This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
| HP Networking E-Series Switch Models: E3500yl, E5400zl, E6200yl, E6600, E8200zl with Software Version K.15.02.0005 CCEVS-VR-VID-10410-2011 |
S3FT9FA (S3FT9FA_20230430) ANSSI-CC-2021/16-R02 |
|
|---|---|---|
| name | HP Networking E-Series Switch Models: E3500yl, E5400zl, E6200yl, E6600, E8200zl with Software Version K.15.02.0005 | S3FT9FA (S3FT9FA_20230430) |
| category | Network and Network-Related Devices and Systems | ICs, Smart Cards and Smart Card-Related Devices and Systems |
| scheme | US | FR |
| status | archived | active |
| not_valid_after | 31.12.2014 | 27.03.2028 |
| not_valid_before | 18.10.2011 | 27.03.2023 |
| cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificat-cc-2021_16r02.pdf | |
| report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10410-vr.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2021_16r02fr.pdf |
| st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10410-st.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cible-2021_16-r02en.pdf |
| manufacturer | Hewlett-Packard Company | Samsung Electronics Co., Ltd. |
| manufacturer_web | https://www.hp.com | https://www.samsung.com |
| security_level | EAL2+, ALC_FLR.2 | EAL5+, AVA_VAN.5, ALC_DVS.2 |
| dgst | f88374cd88d43aa6 | 7fb2d7a456f89558 |
| heuristics/cert_id | CCEVS-VR-VID-10410-2011 | ANSSI-CC-2021/16-R02 |
| heuristics/cert_lab | US | [] |
| heuristics/extracted_sars | ADV_FSP.2, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ALC_FLR.2, ATE_COV.1, ALC_CMC.2, AGD_OPE.1, ALC_CMS.2, AVA_VAN.2, ALC_DEL.1, ADV_TDS.1, ADV_ARC.1 | ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ATE_DPT.3, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_INT.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ADV_TDS.4, ALC_LCD.1, ALC_DVS.2, ASE_SPD.1, ATE_COV.2, ALC_CMS.5, AGD_OPE.1, ADV_FSP.5, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ALC_TAT.2 |
| heuristics/extracted_versions | 15.02.0005 | - |
| heuristics/scheme_data |
|
|
| heuristics/protection_profiles | {} | cf0f01bcd7be3e9c |
| maintenance_updates |
|
|
| protection_profile_links | {} | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf |
| pdf_data/cert_filename | certificat-cc-2021_16r02.pdf | |
| pdf_data/cert_keywords/cc_cert_id |
|
|
| pdf_data/cert_keywords/cc_protection_profile_id |
|
|
| pdf_data/cert_keywords/cc_security_level |
|
|
| pdf_data/cert_keywords/cc_sar |
|
|
| pdf_data/cert_keywords/cc_sfr | ||
| pdf_data/cert_keywords/cc_claims | ||
| pdf_data/cert_keywords/vendor | ||
| pdf_data/cert_keywords/eval_facility |
|
|
| pdf_data/cert_keywords/symmetric_crypto | ||
| pdf_data/cert_keywords/asymmetric_crypto | ||
| pdf_data/cert_keywords/pq_crypto | ||
| pdf_data/cert_keywords/hash_function | ||
| pdf_data/cert_keywords/crypto_scheme | ||
| pdf_data/cert_keywords/crypto_protocol | ||
| pdf_data/cert_keywords/randomness | ||
| pdf_data/cert_keywords/cipher_mode | ||
| pdf_data/cert_keywords/ecc_curve | ||
| pdf_data/cert_keywords/crypto_engine | ||
| pdf_data/cert_keywords/tls_cipher_suite | ||
| pdf_data/cert_keywords/crypto_library | ||
| pdf_data/cert_keywords/vulnerability | ||
| pdf_data/cert_keywords/side_channel_analysis | ||
| pdf_data/cert_keywords/technical_report_id | ||
| pdf_data/cert_keywords/device_model | ||
| pdf_data/cert_keywords/tee_name | ||
| pdf_data/cert_keywords/os_name | ||
| pdf_data/cert_keywords/cplc_data | ||
| pdf_data/cert_keywords/ic_data_group | ||
| pdf_data/cert_keywords/standard_id | ||
| pdf_data/cert_keywords/javacard_version | ||
| pdf_data/cert_keywords/javacard_api_const | ||
| pdf_data/cert_keywords/javacard_packages | ||
| pdf_data/cert_keywords/certification_process | ||
| pdf_data/report_filename | st_vid10410-vr.pdf | anssi-cc-2021_16r02fr.pdf |
| pdf_data/report_frontpage |
|
|
| pdf_data/report_keywords/cc_cert_id |
|
|
| pdf_data/report_keywords/cc_protection_profile_id |
|
|
| pdf_data/report_keywords/cc_security_level |
|
|
| pdf_data/report_keywords/cc_sar |
|
|
| pdf_data/report_keywords/vendor |
|
|
| pdf_data/report_keywords/eval_facility |
|
|
| pdf_data/report_keywords/symmetric_crypto |
|
|
| pdf_data/report_keywords/asymmetric_crypto |
|
|
| pdf_data/report_keywords/crypto_scheme |
|
|
| pdf_data/report_keywords/crypto_protocol |
|
|
| pdf_data/report_keywords/randomness |
|
|
| pdf_data/report_keywords/side_channel_analysis |
|
|
| pdf_data/report_keywords/standard_id |
|
|
| pdf_data/report_metadata |
|
|
| pdf_data/st_filename | st_vid10410-st.pdf | anssi-cible-2021_16-r02en.pdf |
| pdf_data/st_keywords/cc_protection_profile_id |
|
|
| pdf_data/st_keywords/cc_security_level |
|
|
| pdf_data/st_keywords/cc_sar |
|
|
| pdf_data/st_keywords/cc_sfr |
|
|
| pdf_data/st_keywords/cc_claims |
|
|
| pdf_data/st_keywords/vendor |
|
|
| pdf_data/st_keywords/symmetric_crypto |
|
|
| pdf_data/st_keywords/asymmetric_crypto |
|
|
| pdf_data/st_keywords/hash_function |
|
|
| pdf_data/st_keywords/crypto_scheme |
|
|
| pdf_data/st_keywords/crypto_protocol |
|
|
| pdf_data/st_keywords/randomness |
|
|
| pdf_data/st_keywords/cipher_mode |
|
|
| pdf_data/st_keywords/side_channel_analysis |
|
|
| pdf_data/st_keywords/cplc_data |
|
|
| pdf_data/st_keywords/standard_id |
|
|
| pdf_data/st_metadata |
|
|
| state/cert/convert_ok | False | True |
| state/cert/download_ok | False | True |
| state/cert/pdf_hash | Different | Different |
| state/cert/txt_hash | Different | Different |
| state/report/extract_ok | True | False |
| state/report/pdf_hash | Different | Different |
| state/report/txt_hash | Different | Different |
| state/st/extract_ok | True | False |
| state/st/pdf_hash | Different | Different |
| state/st/txt_hash | Different | Different |