This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Samsung S3FV9QM/S3FV9QK 32-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software Référence : S3FV9QM_20200504 ANSSI-CC-2021/02 |
Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software BSI-DSZ-CC-0640-2010 |
|
---|---|---|
name | Samsung S3FV9QM/S3FV9QK 32-bit RISC Microcontroller for Smart Card with optional Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software Référence : S3FV9QM_20200504 | Infineon Technologies Smart Card IC (Security Controller) M7820 A11 with optional RSA2048/4096 v1.1.18, EC v1.1.18 and SHA-2 v1.1 libraries and with specific IC dedicated software |
scheme | FR | DE |
status | active | archived |
not_valid_after | 28.09.2026 | 01.09.2019 |
not_valid_before | 15.01.2021 | 28.07.2010 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat_ANSSI-CC-2021_02-S01fr.pdf | None |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2021-02fr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640a_pdf.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021-02en.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0640b_pdf.pdf |
manufacturer | Samsung Electronics Co., Ltd. | Infineon Technologies AG |
manufacturer_web | https://www.samsung.com | https://www.infineon.com/ |
dgst | e059facf5ce470c3 | 454b704420e1b9ab |
heuristics/cert_id | ANSSI-CC-2021/02 | BSI-DSZ-CC-0640-2010 |
heuristics/cert_lab | [] | BSI |
heuristics/extracted_sars | ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ALC_TAT.2, ASE_TSS.1, ADV_ARC.1, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, AGD_OPE.1, ASE_ECD.1, ASE_INT.1, AGD_PRE.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 | ASE_CCL.1, ALC_DEL.1, ADV_FSP.5, ALC_CMC.4, ALC_CMS.5, ALC_DVS.2, AVA_VAN.5, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ASE_TSS.1, ALC_TAT.2, ASE_SPD.1, ASE_REQ.2, ADV_INT.2, ADV_IMP.1, ADV_TDS.4, ATE_COV.2, APE_INT.1, ALC_FLR.3, AGD_OPE.1, APE_CCL.1, APE_REQ.2, APE_ECD.1, ASE_ECD.1, ADV_SPM.1, ASE_INT.1, APE_OBJ.2, AGD_PRE.1, APE_SPD.1, ALC_LCD.1, ATE_DPT.3, ASE_OBJ.2 |
heuristics/extracted_versions | 32 | 1.1, 1.1.18 |
heuristics/indirect_transitive_cves | {} | CVE-2017-15361 |
heuristics/report_references/directly_referenced_by | ANSSI-CC-2021/02-R01 | BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0732-2011, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0695-2011 |
heuristics/report_references/directly_referencing | ANSSI-CC-2018/43 | {} |
heuristics/report_references/indirectly_referenced_by | ANSSI-CC-2021/02-R01, ANSSI-CC-2021/02-R02 | BSI-DSZ-CC-0728-2011, ANSSI-CC-2015/25, ANSSI-CC-2014/13, BSI-DSZ-CC-0904-V2-2021, BSI-DSZ-CC-0889-2013, ANSSI-CC-2012/44, ANSSI-CC-2014/08, ANSSI-CC-2015/08, BSI-DSZ-CC-0829-V2-2015, BSI-DSZ-CC-0898-2014, ANSSI-CC-2015/40, BSI-DSZ-CC-0764-2012, ANSSI-CC-2016/74, ANSSI-CC-2013/11, ANSSI-CC-2013/34, ANSSI-CC-2014/62, BSI-DSZ-CC-0880-2013, BSI-DSZ-CC-0695-2011, BSI-DSZ-CC-0729-2011, ANSSI-CC-2013/64, ANSSI-CC-2012/32, BSI-DSZ-CC-0732-2011, ANSSI-CC-2015/38, ANSSI-CC-2014/50, BSI-DSZ-CC-0835-V2-2017, ANSSI-CC-2015/03, ANSSI-CC-2015/02, ANSSI-CC-2013/40, BSI-DSZ-CC-0851-2013, ANSSI-CC-2015/39, ANSSI-CC-2012/51, ANSSI-CC-2014/14, ANSSI-CC-2014/48, BSI-DSZ-CC-0733-2011, ANSSI-CC-2012/38, ANSSI-CC-2015/09, ANSSI-CC-2016/04, BSI-DSZ-CC-0941-2016, BSI-DSZ-CC-0818-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0819-2012, ANSSI-CC-2013/33, BSI-DSZ-CC-0829-2012, BSI-DSZ-CC-0762-2012, ANSSI-CC-2013/10, ANSSI-CC-2013/42, ANSSI-CC-2014/86, BSI-DSZ-CC-0836-V2-2017, ANSSI-CC-2012/85, ANSSI-CC-2014/07, BSI-DSZ-CC-0813-2012, CRP290, ANSSI-CC-2012/50, BSI-DSZ-CC-0904-2015, ANSSI-CC-2012/31, BSI-DSZ-CC-0835-2013, ANSSI-CC-2015/37, BSI-DSZ-CC-0761-2013, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0760-2013, ANSSI-CC-2016/03, ANSSI-CC-2014/61, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0850-2013, ANSSI-CC-2013/39, ANSSI-CC-2015/30, BSI-DSZ-CC-0751-2013, ANSSI-CC-2016/75, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0952-2014, ANSSI-CC-2013/55, ANSSI-CC-2014/11, BSI-DSZ-CC-0952-V2-2016, ANSSI-CC-2014/12, ANSSI-CC-2015/41, ANSSI-CC-2015/01, ANSSI-CC-2013/32, ANSSI-CC-2012/41, BSI-DSZ-CC-0769-2012, ANSSI-CC-2014/09, ANSSI-CC-2015/04, ANSSI-CC-2012/40, ANSSI-CC-2013/35, ANSSI-CC-2015/15, ANSSI-CC-2014/49, BSI-DSZ-CC-0763-2012, ANSSI-CC-2016/73, BSI-DSZ-CC-0922-2014 |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2014/75, ANSSI-CC-2018/43, ANSSI-CC-2014/22, ANSSI-CC-2017/16 | {} |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referenced_by | {} | ANSSI-CC-2012/51, ANSSI-CC-2013/10, ANSSI-CC-2013/11, ANSSI-CC-2012/32, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0732-2011, ANSSI-CC-2012/50, ANSSI-CC-2012/40, ANSSI-CC-2012/31, BSI-DSZ-CC-0677-2010, ANSSI-CC-2013/40, ANSSI-CC-2012/41 |
heuristics/st_references/indirectly_referenced_by | {} | BSI-DSZ-CC-0729-2011, ANSSI-CC-2013/10, BSI-DSZ-CC-0728-2011, ANSSI-CC-2012/32, ANSSI-CC-2016/75, BSI-DSZ-CC-0732-2011, ANSSI-CC-2014/13, BSI-DSZ-CC-0836-2013, BSI-DSZ-CC-0952-2014, ANSSI-CC-2014/11, ANSSI-CC-2012/44, ANSSI-CC-2014/08, ANSSI-CC-2014/07, BSI-DSZ-CC-0813-2012, ANSSI-CC-2012/50, ANSSI-CC-2014/12, ANSSI-CC-2012/31, BSI-DSZ-CC-0904-2015, ANSSI-CC-2013/40, ANSSI-CC-2013/32, BSI-DSZ-CC-0829-V2-2015, ANSSI-CC-2012/41, BSI-DSZ-CC-0769-2012, BSI-DSZ-CC-0835-2013, ANSSI-CC-2012/51, ANSSI-CC-2014/14, ANSSI-CC-2014/09, BSI-DSZ-CC-0898-2014, BSI-DSZ-CC-0761-2013, ANSSI-CC-2012/40, ANSSI-CC-2014/48, ANSSI-CC-2013/35, BSI-DSZ-CC-0677-2010, BSI-DSZ-CC-0733-2011, ANSSI-CC-2012/38, ANSSI-CC-2015/09, BSI-DSZ-CC-0760-2013, ANSSI-CC-2014/62, ANSSI-CC-2014/61, ANSSI-CC-2016/74, ANSSI-CC-2013/11, BSI-DSZ-CC-0722-2011, BSI-DSZ-CC-0818-2013, ANSSI-CC-2014/06, BSI-DSZ-CC-0819-2012, ANSSI-CC-2016/73, ANSSI-CC-2013/39, ANSSI-CC-2013/34, BSI-DSZ-CC-0922-2014, BSI-DSZ-CC-0751-2013, BSI-DSZ-CC-0880-2013, ANSSI-CC-2013/33, BSI-DSZ-CC-0829-2012 |
maintenance_updates |
|
|
protection_profiles |
|
|
pdf_data/cert_filename | certificat_ANSSI-CC-2021_02-S01fr.pdf | None |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ANSSI-CC-2021-02fr.pdf | 0640a_pdf.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/randomness |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/technical_report_id |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/certification_process |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | anssi-cible-2021-02en.pdf | 0640b_pdf.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |