This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| MONEO/CB hybrid card: MONEO electronic purse application and B4/B0' V3 bank application (reference ST19SF04AB/RCU version B312/B024) and trader SAM security Module (reference ST19SF16CC/RCQ version C112) ANSSI-CC-2001/10 |
Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 CCEVS-VR-VID-10443-2012 |
|
|---|---|---|
| name | MONEO/CB hybrid card: MONEO electronic purse application and B4/B0' V3 bank application (reference ST19SF04AB/RCU version B312/B024) and trader SAM security Module (reference ST19SF16CC/RCQ version C112) | Tenable SecurityCenter 4.4 (SC) and Components: 3D Tool 2.0.1 Log Correlation Engine 3.6 (LCE), Passive Vulnerability Scanner 3.6 (PVS), Nessus 5.0.1, and xTool 2.1 |
| category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Detection Devices and Systems |
| scheme | FR | US |
| not_valid_after | 01.09.2019 | 01.11.2014 |
| not_valid_before | 01.01.2001 | 01.10.2012 |
| report_link | https://www.commoncriteriaportal.org/files/epfiles/2001_10.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-vr.pdf |
| st_link | https://www.commoncriteriaportal.org/files/epfiles/ | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10443-st.pdf |
| manufacturer | IBM, STMicroelectronics | Tenable Network Security, Inc. |
| manufacturer_web | https://www.tenable.com/ | |
| security_level | EAL4+, AVA_VLA.4, ADV_IMP.2, ALC_DVS.2 | EAL2+, ALC_FLR.2 |
| dgst | c4177098ea03ebc7 | 7a9d9dd29e76bfba |
| heuristics/cert_id | ANSSI-CC-2001/10 | CCEVS-VR-VID-10443-2012 |
| heuristics/cert_lab | [] | US |
| heuristics/cpe_matches | {} | cpe:2.3:a:tenable:nessus:4.4.1.15078:*:*:*:*:*:x64:* |
| heuristics/related_cves | {} | CVE-2023-3251, CVE-2022-23852, CVE-2021-46143, CVE-2022-4313, CVE-2019-3961, CVE-2021-3450, CVE-2022-22826, CVE-2022-22823, CVE-2016-1000029, CVE-2018-1141, CVE-2022-3499, CVE-2022-0778, CVE-2016-4055, CVE-2022-32973, CVE-2019-3982, CVE-2017-18214, CVE-2018-20843, CVE-2018-5407, CVE-2022-22825, CVE-2020-5765, CVE-2016-9260, CVE-2021-3449, CVE-2019-3923, CVE-2019-1559, CVE-2021-45960, CVE-2024-0955, CVE-2021-20135, CVE-2023-6062, CVE-2022-22822, CVE-2018-1147, CVE-2024-0971, CVE-2019-3962, CVE-2021-20106, CVE-2022-33757, CVE-2023-3252, CVE-2022-22824, CVE-2016-1000028, CVE-2023-6178, CVE-2022-23990, CVE-2020-5774, CVE-2022-32974, CVE-2022-28291, CVE-2018-1148, CVE-2017-5179, CVE-2023-3253, CVE-2021-20079, CVE-2022-22827 |
| heuristics/extracted_sars | AVA_MSU.2, ATE_FUN.1, ADV_RCR.1, ASE_INT.1, ADV_LLD.1, ADV_IMP.2, ASE_ENV.1, ATE_IND.2, ATE_DPT.1, AGD_USR.1, ASE_REQ.1, ASE_SRE.1, ALC_LCD.1, ALC_DVS.2, AVA_VLA.4, ADV_HLD.2, ATE_COV.2, ASE_PPC.1, ASE_DES.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, ASE_OBJ.1, ASE_TSS.1, ADV_SPM.1 | ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 |
| heuristics/extracted_versions | - | 5.0.1, 2.0.1, 4.4, 2.1, 3.6 |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | {} | 44cdd911811b36d2 |
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_ids_sys_br_v1.7.pdf |
| pdf_data/report_filename | 2001_10.pdf | st_vid10443-vr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/cc_claims |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | st_vid10443-st.pdf | |
| pdf_data/st_keywords/cc_cert_id | ||
| pdf_data/st_keywords/cc_protection_profile_id | ||
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor | ||
| pdf_data/st_keywords/eval_facility | ||
| pdf_data/st_keywords/symmetric_crypto | ||
| pdf_data/st_keywords/asymmetric_crypto | ||
| pdf_data/st_keywords/pq_crypto | ||
| pdf_data/st_keywords/hash_function | ||
| pdf_data/st_keywords/crypto_scheme | ||
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness | ||
| pdf_data/st_keywords/cipher_mode | ||
| pdf_data/st_keywords/ecc_curve | ||
| pdf_data/st_keywords/crypto_engine | ||
| pdf_data/st_keywords/tls_cipher_suite | ||
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/vulnerability | ||
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id | ||
| pdf_data/st_keywords/device_model | ||
| pdf_data/st_keywords/tee_name | ||
| pdf_data/st_keywords/os_name | ||
| pdf_data/st_keywords/cplc_data | ||
| pdf_data/st_keywords/ic_data_group | ||
| pdf_data/st_keywords/standard_id | ||
| pdf_data/st_keywords/javacard_version | ||
| pdf_data/st_keywords/javacard_api_const | ||
| pdf_data/st_keywords/javacard_packages | ||
| pdf_data/st_keywords/certification_process | ||
| pdf_data/st_metadata |
|
|
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/convert_ok | False | True |
| state/st/download_ok | False | True |
| state/st/extract_ok | False | True |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |