This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01) None |
Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB ANSSI-CC-2009/56 |
|
---|---|---|
name | MultiApp v4.0.1 with Filter Set 1.0 Java Card Open Platform on M7892 G12 chip(MultiApp v4.0.1 with Filter Set 1.0) (ANSSI-CC-2020/42-R01) | Gemalto Carte à puce Multiapp ID IAS ECC : applet de signature v4.2.7.A chargée sur la plate-forme Java Card Multiapp v1.0 avec correctif v1.2 masquée sur microcontrôleur NXP P5CD144 VOB |
status | active | archived |
not_valid_after | 08.01.2030 | 01.09.2019 |
not_valid_before | 08.01.2025 | 17.02.2010 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-CC-2020_42-R01.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2020_42-R01fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2009-56en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-cible-CC-2020_42-R01en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible_2009-56en.pdf |
manufacturer | THALES DIS FRANCE SA | Gemalto / NXP Semiconductors |
manufacturer_web | https://www.thalesgroup.com/en/europe/france | https://www.gemalto.com/ |
security_level | EAL5+, AVA_VAN.5, ALC_DVS.2 | AVA_VAN.5, EAL4+, ALC_DVS.2 |
dgst | da1854c6923c5a64 | 03de79a10467e320 |
heuristics/cert_id | ANSSI-CC-2009/56 | |
heuristics/cert_lab | [] | SERMA |
heuristics/indirect_transitive_cves | {} | CVE-2013-1243, CVE-2014-3406, CVE-2014-2103, CVE-2011-4022, CVE-2013-1218, CVE-2014-3402 |
heuristics/extracted_sars | ALC_DVS.2, AVA_VAN.5 | AGD_OPE.1, ALC_DVS.2, AVA_MSU.3, AVA_VAN.5, AVA_VLA.4, ADV_TDS.3, ADV_FSP.4, AGD_PRE.1, ADV_ARC.1, ALC_DEL.1, ATE_FUN.1, ALC_TAT.1, ALC_CMC.4, ALC_LCD.1, ATE_IND.2, ADV_IMP.2, ATE_DPT.1, ATE_COV.2 |
heuristics/extracted_versions | 4.0.1, 1.0 | 4.2.7, 1.2, 1.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2010/59, ANSSI-CC-2012/81, ANSSI-CC-2010/52 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2010/59, ANSSI-CC-2012/81, Certificate Number: 2012/81, ANSSI-CC-2010/52 |
heuristics/scheme_data |
|
|
protection_profiles |
|
|
pdf_data/report_filename | ANSSI-CC_2009-56en.pdf | |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr | ||
pdf_data/report_keywords/cc_claims | ||
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto | ||
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/pq_crypto | ||
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme | ||
pdf_data/report_keywords/crypto_protocol | ||
pdf_data/report_keywords/randomness | ||
pdf_data/report_keywords/cipher_mode | ||
pdf_data/report_keywords/ecc_curve | ||
pdf_data/report_keywords/crypto_engine | ||
pdf_data/report_keywords/tls_cipher_suite | ||
pdf_data/report_keywords/crypto_library | ||
pdf_data/report_keywords/vulnerability | ||
pdf_data/report_keywords/side_channel_analysis | ||
pdf_data/report_keywords/technical_report_id | ||
pdf_data/report_keywords/device_model | ||
pdf_data/report_keywords/tee_name | ||
pdf_data/report_keywords/os_name | ||
pdf_data/report_keywords/cplc_data | ||
pdf_data/report_keywords/ic_data_group | ||
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_version | ||
pdf_data/report_keywords/javacard_api_const | ||
pdf_data/report_keywords/javacard_packages | ||
pdf_data/report_keywords/certification_process | ||
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cc-cible_2009-56en.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol | ||
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode | ||
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/convert_ok | False | True |
state/report/download_ok | False | True |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |