This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Secured Microcontroller ATMEL AT91SC464384RCU (AT58U21) rev. B ANSSI-CC-2009/24 |
HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. IC3S/BG01/HALTDOS/EAL2/0317/0008 |
|
---|---|---|
name | Secured Microcontroller ATMEL AT91SC464384RCU (AT58U21) rev. B | HaltDos Mitigation Platform version 1.1 comprising of hdInspector version 1.0, hdDeviceUI version 2.0, hdDetectionService version 1.0 and hdCLI version 2.0. |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Boundary Protection Devices and Systems |
scheme | FR | IN |
not_valid_after | 01.09.2019 | 02.06.2024 |
not_valid_before | 21.08.2009 | 03.06.2019 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/HaltDoS%20Certificate.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-2009_24fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CR-%20HaltDOS_EAL2.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2009_24en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST-version1.4.pdf |
manufacturer | ATMEL Smart Card ICs | Haltdos.com Private Limited E – 52, Sector -3, Noida, UP, 201301, India |
manufacturer_web | https://www.atmel.com | https://www.haltdos.com/ |
security_level | ADV_IMP.2, AVA_VLA.4, EAL5+, AVA_MSU.3, ALC_DVS.2 | ALC_CMC.3, EAL2, ALC_CMS.3 |
dgst | a9f2aa8ed08518a0 | 0f265653766dcb0c |
heuristics/cert_id | ANSSI-CC-2009/24 | IC3S/BG01/HALTDOS/EAL2/0317/0008 |
heuristics/cert_lab | SERMA | [] |
heuristics/extracted_sars | ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 | ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | - | 1.1, 1.0, 2.0 |
heuristics/report_references/directly_referenced_by | NSCIB-CC-09-11192-CR2 | {} |
heuristics/report_references/directly_referencing | ANSSI-CC-2009/22 | {} |
heuristics/report_references/indirectly_referenced_by | NSCIB-CC-09-11192-CR2 | {} |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2008/10, ANSSI-CC-2009/22, ANSSI-CC-2009/10 | {} |
heuristics/scheme_data |
|
|
pdf_data/cert_filename | HaltDoS Certificate.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function |
|
|
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol |
|
|
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | anssi-2009_24fr.pdf | CR- HaltDOS_EAL2.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cible2009_24en.pdf | ST-version1.4.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |