This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| CC IDeal Citiz SmartCard (on SB23YR80B), version 1.4.5 IAS ECC application with PIN or MOC authentication ANSSI-CC-2010/56 |
IAS Classic V4.4.2 with MOC server v1.1 on MultiApp V4.0.1(IAS version 4.4.2.A / MOC Server 1.1.1A) (ANSSI-CC-2018/24-R01) ANSSI-CC-2018/24-R01 |
|
|---|---|---|
| name | CC IDeal Citiz SmartCard (on SB23YR80B), version 1.4.5 IAS ECC application with PIN or MOC authentication | IAS Classic V4.4.2 with MOC server v1.1 on MultiApp V4.0.1(IAS version 4.4.2.A / MOC Server 1.1.1A) (ANSSI-CC-2018/24-R01) |
| status | archived | active |
| not_valid_after | 01.09.2019 | 04.02.2031 |
| not_valid_before | 17.09.2010 | 04.02.2026 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018-24-R01-certificat.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2010-56en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018-24-R01-rapport.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2010-56en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2018-24-R01-cible.pdf |
| manufacturer | Sagem Sécurité / STMicroelectronics | THALES DIS FRANCE SA |
| manufacturer_web | https://www.st.com/ | https://www.thalesgroup.com/en/europe/france |
| dgst | bc2751bf8f0c8fd6 | b953dc8eccbc33bb |
| heuristics/cert_id | ANSSI-CC-2010/56 | ANSSI-CC-2018/24-R01 |
| heuristics/cert_lab | CEA | [] |
| heuristics/extracted_sars | ATE_COMP.1, AVA_VAN.5, ADV_FSP.5, ALC_DVS.2, AVA_SOF.1, ALC_FLR.1, ALC_COMP.1, AVA_VLA.4, ATE_COV.2, ALC_LCD.1, AVA_COMP.1, ATE_FUN.1, ADV_HLD.2, AVA_MSU.3, ADV_TDS.4, AGD_PRE.1, ADV_COMP.1, ADV_INT.2, ALC_TAT.2, ALC_CMC.4, ADV_ARC.3, AGD_USR.1, ADV_SPM.1, ATE_IND.2, AGD_OPE.1, ALC_DEL.1, ADV_LLD.1, ASE_COMP.1, ALC_CMS.5, AGD_ADM.1, ADV_IMP.1, ADV_RCR.1, ATE_DPT.3 | ALC_DVS.2, AVA_VAN.5 |
| heuristics/extracted_versions | 1.4.5 | 4.0.1, 4.4.2, 1.1, 1.1.1 |
| heuristics/report_references/directly_referenced_by | ANSSI-CC-2011/63, ANSSI-CC-2016/07 | {} |
| heuristics/report_references/directly_referencing | ANSSI-CC-2010/02, ANSSI-CC-2010/19 | ANSSI-CC-2017/76-R01 |
| heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2011/63, ANSSI-CC-2016/07 | {} |
| heuristics/report_references/indirectly_referencing | ANSSI-CC-2010/02, ANSSI-CC-2009/50, ANSSI-CC-2009/26, ANSSI-CC-2009/05, ANSSI-CC-2010/19, ANSSI-CC-2009/51, ANSSI-CC-2009/62, ANSSI-CC-2009/06, ANSSI-CC-2010/01, ANSSI-CC-2009/28 | ANSSI-CC-2017/76-R01, BSI-DSZ-CC-0891-V3-2018, BSI-DSZ-CC-0891-V4-2019, BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0891-V6-2021, BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0891-V7-2024 |
| heuristics/st_references/directly_referenced_by | ANSSI-CC-2016/07 | {} |
| heuristics/st_references/directly_referencing | ANSSI-CC-2010/02 | BSI-DSZ-CC-0891-V5-2021 |
| heuristics/st_references/indirectly_referenced_by | OCSI/CERT/CCL/14/2022/RC, ANSSI-CC-2016/07 | {} |
| heuristics/st_references/indirectly_referencing | ANSSI-CC-2010/02 | BSI-DSZ-CC-0891-V5-2021 |
| heuristics/protection_profiles | 9863a376f3bb4175, 40002c3611fc465f | 1f7ea2e05de5b88b, d918b28fd7bb5d79, 27abdb9c6ab375a7, d9553e7194783182, 4a814d0e3c9f9082 |
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0006b.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0005b.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0075b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0071b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0059b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0076b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0072b_pdf.pdf |
| pdf_data/cert_filename | ANSSI-CC-2018-24-R01-certificat.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/report_filename | ANSSI-CC_2010-56en.pdf | ANSSI-CC-2018-24-R01-rapport.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | ANSSI-CC-cible_2010-56en.pdf | ANSSI-CC-2018-24-R01-cible.pdf |
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/eval_facility |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_version |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |