This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
Javacard/VOP GemXpresso 211 platform V2 (Philips P8WE5032/MPH04 embedded component, A000000018434D Card Manager) ANSSI-CC-2000/06 |
JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 Certificate Number: 2017/105 |
|
---|---|---|
name | Javacard/VOP GemXpresso 211 platform V2 (Philips P8WE5032/MPH04 embedded component, A000000018434D Card Manager) | JUNIPER NETWORKS, INC JUNOS 15.1X49-D60 |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Network and Network-Related Devices and Systems |
scheme | FR | AU |
not_valid_after | 01.09.2019 | 07.02.2022 |
not_valid_before | 01.01.2000 | 07.02.2017 |
report_link | https://www.commoncriteriaportal.org/files/epfiles/2000_06.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFS-T043_Junos%2015.1X49%20for%20SRX%20platforms%20-%20NDPP-FW-VPN-IPS_%20Certification%20Report%20v1.0.pdf |
st_link | https://www.commoncriteriaportal.org/files/epfiles/ | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Juniper-ISSX1056-2-Junos15.1X49-NDPP-FW-IPS-ST-SRX-v1.0%20(1).pdf |
manufacturer | Philips Semiconductors, Gemplus | Juniper Networks, Inc. |
manufacturer_web | https://www.juniper.net/ | |
security_level | EAL1+, AVA_VLA.2 | {} |
dgst | f7788e23ae2e25ba | 5fef5dbf556048cf |
heuristics/cert_id | ANSSI-CC-2000/06 | Certificate Number: 2017/105 |
heuristics/cpe_matches | {} | cpe:2.3:o:juniper:junos:15.1x49:d60:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:15.1x49-d60:*:*:*:*:*:*:*, cpe:2.3:o:juniper:junos:15.1x49:-:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2021-0215, CVE-2022-22245, CVE-2023-36840, CVE-2022-22215, CVE-2024-39511, CVE-2019-0053, CVE-2024-39514, CVE-2023-44182, CVE-2023-28962, CVE-2017-2347, CVE-2016-4922, CVE-2024-21591, CVE-2023-44184, CVE-2015-5360, CVE-2023-28964, CVE-2023-36839, CVE-2017-2312, CVE-2017-10602, CVE-2022-22244, CVE-2018-0029, CVE-2014-6450, CVE-2022-22242, CVE-2023-44185, CVE-2020-1631, CVE-2023-44178, CVE-2017-2345, CVE-2019-0037, CVE-2015-7751, CVE-2018-0021, CVE-2019-0012, CVE-2023-22407, CVE-2021-31372, CVE-2020-1602, CVE-2023-0026, CVE-2022-22181, CVE-2018-0061, CVE-2023-36843, CVE-2020-10188, CVE-2022-22208, CVE-2018-0031, CVE-2020-1637, CVE-2024-39549, CVE-2024-39555, CVE-2023-22391, CVE-2023-22406, CVE-2018-0060, CVE-2021-31362, CVE-2017-2302, CVE-2020-1609, CVE-2023-22395, CVE-2022-22246, CVE-2017-10621, CVE-2020-1600, CVE-2022-22173, CVE-2023-44186, CVE-2024-39556, CVE-2019-0039, CVE-2018-0007, CVE-2017-2313, CVE-2023-4481, CVE-2019-0035, CVE-2022-22156, CVE-2020-1656, CVE-2017-2348, CVE-2020-1643, CVE-2023-28979, CVE-2017-10618, CVE-2020-1630, CVE-2022-22220, CVE-2017-2314, CVE-2019-0036, CVE-2024-30397, CVE-2023-44177, CVE-2019-0013, CVE-2023-44197, CVE-2023-28975, CVE-2018-0019, CVE-2018-0062, CVE-2024-39517, CVE-2018-0055, CVE-2015-5362, CVE-2019-0073, CVE-2018-15505, CVE-2019-0061, CVE-2018-0003, CVE-2018-0004, CVE-2019-0047, CVE-2004-0468, CVE-2022-22243, CVE-2023-36842, CVE-2023-36841, CVE-2021-31355, CVE-2017-2303, CVE-2020-1657, CVE-2023-44176, CVE-2017-10613, CVE-2023-28963, CVE-2016-1264, CVE-2022-22197, CVE-2022-22224, CVE-2024-39558, CVE-2022-22241, CVE-2017-2344, CVE-2025-21590, CVE-2018-0022, CVE-2018-0052, CVE-2015-7752, CVE-2023-44201, CVE-2018-0017, CVE-2022-22238, CVE-2024-39528, CVE-2024-21594, CVE-2020-1605, CVE-2020-1639, CVE-2017-2301, CVE-2024-30380, CVE-2020-1641, CVE-2023-44175, CVE-2023-44194, CVE-2018-0051, CVE-2020-1684 |
