This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| Samsung Galaxy Devices on Android 10 - Spring CCEVS-VR-11042-2020 |
Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) NSCIB-CC-195748-CR |
|
|---|---|---|
| name | Samsung Galaxy Devices on Android 10 - Spring | Ideal Pass v2.3-i JC with Privacy Protection (SAC/EAC/Polymorphic eMRTD Configuration) |
| category | Mobility | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | US | NL |
| not_valid_after | 30.04.2022 | 19.11.2023 |
| not_valid_before | 30.04.2020 | 19.11.2018 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-ci.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Signed%20certificate%20CC-18-195748.pdf |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Certification%20Report%20NSCIB-CC-195748-CR.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11042-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ST-EAC-Lite]%202018_2000037744%20-%20Security%20Target%20Lite%20IDeal%20Pass%20v2.3-i%20JC%20(SAC%20EAC%20Polymorphic)%20(v1.0,%202018-09-07).pdf |
| manufacturer | Samsung Electronics Co., Ltd. | Idemia |
| manufacturer_web | https://www.samsung.com | https://www.idemia.com |
| security_level | {} | AVA_VAN.5, EAL5+, ALC_DVS.2 |
| dgst | f628c89a64a0e7b5 | 8385fe63bf12b96b |
| heuristics/cert_id | CCEVS-VR-11042-2020 | NSCIB-CC-195748-CR |
| heuristics/cert_lab | US | |
| heuristics/cpe_matches | cpe:2.3:o:samsung:android:10.0:smr-sep-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jun-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-aug-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:-:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-mar-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jul-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-feb-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2020-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-may-2022-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-jan-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-nov-2019-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-oct-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-sep-2023-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-apr-2021-r1:*:*:*:*:*:*, cpe:2.3:o:samsung:android:10.0:smr-dec-2022-r1:*:*:*:*:*:* | {} |
| heuristics/related_cves | CVE-2021-25394, CVE-2023-21441, CVE-2025-20934, CVE-2023-21430, CVE-2023-21426, CVE-2023-21425, CVE-2021-25370, CVE-2025-21009, CVE-2021-25489, CVE-2023-21436, CVE-2021-25369, CVE-2025-21008, CVE-2025-21041, CVE-2025-21007, CVE-2025-21006, CVE-2021-25337, CVE-2023-21421, CVE-2021-25395, CVE-2023-21420, CVE-2021-25487, CVE-2023-21437, CVE-2025-21005, CVE-2023-21429 | {} |
| heuristics/extracted_sars | ALC_CMC.1, ATE_IND.1, AGD_PRE.1, AVA_VAN.1, ALC_CMS.1, ALC_TSU_EXT.1, ADV_FSP.1, AGD_OPE.1 | ATE_COV.2, ASE_TSS.1, ALC_CMS.5, ASE_ECD.1, AGD_PRE.1, AVA_VAN.5, ALC_TAT.2, ASE_OBJ.2, AGD_OPE.1, ALC_DVS.2, ATE_FUN.1, ADV_TDS.4, ADV_INT.2, ATE_DPT.3, ASE_REQ.2, ADV_ARC.1, ADV_IMP.1, ALC_DEL.1, ASE_INT.1, ALC_CMC.4, ASE_CCL.1, ALC_LCD.1, ADV_FSP.5, ASE_SPD.1 |
| heuristics/extracted_versions | 10 | 2.3 |
| heuristics/report_references/directly_referenced_by | {} | NSCIB-CC-196231-CR |
| heuristics/report_references/indirectly_referenced_by | {} | NSCIB-CC-196231-CR |
| heuristics/scheme_data |
|
|
| heuristics/st_references/directly_referencing | {} | BSI-DSZ-CC-0782-V4-2018 |
| heuristics/st_references/indirectly_referencing | {} | BSI-DSZ-CC-0782-V4-2018 |
| heuristics/protection_profiles | c88af12926be2779, df09b703c88c665a, f4474c6c73660987 | a33327d40f253f46, b380aabf93b29692 |
| maintenance_updates |
|
|
| protection_profile_links | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vpn_cli_v2.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_wlan_cli_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_md_v3.1.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0068_V2b_pdf.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0056_V2b_pdf.pdf |
| pdf_data/cert_filename | st_vid11042-ci.pdf | Signed certificate CC-18-195748.pdf |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/vendor |
|
|
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/crypto_protocol |
|
|
| pdf_data/cert_keywords/standard_id |
|
|
| pdf_data/report_filename | st_vid11042-vr.pdf | Certification Report NSCIB-CC-195748-CR.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/hash_function |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/crypto_library |
|
|
| pdf_data/report_keywords/vulnerability |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_keywords/certification_process |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | st_vid11042-st.pdf | [ST-EAC-Lite] 2018_2000037744 - Security Target Lite IDeal Pass v2.3-i JC (SAC EAC Polymorphic) (v1.0, 2018-09-07).pdf |
| pdf_data/st_keywords/cc_cert_id |
|
|
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/ecc_curve |
|
|
| pdf_data/st_keywords/tls_cipher_suite |
|
|
| pdf_data/st_keywords/crypto_library |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/technical_report_id |
|
|
| pdf_data/st_keywords/tee_name |
|
|
| pdf_data/st_keywords/ic_data_group |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_keywords/javacard_packages |
|
|
| pdf_data/st_keywords/certification_process |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |