This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
LEO V3, Référence PPD002-vwx-Axy, Version du Firmware PA01.02 ANSSI-CC-2016/53 |
S3FT9MH/S3FT9MV/S3FT9MG16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20240713) (ANSSI-CC-2023/20-R02) ANSSI-CC-2023/20-R02 |
|
---|---|---|
name | LEO V3, Référence PPD002-vwx-Axy, Version du Firmware PA01.02 | S3FT9MH/S3FT9MV/S3FT9MG16-bit RISC Microcontroller for Smart Card with optional CE1 Secure RSA/ECC/SHA Libraries including specific IC Dedicated Software(S3FT9MH_20240713) (ANSSI-CC-2023/20-R02) |
status | archived | active |
not_valid_after | 06.09.2021 | 24.01.2029 |
not_valid_before | 06.09.2016 | 24.01.2025 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certificat-ANSSI-CC-2023_20-R02fr.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_CC-2016_53.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2023_20-R02fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI_CC-2016_53_Cible%20publique.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cible-ANSSI-CC-2023_20-R02en.pdf |
manufacturer | INGENICO | Samsung Electronics Co., Ltd. |
manufacturer_web | https://https://www.ingenico.com/ | https://www.samsung.com |
security_level | EAL3+, ALC_FLR.3, ADV_TDS.3, ADV_IMP.1, ALC_TAT.1, ADV_FSP.4 | EAL6+, ASE_TSS.2 |
dgst | eef58f6a66008cff | 52c6c2a208bd6aa4 |
heuristics/cert_id | ANSSI-CC-2016/53 | ANSSI-CC-2023/20-R02 |
heuristics/extracted_sars | ADV_IMP.1, ALC_CMC.3, ADV_ARC.1, ADV_FSP.4, ATE_IND.2, AGD_PRE.1, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, ATE_COV.2, ALC_FLR.3, ASE_SPD.1, ASE_OBJ.2, ADV_TDS.3, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ALC_TAT.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 | ALC_TAT.3, AVA_VAN.5, ADV_ARC.1, ATE_IND.2, AGD_PRE.1, ATE_FUN.2, AGD_OPE.1, ASE_REQ.2, ADV_IMP.2, ASE_ECD.1, ALC_DVS.2, ASE_OBJ.2, ASE_SPD.1, ADV_TDS.5, ALC_CMS.5, ADV_SPM.1, ATE_DPT.3, ADV_FSP.5, ASE_INT.1, ATE_COV.3, ALC_DEL.1, ASE_TSS.2, ALC_CMC.5, ADV_INT.3, ASE_CCL.1, ALC_LCD.1 |
heuristics/extracted_versions | 01.02 | 20, 2023 |
heuristics/report_references/directly_referencing | ANSSI-CC-2012/37 | {} |
heuristics/report_references/indirectly_referencing | ANSSI-CC-2012/37 | {} |
heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
pdf_data/cert_filename | Certificat-ANSSI-CC-2023_20-R02fr.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id |
|
|
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | ANSSI_CC-2016_53.pdf | ANSSI-CC-2023_20-R02fr.pdf |
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_protection_profile_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/side_channel_analysis |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | ANSSI_CC-2016_53_Cible publique.pdf | Cible-ANSSI-CC-2023_20-R02en.pdf |
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/cplc_data |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |