This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Dell EMC™ Data Domain® v7.2 566-EWA |
Card ASEPcos-CNS/CIE: AT90SC144144CT microcontroller embedding the software ASEPcos-CNS/CIE with Digital Signature Application ANSSI-CC-2007/22 |
|
---|---|---|
name | Dell EMC™ Data Domain® v7.2 | Card ASEPcos-CNS/CIE: AT90SC144144CT microcontroller embedding the software ASEPcos-CNS/CIE with Digital Signature Application |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | CA | FR |
status | active | archived |
not_valid_after | 27.09.2027 | 01.09.2019 |
not_valid_before | 26.09.2022 | 08.11.2007 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20CT%20v1.0.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20CR%20v1.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2007_22en.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/566-EWA%20ST%20v1.17.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/cible2007_22en.pdf |
manufacturer | Dell EMC | Athena Smartcard Solutions Inc |
manufacturer_web | https://www.dellemc.com/en-ca/index.htm | https://www.athena-scs.com/ |
security_level | EAL2+, ALC_FLR.2 | EAL4+, AVA_MSU.3, AVA_VLA.4 |
dgst | eddcd1da185327cf | 9dd7e2c242a68490 |
heuristics/cert_id | 566-EWA | ANSSI-CC-2007/22 |
heuristics/cert_lab | CANADA | CEACI |
heuristics/cpe_matches | cpe:2.3:o:dell:emc_data_domain_os:7.2.0.20:*:*:*:*:*:*:*, cpe:2.3:o:dell:emc_data_domain_os:7.2.0.5:*:*:*:*:*:*:*, cpe:2.3:o:dell:emc_data_domain_os:7.2.0.50:*:*:*:*:*:*:*, cpe:2.3:o:dell:emc_data_domain_os:7.2.0.30:*:*:*:*:*:*:* | {} |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ALC_DVS.1, ATE_COV.2, ADV_RCR.1, AVA_VLA.4, ALC_TAT.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ADV_FSP.2, ATE_DPT.1, AVA_SOF.1, ADV_SPM.1, AVA_MSU.3, ADV_IMP.1 |
heuristics/extracted_versions | 7.2 | - |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2008/22 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2009/41, ANSSI-CC-2009/04, ANSSI-CC-2010/60, ANSSI-CC-2010/05, ANSSI-CC-2009/59, ANSSI-CC-2008/22 |
heuristics/scheme_data |
|
|
maintenance_updates |
|
|
pdf_data/cert_filename | 566-EWA CT v1.0.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 566-EWA CR v1.0.pdf | 2007_22en.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/tee_name |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 566-EWA ST v1.17.pdf | cible2007_22en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/eval_facility |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/tee_name |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |