This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Common Criteria Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System None |
Tachograph G1, G2V1, G2V2 on IFX_CCI_000039h(version 2.2.1.N) ANSSI-CC-2022/38-R01 |
|
---|---|---|
name | Common Criteria Protection Profile for Application Firmware of Secure Smartcard Reader for National Electronic Identity Verification System | Tachograph G1, G2V1, G2V2 on IFX_CCI_000039h(version 2.2.1.N) |
scheme | TR | FR |
status | archived | active |
not_valid_after | 03.12.2018 | 17.03.2030 |
not_valid_before | 03.12.2015 | 17.03.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2022_38-R01.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KEC%20PP%20Certification%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2022_38-R01fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Protection%20Profile%20for%20Secure%20Smartcard%20Reader%20Application%20Firmware_v2.5.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2022_38-R01en.pdf |
manufacturer | TÜBİTAK BİLGEM UEKAE | THALES DIS FRANCE SA |
manufacturer_web | https://www.uekae.tubitak.gov.tr | https://www.thalesgroup.com/en/europe/france |
security_level | EAL4+, ALC_DVS.2 | ALC_DVS.2, EAL4+, ATE_DPT.2, AVA_VAN.5 |
dgst | 8555499546529d0c | 1310fc53f85bc176 |
heuristics/cert_id | ANSSI-CC-2022/38-R01 | |
heuristics/extracted_sars | ALC_DVS.2, AVA_VAN.5 | ALC_FLR.1, ATE_DPT.2, ATE_FUN.1, AVA_VAN.5, ALC_DEL.1, ALC_DVS.2, ADV_ARC.1, ADV_TDS.3, AGD_OPE.1 |
heuristics/extracted_versions | - | 2.2.1 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-1107-V5-2024 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-1107-V3-2022, BSI-DSZ-CC-1107-V5-2024, BSI-DSZ-CC-1107-V4-2023 |
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-1107-V5-2024 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-1107-V5-2024 |
heuristics/protection_profiles | {} | d9ddf0d150631fef, 366f39631e23f94e |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0091b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0070b_pdf.pdf |
pdf_data/cert_filename | certificat-2022_38-R01.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | KEC PP Certification Report.pdf | ANSSI-CC-2022_38-R01fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/cipher_mode |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Protection Profile for Secure Smartcard Reader Application Firmware_v2.5.pdf | ANSSI-cible-CC-2022_38-R01en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |