This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| ATMEL AT90SC6464C Integrated circuit (reference AT568A9 rev. F) ANSSI-CC-2001/14 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 |
|
|---|---|---|
| name | ATMEL AT90SC6464C Integrated circuit (reference AT568A9 rev. F) | Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
| category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Detection Devices and Systems |
| scheme | FR | US |
| not_valid_after | 01.09.2019 | 01.11.2014 |
| not_valid_before | 01.01.2001 | 01.10.2012 |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2001_14.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf | |
| manufacturer | ATMEL Smart Card ICs | Tenable Network Security, Inc. |
| manufacturer_web | https://www.atmel.com | https://www.tenable.com/ |
| security_level | EAL1+, AVA_VLA.2 | EAL2+, ALC_FLR.2 |
| dgst | 9f4e2da76f2df1fc | 7a9d9dd29e76bfba |
| heuristics/cert_id | ANSSI-CC-2001/14 | CCEVS-VR-VID-10443-2012 |
| heuristics/cert_lab | [] | US |
| heuristics/cpe_matches | {} | cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
| heuristics/related_cves | {} | CVE-2023-3251, CVE-2022-23852, CVE-2021-46143, CVE-2022-4313, CVE-2019-3961, CVE-2021-3450, CVE-2022-22826, CVE-2022-22823, CVE-2016-1000029, CVE-2018-1141, CVE-2022-3499, CVE-2022-0778, CVE-2016-4055, CVE-2022-32973, CVE-2019-3982, CVE-2017-18214, CVE-2018-20843, CVE-2018-5407, CVE-2022-22825, CVE-2020-5765, CVE-2016-9260, CVE-2021-3449, CVE-2019-3923, CVE-2019-1559, CVE-2021-45960, CVE-2024-0955, CVE-2021-20135, CVE-2023-6062, CVE-2022-22822, CVE-2018-1147, CVE-2024-0971, CVE-2019-3962, CVE-2021-20106, CVE-2022-33757, CVE-2023-3252, CVE-2022-22824, CVE-2016-1000028, CVE-2023-6178, CVE-2022-23990, CVE-2020-5774, CVE-2022-32974, CVE-2022-28291, CVE-2018-1148, CVE-2017-5179, CVE-2023-3253, CVE-2021-20079, CVE-2022-22827 |
| heuristics/extracted_sars | ASE_ENV.1, AGD_ADM.1, ADV_RCR.1, AVA_VLA.2, AGD_USR.1, ASE_INT.1, ATE_IND.1, ASE_OBJ.1, ASE_REQ.1, ASE_TSS.1, ASE_PPC.1, ASE_SRE.1, ASE_DES.1, ADV_FSP.1 | ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 |
| heuristics/extracted_versions | - | 5.0.1, 2.0.1, 4.4, 2.1, 3.6 |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | {} | 44cdd911811b36d2 |
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
| pdf_data/report_filename | 2001_14.pdf | st_vid10443-vr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/device_model |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | st_vid10443-st.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor | ||
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto | ||
| pdf_data/st_keywords/asymmetric_crypto | ||
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function | ||
| pdf_data/st_keywords/crypto_scheme | ||
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness | ||
| pdf_data/st_keywords/cipher_mode | ||
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id | ||
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |