This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Dell EMC™ Unity™ OE 4.2 383-4-421 |
Gefäßidentifikationssystem BiTech bestehend aus den Software-Komponenten DE_BSI_M16_LIB Version 1.5 und DE_BSI_PC_DLL Version 1.5 sowie den dazugehörigen Transpondern BSI-DSZ-CC-0282-2006 |
|
---|---|---|
name | Dell EMC™ Unity™ OE 4.2 | Gefäßidentifikationssystem BiTech bestehend aus den Software-Komponenten DE_BSI_M16_LIB Version 1.5 und DE_BSI_PC_DLL Version 1.5 sowie den dazugehörigen Transpondern |
scheme | CA | DE |
not_valid_after | 22.09.2022 | 01.09.2019 |
not_valid_before | 22.09.2017 | 24.08.2006 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-421%20CT%20v1.0e.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-421%20CR%20v1.0e.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0282a.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-421%20Unity_EAL2_ST_1.4.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0282b.pdf |
manufacturer | Dell EMC | deister electronic GmbH |
manufacturer_web | https://www.dellemc.com/en-ca/index.htm | https://www.deister.com/ |
security_level | EAL2+, ALC_FLR.2 | EAL1 |
dgst | c57a4b7528f6e4db | 6b9704f4bb96cc30 |
heuristics/cert_id | 383-4-421 | BSI-DSZ-CC-0282-2006 |
heuristics/cert_lab | [] | BSI |
heuristics/cpe_matches | cpe:2.3:a:dell:emc_unity_operating_environment:4.2.0.9476662:*:*:*:*:*:*:*, cpe:2.3:a:dell:emc_unity_operating_environment:4.2.0.9392909:*:*:*:*:*:*:*, cpe:2.3:a:dell:emc_unity_operating_environment:4.2.2.9632250:*:*:*:*:*:*:*, cpe:2.3:a:dell:emc_unity_operating_environment:4.2.3.9670635:*:*:*:*:*:*:*, cpe:2.3:a:dell:emc_unity_operating_environment:4.2.1.9535982:*:*:*:*:*:*:* | {} |
heuristics/related_cves | CVE-2020-26199, CVE-2021-21590, CVE-2019-3741, CVE-2019-3754, CVE-2018-1183, CVE-2021-21589, CVE-2019-3734, CVE-2022-22564, CVE-2018-1246, CVE-2020-5319, CVE-2021-21591, CVE-2021-43589, CVE-2020-29490, CVE-2020-29489, CVE-2018-1239 | {} |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ASE_ENV.1, ADV_RCR.1, ADV_FSP.1, AVA_VLA.4, ASE_INT.1, ASE_SRE.1, ASE_TSS.1, ASE_OBJ.1, AGD_USR.1, ATE_IND.1, AGD_ADM.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1 |
heuristics/extracted_versions | 4.2 | 1.5 |
heuristics/protection_profiles | {} | f1e8c937d15e713a |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/WBIS-PPv1-04.pdf |
pdf_data/cert_filename | 383-4-421 CT v1.0e.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 383-4-421 CR v1.0e.pdf | 0282a.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 383-4-421 Unity_EAL2_ST_1.4.pdf | 0282b.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |