This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Secured Microcontroller ATMEL AT91SC464384RCU (AT58U21) rev. B ANSSI-CC-2009/24 |
Citrix XenDesktop 7.15 LTSR Platinum Edition and Citrix XenApp 7.15 LTSR Platinum Edition 383-4-433 |
|
---|---|---|
name | Secured Microcontroller ATMEL AT91SC464384RCU (AT58U21) rev. B | Citrix XenDesktop 7.15 LTSR Platinum Edition and Citrix XenApp 7.15 LTSR Platinum Edition |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Other Devices and Systems |
scheme | FR | CA |
not_valid_after | 01.09.2019 | 30.01.2023 |
not_valid_before | 21.08.2009 | 30.01.2018 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-433%20CT%20v1.0e.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-2009_24fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-433%20CR%20v1.0e.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible2009_24en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-433%20ST%20v1.0.pdf |
manufacturer | ATMEL Smart Card ICs | Citrix Systems, Inc. |
manufacturer_web | https://www.atmel.com | https://www.citrix.com |
security_level | ADV_IMP.2, AVA_VLA.4, EAL5+, AVA_MSU.3, ALC_DVS.2 | EAL2+, ALC_FLR.2 |
dgst | a9f2aa8ed08518a0 | d055b72fdf802923 |
heuristics/cert_id | ANSSI-CC-2009/24 | 383-4-433 |
heuristics/cert_lab | SERMA | [] |
heuristics/cpe_matches | {} | cpe:2.3:a:citrix:xenapp:7.15:cu6:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xendesktop:7.15:-:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xenapp:7.15:cu7:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xendesktop:7.15:cu6:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xendesktop:7.15:cu7:*:*:ltsr:*:*:*, cpe:2.3:a:citrix:xenapp:7.15:-:*:*:ltsr:*:*:* |
heuristics/related_cves | {} | CVE-2020-8283, CVE-2020-8269, CVE-2021-22928 |
heuristics/extracted_sars | ALC_LCD.2, AGD_USR.1, ALC_DVS.2, AVA_SOF.1, ATE_COV.2, ATE_DPT.2, AGD_ADM.1, ADV_INT.1, ADV_RCR.2, ATE_FUN.1, ADV_IMP.2, ALC_TAT.2, ADV_HLD.3, AVA_VLA.4, ADV_SPM.3, ATE_IND.2, ADV_LLD.1, ADV_FSP.3, AVA_CCA.1, AVA_MSU.3 | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | - | 7.15 |
heuristics/report_references/directly_referenced_by | NSCIB-CC-09-11192-CR2 | {} |
heuristics/report_references/directly_referencing | ANSSI-CC-2009/22 | {} |
heuristics/report_references/indirectly_referenced_by | NSCIB-CC-09-11192-CR2 | {} |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2008/10, ANSSI-CC-2009/22, ANSSI-CC-2009/10 | {} |
pdf_data/cert_filename | 383-4-433 CT v1.0e.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | anssi-2009_24fr.pdf | 383-4-433 CR v1.0e.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/device_model |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cible2009_24en.pdf | 383-4-433 ST v1.0.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | False | True |
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |