This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
nShield5s Hardware Security Module Version 13.5.1 None |
McAfee Database Security 5.1 with ePolicy Orchestrator 5.3.1 383-4-292 |
|
---|---|---|
name | nShield5s Hardware Security Module Version 13.5.1 | McAfee Database Security 5.1 with ePolicy Orchestrator 5.3.1 |
category | Products for Digital Signatures | Data Protection |
scheme | SG | CA |
status | active | archived |
not_valid_after | 24.09.2029 | 16.02.2021 |
not_valid_before | 24.09.2024 | 16.02.2016 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20CC%20Certificate.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-292%20CT%20v1.0e.docx |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[CER]%20nShield5s%20Hardware%20Security%20Module%20Certificate%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-292%20CR%20v1.0e.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[DD]%20[ST]%20nShield5s%20HSM%20Security%20Target%20(SCCS%20certification)-v12.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-292%20MFE%20DS%205-1%20EAL2%20ST%20v2.2.pdf |
manufacturer | Entrust, Inc. | Intel Corporation |
manufacturer_web | https://www.entrust.com | https://www.intel.com |
security_level | EAL4+, AVA_VAN.4, ALC_FLR.2 | EAL2+, ALC_FLR.2 |
dgst | aa3ed16ed6a5ff2f | f69d0e7b86e37bd8 |
heuristics/cert_id | 383-4-292 | |
heuristics/cert_lab | [] | CANADA |
heuristics/extracted_sars | ALC_FLR.2, AVA_VAN.4 | ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ATE_IND.2, ALC_DEL.1, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, AGD_OPE.1, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 |
heuristics/extracted_versions | 13.5.1 | 5.1, 5.3.1 |
heuristics/protection_profiles | ee319f4a624019b0 | {} |
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-PP-2016_05 PP.pdf | {} |
pdf_data/cert_filename | 383-4-292 CT v1.0e.docx | |
pdf_data/report_filename | 383-4-292 CR v1.0e.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id | ||
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility | ||
pdf_data/report_keywords/symmetric_crypto | ||
pdf_data/report_keywords/asymmetric_crypto | ||
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function | ||
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library |
|
|
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-292 MFE DS 5-1 EAL2 ST v2.2.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process | ||
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | False | True |
state/cert/download_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/report/convert_ok | False | True |
state/report/download_ok | False | True |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |