This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 2014-40-INF-2261 |
Javacard/VOP GemXpresso 211 platform V2 (Philips P8WE5032/MPH04 embedded component, A000000018434D Card Manager) ANSSI-CC-2000/06 |
|
---|---|---|
name | Kaspersky Endpoint Security 10 for Windows with Kaspersky Full Disk Encryption 3.0 version 10.3.0.6294 AES256 | Javacard/VOP GemXpresso 211 platform V2 (Philips P8WE5032/MPH04 embedded component, A000000018434D Card Manager) |
category | Other Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
scheme | ES | FR |
not_valid_after | 24.04.2023 | 01.09.2019 |
not_valid_before | 24.04.2018 | 01.01.2000 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-CCRA.pdf | |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-INF-2261%20v3.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2000_06.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2014-40-ST.pdf | |
manufacturer | Kaspersky Lab UK Ltd. | Philips Semiconductors, Gemplus |
manufacturer_web | https://www.kaspersky.co.uk/ | https://www.philips.com/ |
security_level | EAL2+, ALC_FLR.1 | AVA_VLA.2, EAL1+ |
dgst | f44160f29ebcdda3 | 149e170978b5bd17 |
heuristics/cert_id | 2014-40-INF-2261 | ANSSI-CC-2000/06 |
heuristics/extracted_sars | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 | ASE_ENV.1, ADV_RCR.1, ADV_FSP.1, AVA_VLA.2, ASE_INT.1, ASE_SRE.1, ASE_TSS.1, ASE_OBJ.1, AGD_USR.1, ATE_IND.1, AGD_ADM.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1 |
heuristics/extracted_versions | 10.3.0.6294, 3.0 | 211 |
pdf_data/cert_filename | 2014-40-CCRA.pdf | |
pdf_data/cert_keywords/cc_cert_id | ||
pdf_data/cert_keywords/cc_protection_profile_id | ||
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_sfr | ||
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor | ||
pdf_data/cert_keywords/eval_facility | ||
pdf_data/cert_keywords/symmetric_crypto |
|
|
pdf_data/cert_keywords/asymmetric_crypto | ||
pdf_data/cert_keywords/pq_crypto | ||
pdf_data/cert_keywords/hash_function | ||
pdf_data/cert_keywords/crypto_scheme | ||
pdf_data/cert_keywords/crypto_protocol | ||
pdf_data/cert_keywords/randomness | ||
pdf_data/cert_keywords/cipher_mode | ||
pdf_data/cert_keywords/ecc_curve | ||
pdf_data/cert_keywords/crypto_engine | ||
pdf_data/cert_keywords/tls_cipher_suite | ||
pdf_data/cert_keywords/crypto_library | ||
pdf_data/cert_keywords/vulnerability | ||
pdf_data/cert_keywords/side_channel_analysis | ||
pdf_data/cert_keywords/technical_report_id | ||
pdf_data/cert_keywords/device_model | ||
pdf_data/cert_keywords/tee_name | ||
pdf_data/cert_keywords/os_name | ||
pdf_data/cert_keywords/cplc_data | ||
pdf_data/cert_keywords/ic_data_group | ||
pdf_data/cert_keywords/standard_id | ||
pdf_data/cert_keywords/javacard_version | ||
pdf_data/cert_keywords/javacard_api_const | ||
pdf_data/cert_keywords/javacard_packages | ||
pdf_data/cert_keywords/certification_process | ||
pdf_data/cert_metadata |
|
|
pdf_data/report_filename | 2014-40-INF-2261 v3.pdf | 2000_06.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_sfr |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | 2014-40-ST.pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level |
|
|
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor |
|
|
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto | ||
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme | ||
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness | ||
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve | ||
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library | ||
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis | ||
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/cert/convert_garbage | True | False |
state/cert/convert_ok | True | False |
state/cert/download_ok | True | False |
state/cert/extract_ok | True | False |
state/cert/pdf_hash | Different | Different |
state/cert/txt_hash | Different | Different |
state/report/extract_ok | False | True |
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | True | False |
state/st/download_ok | True | False |
state/st/extract_ok | True | False |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |