This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Adder AS-4CR Multi-Domain Card Reader Firmware Version 40040-0E7 541-EWA |
ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG ANSSI-CC-2016/34 |
|
---|---|---|
name | Adder AS-4CR Multi-Domain Card Reader Firmware Version 40040-0E7 | ID-One ePass Full EAC v2 MRTD en configuration PACE avec AA, CA et PACE CAM masqué sur les composants P60x080PVC/PVG |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | active | archived |
not_valid_after | 06.01.2029 | 23.06.2021 |
not_valid_before | 05.01.2024 | 23.06.2016 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/541-EWA%20CT%20v1.0.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/541-EWA%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-En_2016_34en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/541-EWA%20ST%20v1.4.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible_2016_34_LITE.pdf |
manufacturer | Adder Technology Ltd | Oberthur Technologies |
manufacturer_web | https://www.adder.com/ | https://www.oberthur.com/ |
security_level | {} | EAL5+, AVA_VAN.5, ALC_DVS.2 |
dgst | c1f6e2b8c4d8e57f | 482fa91b51cb19b7 |
heuristics/cert_id | 541-EWA | ANSSI-CC-2016/34 |
heuristics/cert_lab | CANADA | CEA |
heuristics/extracted_sars | ASE_OBJ.2, ASE_TSS.1, ALC_CMS.1, ASE_REQ.2, AVA_VAN.1, ATE_IND.1, ASE_CCL.1, AGD_PRE.1, ASE_INT.1, ALC_CMC.1, ADV_FSP.1, AGD_OPE.1, ASE_SPD.1, ASE_ECD.1 | ASE_TSS.2, ATE_DPT.3, ADV_INT.2, ALC_FLR.1, ALC_DVS.2, ADV_FSP.5, ALC_TAT.2, AVA_VAN.5, ADV_TDS.4, ALC_CMS.5 |
heuristics/extracted_versions | 40040 | - |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0837-V2-2014 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0837-V2-2014 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0837-V2-2014 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0837-V2-2014 |
heuristics/protection_profiles | 48f73a122587b992, 76f8f05a35d87f59 | b380aabf93b29692 |
maintenance_updates |
|
|
protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf |
pdf_data/cert_filename | 541-EWA CT v1.0.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level | ||
pdf_data/cert_keywords/cc_sar | ||
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 541-EWA CR v1.0.pdf | ANSSI-CC-En_2016_34en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 541-EWA ST v1.4.pdf | anssi_cible_2016_34_LITE.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id |
|
|
pdf_data/st_keywords/ic_data_group |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |