Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Renesas HD65256D1 Version 02
BSI-DSZ-CC-0529-2010
Symantec™ Endpoint Protection Version 12.1.2
383-4-217
name Renesas HD65256D1 Version 02 Symantec™ Endpoint Protection Version 12.1.2
category ICs, Smart Cards and Smart Card-Related Devices and Systems Other Devices and Systems
scheme DE CA
not_valid_after 01.09.2019 19.04.2018
not_valid_before 24.03.2010 05.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529a_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-217%20CR%20v1.0e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0529b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-217%20ST%20v08.pdf
manufacturer Renesas Technology Corporation Symantec Corporation
manufacturer_web https://am.renesas.com/ https://www.symantec.com
security_level ALC_DVS.2, AVA_VLA.4, ADV_IMP.2, EAL4+, AVA_MSU.3 EAL2+, ALC_FLR.2
dgst ac37e8c6afcb4efc df6fcbee2a844e67
heuristics/cert_id BSI-DSZ-CC-0529-2010 383-4-217
heuristics/cert_lab BSI CANADA
heuristics/cpe_matches {} cpe:2.3:a:symantec:endpoint_protection:12.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1.2.1:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection:12.1.2:*:*:*:*:*:*:*, cpe:2.3:a:symantec:endpoint_protection_manager:12.1.2:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2014-9227, CVE-2020-5836, CVE-2018-12239, CVE-2020-5833, CVE-2014-3434, CVE-2018-5236, CVE-2016-9094, CVE-2012-4348, CVE-2012-0294, CVE-2018-18368, CVE-2013-5015, CVE-2020-5834, CVE-2020-5837, CVE-2013-1612, CVE-2019-18372, CVE-2020-5828, CVE-2018-12238, CVE-2012-0295, CVE-2018-12245, CVE-2019-12759, CVE-2014-3437, CVE-2018-5237, CVE-2014-3439, CVE-2020-5830, CVE-2020-5835, CVE-2019-12758, CVE-2014-9229, CVE-2013-5014, CVE-2017-6331, CVE-2020-5831, CVE-2016-9093, CVE-2020-5827, CVE-2016-5311, CVE-2014-3438, CVE-2020-5829, CVE-2014-9228
heuristics/extracted_sars ADV_IMP.2, AVA_VLA.4, ADV_SPM.1, ALC_TAT.1, ALC_LCD.1, AVA_MSU.3, ALC_DVS.2 ADV_ARC.1, ASE_TSS.1, AGD_OPE.1, ALC_CMC.2, ADV_FSP.2, ALC_FLR.2, ASE_REQ.2, AVA_VAN.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ASE_ECD.1, ADV_TDS.1, ALC_DEL.1, ASE_OBJ.2, ALC_CMS.2, ATE_COV.1, ASE_INT.1, ASE_SPD.1, ATE_FUN.1
heuristics/extracted_versions 02 12.1.2
heuristics/report_references/directly_referencing BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0489-2008 {}
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0353-2006, BSI-DSZ-CC-0489-2008, BSI-DSZ-CC-0434-2007, BSI-DSZ-CC-0329-2006, BSI-DSZ-CC-0350-2007 {}
heuristics/protection_profiles {} fbbc69dcdf858c77
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_AV_BR_V1.2.pdf
pdf_data/report_filename 0529a_pdf.pdf 383-4-217 CR v1.0e.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0529-2010
    • cert_item: Renesas HD65256D1 Version 02
    • cert_lab: BSI
    • developer: Renesas Technology Corp. sponsored by Renesas Technology Europe Ltd
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • CA:
  • DE:
  • CA:
    • cert_id: 383-4-217-CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0434-2007: 4
    • BSI-DSZ-CC-0489-2008: 1
    • BSI-DSZ-CC-0529: 2
    • BSI-DSZ-CC-0529-2010: 18
  • CA:
    • 383-4-217-CR: 1
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0002-2001: 4
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 9
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 4
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL 2+: 3
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_AUT.1: 1
    • ACM_CAP: 2
    • ACM_CAP.4: 1
    • ACM_SCP: 2
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 1
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.2: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.2: 6
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_LCD.1: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 1
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 6
  • ALC:
    • ALC_FLR.2: 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon Technologies AG: 1
  • Philips:
    • Philips: 1
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 3
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 6
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/randomness
  • RNG:
    • RNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 1
  • SCA:
    • physical probing: 1
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 25: 3
    • AIS 26: 3
    • AIS 31: 2
    • AIS 32: 1
    • AIS 34: 3
    • AIS 35: 2
    • AIS 38: 1
    • AIS31: 1
    • AIS37: 1
  • ISO:
    • ISO/IEC 15408:2005: 3
  • FIPS:
    • FIPS 140-2: 1
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 02 (HD65256D1), Brightsight (confidential document) [8] Configuration list for the TOE, Version 0.6.6, 22 July 2009, Document Version for the Common: 1
    • 5.0, 14 July 2009, HD65256D1 Version 02 Smartcard Security Target, Renesas Technology Corp. (confidential document) [7] Evaluation Technical Report, Version 3.0, 8 February 2010, Evaluation Technical Report AE56D1: 1
    • confidential document) [9] Security Target BSI-DSZ-CC-0529, Version 2.0, 14 July 2009, HD65256D1 Version 02 Smartcard: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20100413092737+02'00'
  • /Creator: Writer
  • /Keywords: "Certification, Common Criteria, Renesas HD65256D1 Version 02, Renesas Technology Europe Ltd, Renesas Technology Corp."
  • /ModDate: D:20100422145117+02'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0529-2010
  • pdf_file_size_bytes: 370401
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
  • /Author: Cory Clark
  • /CCEF: EWA-Canada
  • /CR date: 20 May 2013
  • /CR version: 1.0
  • /Certificate date: 20 May 2013
  • /CreationDate: D:20130522141026-04'00'
  • /Creator: Acrobat PDFMaker 9.0 for Word
  • /Developer name: Symantec Corporation
  • /Document number: 383-4-217-CR
  • /ETR title, version, date: Evaluation Technical Report for EAL 2+ Common Criteria Evaluation of Symantec Corporation Symantec™ Endpoint Protection Version 12.1.2, Version 1.0, 5 March 2013
  • /Evaluation completion date: 5 March 2013
  • /ModDate: D:20130522141518-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /ST Title: Security Target Symantec™ Endpoint Protection Version 12.1.2
  • /ST date: 13 February 2013
  • /ST version: 0.8
  • /SourceModified: D:20130522180951
  • /Sponsor: Symantec Corporation
  • /TOE Version: 12.1.2
  • /TOE name and version: Symantec™ Endpoint Protection Version 12.1.2
  • /TOE short name: SEP v12.1.2
  • /Title: EAL 2 Evaluation of <TOE name and version>
  • pdf_file_size_bytes: 68770
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename 0529b_pdf.pdf 383-4-217 ST v08.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP- 0002: 4
    • BSI-PP-0002: 82
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_CAP: 1
    • ACM_SCP: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 2
    • ADV_LLD: 1
    • ADV_RCR: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 4
  • AGD:
    • AGD_ADM: 3
    • AGD_USR: 3
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_LCD: 1
    • ALC_TAT: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 2
    • AVA_SOF: 6
    • AVA_VLA: 1
    • AVA_VLA.4: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 3
    • ADV_FSP: 1
    • ADV_FSP.2: 4
    • ADV_TDS: 1
    • ADV_TDS.1: 3
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 3
    • AGD_PRE: 1
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 4
    • ALC_CMS: 1
    • ALC_CMS.2: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 4
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 4
    • ATE_FUN: 1
    • ATE_FUN.1: 2
    • ATE_IND: 1
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
    • FAU_SAS.1: 9
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 2
    • FCS_RND: 1
    • FCS_RND.1: 9
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 16
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 17
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 12
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 10
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 1
  • FMT:
    • FMT_LIM: 1
    • FMT_LIM.1: 10
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 10
    • FMT_LIM.2.1: 1
    • FMT_MSA.1: 2
    • FMT_MSA.2: 14
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 6
    • FMT_SMR.1: 1
  • FPT:
    • FPT_AMT.1: 1
    • FPT_FLS.1: 30
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 9
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 12
    • FPT_PHP.3.1: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 15
  • FAU:
    • FAU_GEN: 19
    • FAU_GEN.1: 10
    • FAU_GEN.2: 2
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_STG: 15
    • FAU_STG.1: 8
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 1
    • FCS_COP.1: 7
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 2
    • FIA_UID.1: 2
  • FMT:
    • FMT_MOF.1: 22
    • FMT_MOF.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MTD.1: 12
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.RND: 4
  • T:
    • T.RND: 4
  • A:
    • A.AUDIT_ALARM: 1
    • A.AUDIT_BACKUP: 3
    • A.DOMAIN_SEPARATION: 1
    • A.NO_BYPASS: 3
    • A.NO_EVIL: 1
    • A.PHYSICAL: 3
    • A.SECURE_COMMS: 1
    • A.SECURE_UPDATES: 3
  • O:
    • O.ADMIN_GUIDANCE: 5
    • O.ADMIN_ROLE: 4
    • O.AUDIT_GEN: 1
    • O.AUDIT_GENERATION: 5
    • O.AUDIT_PROTECT: 4
    • O.AUDIT_REVIEW: 5
    • O.CONFIGURATION_IDEN: 1
    • O.CONFIGURATION_IDENTIFI-: 1
    • O.CONFIGURATION_IDENTIFICATIO: 3
    • O.CONFIGURATION_IDENTIFICATION: 2
    • O.CORRECT_TSF_OPERATI: 1
    • O.CORRECT_TSF_OPERATION: 5
    • O.CRYPTOGRAPHY: 4
    • O.DOCUMENTED_DESIGN: 7
    • O.MANAGE: 5
    • O.PARTIAL_FUNCTIONAL_: 1
    • O.PARTIAL_FUNCTIONAL_TEST: 3
    • O.PARTIAL_FUNCTIONAL_TESTING: 2
    • O.PARTIAL_SELF_PROTEC: 1
    • O.PARTIAL_SELF_PROTECTION: 4
    • O.VIRUS: 6
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSIS: 2
    • O.VULNERABILITY_ANALYSIS_TEST: 3
  • OE:
    • OE.AUDIT_ALARM: 4
    • OE.AUDIT_BACKUP: 3
    • OE.AUDIT_STORAGE: 3
    • OE.DISPLAY_BANNER: 3
    • OE.DOMAIN_SEPARATIO: 1
    • OE.DOMAIN_SEPARATION: 4
    • OE.NO_BYPASS: 5
    • OE.NO_EVIL: 3
    • OE.PHYSICAL: 3
    • OE.RESIDUAL_: 1
    • OE.RESIDUAL_INFORMATI: 1
    • OE.RESIDUAL_INFORMATION: 4
    • OE.SECURE_COMMS: 3
    • OE.SECURE_UPDATES: 3
    • OE.TIME_STAMPS: 5
    • OE.TOE_ACCESS: 5
  • T:
    • T.ACCIDENTAL_ADMIN_: 1
    • T.ACCIDENTAL_ADMIN_ERROR: 3
    • T.AUDFUL: 1
    • T.AUDITFUL: 2
    • T.AUDIT_: 2
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATIO: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 3
    • T.UNATTENDED_: 1
    • T.UNATTENDED_SESSION: 1
    • T.UNIDENTIFIED_ACTIONS: 3
    • T.VIRUS: 1
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon Technologies: 1
  • Philips:
    • Philips: 1
  • Microsoft:
    • Microsoft: 3
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 52
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 8
    • RNG: 18
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • ECB:
    • ECB: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 2
    • Malfunction: 15
    • malfunction: 5
    • physical tampering: 1
  • SCA:
    • DPA: 2
    • Leak-Inherent: 16
    • Physical Probing: 2
    • Physical probing: 1
    • physical probing: 4
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 7
  • FIPS:
    • FIPS PUB 46-3: 3
  • FIPS:
    • FIPS 140-2: 8
    • FIPS 180-2: 1
  • ISO:
    • ISO/IEC 15408: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • is also a part of TOE. But in the case of the package includes another chip, another chip is out of scope of the TOE. The package type is listed in section 2.1.1. 1.3 ST Overview This document is the ST: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Renesas Electronics Corporation
  • /CreationDate: D:20090714085001+09'00'
  • /Creator: クセロPDF v1.14 Rev0495
  • /Keywords: HD65256D1, Common Criteria Certification, Security Controller, Security Target, EAL4+
  • /ModDate: D:20100422104451+01'00'
  • /Producer: Xelo PDF Library
  • /Subject: Common Criteria Certification BSI-DSZ-CC-0529-2010
  • /Title: HD65256D1 Version 02 Smartcard Security Target -Public Version-
  • pdf_file_size_bytes: 953247
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different