This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer IC3S/DEL01/VAlIANT/EAL1/0317/0007 |
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB ANSSI-CC-2009/56 |
|
---|---|---|
name | OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer | Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB |
category | Access Control Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | IN | FR |
not_valid_after | 11.12.2023 | 01.09.2019 |
not_valid_before | 12.12.2018 | 17.02.2010 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OAM%20Certificate1.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-OAM_EAL1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-56en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_version1.4_Valient.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-56en.pdf |
manufacturer | Valiant Communications Limited 71/1 Shivaji Marg, New Delhi-110015, India | Gemalto / NXP Semiconductors |
manufacturer_web | https://valiantcom.com/ | https://www.gemalto.com/ |
security_level | EAL1 | EAL4+, ALC_DVS.2, AVA_VAN.5 |
dgst | a3049a54b130f82f | 03de79a10467e320 |
heuristics/cert_id | IC3S/DEL01/VAlIANT/EAL1/0317/0007 | ANSSI-CC-2009/56 |
heuristics/cert_lab | [] | SERMA |
heuristics/indirect_transitive_cves | {} | CVE-2014-2103, CVE-2014-3402, CVE-2014-3406, CVE-2011-4022, CVE-2013-1218, CVE-2013-1243 |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ATE_COV.2, AVA_VLA.4, ALC_TAT.1, ATE_FUN.1, AVA_VAN.5, ADV_FSP.4, ALC_DEL.1, ATE_IND.2, ALC_DVS.2, ALC_LCD.1, AGD_OPE.1, ADV_IMP.2, ADV_TDS.3, ADV_ARC.1, ATE_DPT.1, ALC_CMC.4, AVA_MSU.3, AGD_PRE.1 |
heuristics/extracted_versions | 80, 6 | 1.2, 4.2.7, 1.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2012/81, ANSSI-CC-2010/59, ANSSI-CC-2010/52 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2012/81, ANSSI-CC-2010/59, ANSSI-CC-2010/52, Certificate Number: 2012/81 |
heuristics/scheme_data |
|
|
pdf_data/cert_filename | OAM Certificate1.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | CR-OAM_EAL1.pdf | ANSSI-CC_2009-56en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST_version1.4_Valient.pdf | anssi-cc-cible_2009-56en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|