heuristics/extracted_sars | ASE_INT.1, ADV_FSP.1, ASE_OBJ.1, ASE_PPC.1, AGD_USR.1, ATE_IND.1, ADV_RCR.1, ASE_REQ.1, ASE_TSS.1, AGD_ADM.1, ASE_DES.1, ASE_SRE.1, AVA_VLA.2, ASE_ENV.1 | ALC_CMS.1, AGD_PRE.1, ADV_FSP.1, AVA_VAN.1, ATE_IND.1, ALC_CMC.1, AGD_OPE.1 |
heuristics/extracted_versions | 211 | 15.1 |
heuristics/protection_profiles | {} | f21e576d983cc1d7, bb67fb1b4f10e7a5, d7508f508083d040, ac9abe3d5c5a31f0 |
protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_vpn_gw_ep_v1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_ips_ep_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_ND_TFFWEP_V1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf |
pdf_data/report_filename | 2000_06.pdf | EFS-T043_Junos 15.1X49 for SRX platforms - NDPP-FW-VPN-IPS_ Certification Report v1.0.pdf |
pdf_data/report_frontpage |
|
|
pdf_data/report_keywords/cc_cert_id |
|
|
pdf_data/report_keywords/cc_security_level |
|
|
pdf_data/report_keywords/cc_sar |
|
|
pdf_data/report_keywords/cc_claims |
|
|
pdf_data/report_keywords/vendor |
|
|
pdf_data/report_keywords/eval_facility |
|
|
pdf_data/report_keywords/symmetric_crypto |
|
|
pdf_data/report_keywords/hash_function |
|
|
pdf_data/report_keywords/crypto_protocol |
|
|
pdf_data/report_keywords/javacard_version |
|
|
pdf_data/report_metadata |
|
|
pdf_data/st_filename | Juniper-ISSX1056-2-Junos15.1X49-NDPP-FW-IPS-ST-SRX-v1.0 (1).pdf | |
pdf_data/st_keywords/cc_cert_id | ||
pdf_data/st_keywords/cc_protection_profile_id | ||
pdf_data/st_keywords/cc_security_level | ||
pdf_data/st_keywords/cc_sar |
|
|
pdf_data/st_keywords/cc_sfr |
|
|
pdf_data/st_keywords/cc_claims |
|
|
pdf_data/st_keywords/vendor | ||
pdf_data/st_keywords/eval_facility | ||
pdf_data/st_keywords/symmetric_crypto |
|
|
pdf_data/st_keywords/asymmetric_crypto |
|
|
pdf_data/st_keywords/pq_crypto | ||
pdf_data/st_keywords/hash_function |
|
|
pdf_data/st_keywords/crypto_scheme |
|
|
pdf_data/st_keywords/crypto_protocol |
|
|
pdf_data/st_keywords/randomness |
|
|
pdf_data/st_keywords/cipher_mode |
|
|
pdf_data/st_keywords/ecc_curve |
|
|
pdf_data/st_keywords/crypto_engine | ||
pdf_data/st_keywords/tls_cipher_suite | ||
pdf_data/st_keywords/crypto_library |
|
|
pdf_data/st_keywords/vulnerability | ||
pdf_data/st_keywords/side_channel_analysis |
|
|
pdf_data/st_keywords/technical_report_id | ||
pdf_data/st_keywords/device_model | ||
pdf_data/st_keywords/tee_name | ||
pdf_data/st_keywords/os_name | ||
pdf_data/st_keywords/cplc_data | ||
pdf_data/st_keywords/ic_data_group | ||
pdf_data/st_keywords/standard_id |
|
|
pdf_data/st_keywords/javacard_version | ||
pdf_data/st_keywords/javacard_api_const | ||
pdf_data/st_keywords/javacard_packages | ||
pdf_data/st_keywords/certification_process |
|
|
pdf_data/st_metadata |
|
|
state/report/pdf_hash | Different | Different |
state/report/txt_hash | Different | Different |
state/st/convert_ok | False | True |
state/st/download_ok | False | True |
state/st/extract_ok | False | True |
state/st/pdf_hash | Different | Different |
state/st/txt_hash | Different | Different |