This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer IC3S/DEL01/VAlIANT/EAL1/0317/0007 |
XSmart e-Passport V1.3 R2 on S3CT9KW/S3CT9KC/S3CT9K9 KECS-ISIS-0513-2014 |
|
---|---|---|
name | OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer | XSmart e-Passport V1.3 R2 on S3CT9KW/S3CT9KC/S3CT9K9 |
category | Access Control Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | IN | KR |
not_valid_after | 11.12.2023 | 25.06.2019 |
not_valid_before | 12.12.2018 | 25.06.2014 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OAM%20Certificate1.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-OAM_EAL1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-14-10%20XSmart%20e-Passport%20V1.3%20R2%20on%20S3CT9KWS3CT9KCS3CT9K9(eng).pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_version1.4_Valient.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XSMART%20e-Passport%20V1.3_R2_ASE_LITE(ENG)_v1.0.pdf |
manufacturer | Valiant Communications Limited 71/1 Shivaji Marg, New Delhi-110015, India | LG CNS |
manufacturer_web | https://valiantcom.com/ | https://www.lgcns.com/ |
security_level | EAL1 | ADV_IMP.2, EAL5+ |
dgst | a3049a54b130f82f | 73476c0b06250ac1 |
heuristics/cert_id | IC3S/DEL01/VAlIANT/EAL1/0317/0007 | KECS-ISIS-0513-2014 |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ASE_INT.1, ALC_DVS.2, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_IMP.2, ALC_CMC.5, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 80, 6 | 1.3 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2012/70 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2012/70, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referencing | {} | ANSSI-CC-2012/70, ANSSI-CC-2012/72 |
heuristics/st_references/indirectly_referencing | {} | ANSSI-CC-2012/70, ANSSI-CC-2012/72 |
heuristics/protection_profiles | {} | 4bfe1a1aff1207a4 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/20110221143918.pdf |
pdf_data/cert_filename | OAM Certificate1.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | CR-OAM_EAL1.pdf | KECS-CR-14-10 XSmart e-Passport V1.3 R2 on S3CT9KWS3CT9KCS3CT9K9(eng).pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST_version1.4_Valient.pdf | XSMART e-Passport V1.3_R2_ASE_LITE(ENG)_v1.0.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_metadata |
|