This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Dell EMC™ Data Domain® v7.2 566-EWA |
Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) ANSSI-CC-2017/07 |
|
---|---|---|
name | Dell EMC™ Data Domain® v7.2 | Plateforme JavaCard MultiApp V4.0 en configuration ouverte basée sur l’Operating System JLEP3 masquée sur le composant SLE78CLFX4000PH (M7892 G12) |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
not_valid_after | 27.09.2027 | 06.09.2027 |
not_valid_before | 26.09.2022 | 08.03.2017 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20CT%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-anssi-cc-2017-07_s01.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2017_07.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20ST%20v1.17.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_cible2017_07en.pdf |
manufacturer | Dell EMC | Gemalto |
manufacturer_web | https://www.dellemc.com/en-ca/index.htm | https://www.gemalto.com/ |
security_level | EAL2+, ALC_FLR.2 | EAL5+, ALC_DVS.2, AVA_VAN.5 |
dgst | eddcd1da185327cf | 5b7b6a9b33f1dab4 |
heuristics/cert_id | 566-EWA | ANSSI-CC-2017/07 |
heuristics/cert_lab | CANADA | SERMA |
heuristics/cpe_matches | cpe:2.3:o:dell:emc_data_domain_os:7.2.0.20:*:*:*:*:*:*:*, cpe:2.3:o:dell:emc_data_domain_os:7.2.0.5:*:*:*:*:*:*:*, cpe:2.3:o:dell:emc_data_domain_os:7.2.0.50:*:*:*:*:*:*:*, cpe:2.3:o:dell:emc_data_domain_os:7.2.0.30:*:*:*:*:*:*:* | {} |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ALC_DVS.2, ALC_FLR.1, AVA_VAN.5 |
heuristics/extracted_versions | 7.2 | 4.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2017/21, ANSSI-CC-2017/22, ANSSI-CC-2017/20, ANSSI-CC-2017/54, ANSSI-CC-2017/19 |
heuristics/report_references/directly_referencing | {} | BSI-DSZ-CC-0891-V2-2016 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2018/57, ANSSI-CC-2018/21, ANSSI-CC-2018/32, ANSSI-CC-2018/58, ANSSI-CC-2018/56v2, ANSSI-CC-2017/21, ANSSI-CC-2018/58v2, ANSSI-CC-2020/44, ANSSI-CC-2017/83, ANSSI-CC-2018/57v2, ANSSI-CC-2020/33, ANSSI-CC-2018/32v2, ANSSI-CC-2017/54, ANSSI-CC-2018/53, ANSSI-CC-2018/56, ANSSI-CC-2020/43, ANSSI-CC-2017/82, ANSSI-CC-2018/11, ANSSI-CC-2017/76, ANSSI-CC-2017/81, ANSSI-CC-2020/49, ANSSI-CC-2017/20, ANSSI-CC-2018/24, ANSSI-CC-2017/19, BSI-DSZ-CC-1003-2018, ANSSI-CC-2020/45, ANSSI-CC-2020/42, ANSSI-CC-2019/07, ANSSI-CC-2019/31, ANSSI-CC-2017/22 |
heuristics/report_references/indirectly_referencing | {} | BSI-DSZ-CC-0891-V2-2016, BSI-DSZ-CC-0891-2015, BSI-DSZ-CC-0782-2012 |
heuristics/scheme_data |
|
|
heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0891-V2-2016 |
heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0891-V2-2016 |
heuristics/protection_profiles | {} | 85bef5b6f16c4d33 |
maintenance_updates |
|
|
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/ANSSI-CC-cible_PP-2010-03en.pdf |
pdf_data/cert_filename | 566-EWA CT v1.0.pdf | certificat-anssi-cc-2017-07_s01.pdf |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 566-EWA CR v1.0.pdf | ANSSI-CC-2017_07.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_keywords/javacard_packages |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 566-EWA ST v1.17.pdf | ANSSI_cible2017_07en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version |
|
|
pdf_data/st_keywords/javacard_api_const |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |