This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer IC3S/DEL01/VAlIANT/EAL1/0317/0007 |
Microcontrôleurs RISC 32-bits SAMSUNG S3FS91J /S3FS91H / S3FS91V / S3FS93I, avec SWP, Rév. 7, incluant la librairie sécurisée RSA v4.2 ANSSI-CC-2013/49 |
|
---|---|---|
name | OAM (Operation, Administration & Management/Maintenance) Module VCL-MX Version 6 80 E1, 160Mbps Voice & Data Multiplexer | Microcontrôleurs RISC 32-bits SAMSUNG S3FS91J /S3FS91H / S3FS91V / S3FS93I, avec SWP, Rév. 7, incluant la librairie sécurisée RSA v4.2 |
category | Access Control Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | IN | FR |
not_valid_after | 11.12.2023 | 01.09.2019 |
not_valid_before | 12.12.2018 | 19.07.2013 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/OAM%20Certificate1.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-OAM_EAL1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-49fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST_version1.4_Valient.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-49en.pdf |
manufacturer | Valiant Communications Limited 71/1 Shivaji Marg, New Delhi-110015, India | Samsung Electronics Co., Ltd. |
manufacturer_web | https://valiantcom.com/ | https://www.samsung.com |
security_level | EAL1 | EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst | a3049a54b130f82f | c26ef732218d52b9 |
heuristics/cert_id | IC3S/DEL01/VAlIANT/EAL1/0317/0007 | ANSSI-CC-2013/49 |
heuristics/extracted_sars | ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, AGD_PRE.1 | ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.4, ALC_TAT.2, ASE_REQ.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 80, 6 | 4.2 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2009/57 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2009/57, ANSSI-CC-2009/25 |
heuristics/scheme_data |
|
|
heuristics/protection_profiles | {} | f6d23054061d72ba |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0035b.pdf |
pdf_data/cert_filename | OAM Certificate1.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | CR-OAM_EAL1.pdf | ANSSI-CC_2013-49fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ST_version1.4_Valient.pdf | ANSSI-CC-cible_2013-49en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|