.emc.com/ | https://www.samsung.com/sec |
security_level | EAL2+, ALC_FLR.1 | AVA_VAN.5, EAL5+ |
dgst | 6e85a8ba642f95a2 | 13dba74868634323 |
heuristics/cert_id | 383-4-61 | ANSSI-CC-2021/04 |
heuristics/cert_lab | CANADA | [] |
heuristics/extracted_sars | ALC_FLR.1, AGD_USR.1, AVA_VLA.1, ADV_RCR.1, ATE_COV.1, ADV_FSP.1, ATE_IND.2, ADV_HLD.1, AGD_ADM.1, ATE_FUN.1 | ALC_CMS.5, AGD_OPE.1, ALC_TAT.2, ASE_ECD.1, ADV_TDS.4, ALC_DEL.1, ALC_LCD.1, ADV_ARC.1, ADV_IMP.1, ASE_SPD.1, ADV_INT.2, ASE_INT.1, ASE_OBJ.2, ASE_CCL.1, ASE_REQ.2, ATE_DPT.3, ATE_IND.2, AVA_VAN.5, ASE_TSS.1, ATE_COV.2, ATE_FUN.1, ALC_DVS.2, ADV_FSP.5, ALC_CMC.4, AGD_PRE.1 |
heuristics/extracted_versions | 6.3 | 32 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2019/60 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2019/01, ANSSI-CC-2017/12, ANSSI-CC-2017/53, ANSSI-CC-2019/59, ANSSI-CC-2019/60, ANSSI-CC-2019/02, ANSSI-CC-2017/11, ANSSI-CC-2018/13, ANSSI-CC-2018/12 |
heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | certificat-2021_04.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | emc-symmetrix_cert-e.pdf | anssi-cc-2021_04-kootenai2r4.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | emc-symmetrix_sec-e.pdf | cible-anssi-cc-2021_04en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |