This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
DefensePro and APSolute Vision Attack Mitigation System (APSolute Vision 4.85.00, DefensePro 8.26.1.0) 2021-41-INF-4381 |
Secured Microcontrollers ATMEL AT90SC256144RCFT and AT90SC25672RCFT (AT58879) rev. E ANSSI-CC-2009/10 |
|
---|---|---|
name | DefensePro and APSolute Vision Attack Mitigation System (APSolute Vision 4.85.00, DefensePro 8.26.1.0) | Secured Microcontrollers ATMEL AT90SC256144RCFT and AT90SC25672RCFT (AT58879) rev. E |
category | Boundary Protection Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | ES | FR |
status | active | archived |
not_valid_after | 13.08.2029 | 01.09.2019 |
not_valid_before | 13.08.2024 | 20.05.2009 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-41_Certificado.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-41_INF-4381.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-2009_10fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2021-41_ST.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/dcssi-cible2009_10en.pdf |
manufacturer | Radware, LTD. | ATMEL Smart Card ICs |
manufacturer_web | https://www.radware.com/products/alteon/ | https://www.atmel.com |
security_level | EAL2 | EAL5+, AVA_MSU.3, AVA_VLA.4, ALC_DVS.2 |
dgst | a09250235cbd59f4 | f9fedf99e24bb4bc |
heuristics/cert_id | 2021-41-INF-4381 | ANSSI-CC-2009/10 |
heuristics/cert_lab | [] | SERMA |
heuristics/extracted_sars | ADV_ARC.1, ATE_IND.2, AGD_PRE.1, AGD_OPE.1, ASE_REQ.2, ADV_TDS.1, ASE_ECD.1, AVA_VAN.2, ASE_OBJ.2, ASE_SPD.1, ATE_COV.1, ASE_INT.1, ASE_TSS.1, ADV_FSP.2, ALC_DEL.1, ALC_CMC.2, ALC_CMS.2, ASE_CCL.1, ATE_FUN.1 | ATE_IND.2, ADV_FSP.3, ALC_LCD.2, AVA_SOF.1, ALC_TAT.2, ADV_SPM.3, ADV_RCR.2, ADV_IMP.2, AVA_CCA.1, AVA_MSU.3, ADV_INT.1, ADV_LLD.1, ALC_DVS.2, ATE_COV.2, AGD_USR.1, ADV_HLD.3, AGD_ADM.1, ATE_DPT.2, AVA_VLA.4, ATE_FUN.1 |
heuristics/extracted_versions | 8.26.1.0, 4.85.00 | - |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2009/22, ANSSI-CC-2009/23 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2008/10 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2009/24, NSCIB-CC-09-11192-CR2, ANSSI-CC-2009/22, ANSSI-CC-2009/23 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2008/10 |
heuristics/st_references/directly_referenced_by | {} | ANSSI-CC-2009/36 |
heuristics/st_references/indirectly_referenced_by | {} | ANSSI-CC-2010/39, ANSSI-CC-2010/25, ANSSI-CC-2009/36, ANSSI-CC-2010/38, ANSSI-CC-2010/37, ANSSI-CC-2010/36 |
maintenance_updates |
|
|
pdf_data/cert_filename | 2021-41_Certificado.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 2021-41_INF-4381.pdf | dcssi-2009_10fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 2021-41_ST.pdf | dcssi-cible2009_10en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |