This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
ZXR10 M6000 & T8000 & 8900E Series Routers and Switches Running the ZXROSNG Operating System SERTIT-029 |
NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.0) ANSSI-CC-2021/50 |
|
---|---|---|
name | ZXR10 M6000 & T8000 & 8900E Series Routers and Switches Running the ZXROSNG Operating System | NPCT7xx TPM2.0 rev 1.59 (configuration version 1.1.0.0) |
category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | NO | FR |
status | archived | active |
not_valid_after | 01.09.2019 | 22.10.2026 |
not_valid_before | 10.11.2011 | 22.10.2021 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-2021_50.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SERTIT-029%20CR%20v%201.0.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_50fr.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST%20Public]%20ZXR10%20M6000&T8000&8900E%20Series%20Routers%20and%20Switches%20Running%20ZXROSNG%20ST%20v1.6.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-cc-2021_50en.pdf |
manufacturer | ZTE Corporation | Nuvoton Technology |
manufacturer_web | https://wwwen.zte.com.cn/global/index.html | |
security_level | EAL3+, ALC_FLR.2 | ALC_FLR.1, EAL4+, AVA_VAN.4, ALC_DVS.2 |
dgst | f3008d5bbc846e47 | 453086f6d03f1855 |
heuristics/cert_id | SERTIT-029 | ANSSI-CC-2021/50 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ADV_TDS.2, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1 | ALC_DVS.2, ALC_FLR.1, AVA_VAN.4 |
heuristics/extracted_versions | - | 1.59, 1.1.0.0, 2.0 |
heuristics/report_references/directly_referenced_by | {} | ANSSI-CC-2022/29, ANSSI-CC-2022/25 |
heuristics/report_references/directly_referencing | {} | ANSSI-CC-2020/21 |
heuristics/report_references/indirectly_referenced_by | {} | ANSSI-CC-2022/29, ANSSI-CC-2022/25 |
heuristics/report_references/indirectly_referencing | {} | ANSSI-CC-2020/21, ANSSI-CC-2018/61, ANSSI-CC-PP-2018/03 |
heuristics/scheme_data |
|
|
pdf_data/cert_filename | certificat-2021_50.pdf | |
pdf_data/cert_keywords/cc_cert_id |
|
|
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims | ||
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/symmetric_crypto | ||
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | SERTIT-029 CR v 1.0.pdf | anssi-cc-2021_50fr.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/asymmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_scheme |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/standard_id |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | [ST Public] ZXR10 M6000&T8000&8900E Series Routers and Switches Running ZXROSNG ST v1.6.pdf | anssi-cible-cc-2021_50en.pdf |
pdf_data/st_keywords/cc_cert_id |
|
|
pdf_data/st_keywords/cc_protection_profile_id |
|
|
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_packages |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_ok | False | True |
state/cert/download_ok | False | True |
state/cert/extract_ok | False | True |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |