RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CSV information ?
Status | archived |
---|---|
Valid from | 21.12.2012 |
Valid until | 31.12.2014 |
Scheme | 🇺🇸 US |
Manufacturer | RIOREY Incorporated |
Category | Other Devices and Systems |
Security level | EAL4+, ALC_FLR.1 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL 4, EAL 4 augmentedClaims
A.CONNECT, A.PHYSICAL, A.BACKUP, A.NOEVILSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_IND.2, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, AVA_VAN.2, AVA_VAN.3Certificates
CCEVS-VR-VID10380-2012Standards
RFC 1858File metadata
Creation date | D:20130115103913 |
---|---|
Modification date | D:20130115103913 |
Pages | 32 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Frontpage
Certificate ID | CCEVS-VR-VID10380-2012 |
---|---|
Certified item | RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 |
Certification lab | US NIAP |
Security target ?
Extracted keywords
Symmetric Algorithms
AESProtocols
SSHBlock cipher modes
CBC, CTRSecurity level
EAL4+Claims
O.DDOSMITIGATE, O.MANAGE, O.PROCOM, O.AUDIT, O.DDOSALERT, O.IDAUTH, O.FAILSAFE, O.TRANSMISSION, T.DDOSATTACK, T.MANAGE, T.PROCOM, T.AUDIT, T.NOAUTH, T.FAILURE, A.CONNECT, A.PHYSICAL, A.BACKUP, A.NOEVIL, OE.CONNECT, OE.BACKUP, OE.NOEVIL, OE.PHYSICAL, OE.TIME, OE.AUDITSecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_FLR.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.1, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Security Functional Requirements (SFR)
FAU_GEN, FAU_UAU_EXT.2, FAU_GEN.1, FAU_GEN.2, FAU_STG.1, FAU_SAR.1, FAU_SAR.3, FAU_GEN.1.1, FAU_GEN.1.2, FAU_GEN.2.1, FAU_STG.1.1, FAU_STG.1.2, FAU_SAR.1.1, FAU_SAR.1.2, FAU_SAR.3.1, FIA_UAU_EXT.2, FIA_UAU, FIA_UAU.1, FIA_UID.1, FIA_UAU_EXT.2.1, FIA_ATD.1, FIA_UID.2, FIA_UAU.5, FIA_ATD.1.1, FIA_UAU.5.1, FIA_UAU.5.2, FIA_UID.2.1, FIA_UID, FMT_SMR.1, FMT_MTD.1, FMT_SMF.1, FMT_SMR.1.1, FMT_SMR.1.2, FMT_MTD.1.1, FMT_SMF.1.1, FPT_FLS.1, FPT_ITT.1, FPT_STM.1, FPT_FLS.1.1, FPT_ITT.1.1, FRU_DDOS_EXT.1, FRU_DDOS, FRU_DDOS_EXT.1.1, FRU_DDOS_EXT.1.2, FRU_DDOS_EXT.1.3Vulnerabilities
CVE-2008-5161Certification process
out of scope, software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUIStandards
RFC 1858, RFC 1918, RFC1858File metadata
Creation date | D:20130115104027 |
---|---|
Modification date | D:20130115104027 |
Pages | 61 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ATE_COV.2, ADV_TDS.3, AGD_OPE.1, ALC_DVS.1, ALC_DEL.1, AGD_PRE.1, AVA_VAN.3, ALC_CMC.4, ALC_LCD.1, ATE_DPT.1, ALC_FLR.1, ALC_CMS.4, ALC_TAT.1, ADV_IMP.1, ATE_FUN.1, ATE_IND.2, ADV_ARC.1, ADV_FSP.4Similar certificates
Name | Certificate ID | |
---|---|---|
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series | None | Compare |
Scheme data ?
Product | RioReyâ„¢ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 | |
---|---|---|
Id | CCEVS-VR-VID10380 | |
Url | https://www.niap-ccevs.org/product/10380 | |
Certification Date | 21.12.2012 | |
Expiration Date | 21.12.2014 | |
Category | Miscellaneous | |
Vendor | RioRey, Inc. | |
Evaluation Facility | CygnaCom Solutions, Inc | |
Scheme | US |
References ?
No references are available for this certificate.
Updates ?
-
09.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The scheme_data property was set to
{'product': 'RioReyâ„¢ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9', 'id': 'CCEVS-VR-VID10380', 'url': 'https://www.niap-ccevs.org/product/10380', 'certification_date': '2012-12-21', 'expiration_date': '2014-12-21', 'category': 'Miscellaneous', 'vendor': 'RioRey, Inc.', 'evaluation_facility': 'CygnaCom Solutions, Inc', 'scheme': 'US'}
.
- The scheme_data property was set to
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'c2b9de909b2ea7c091e5fe6298c6c7f60e49758d9e3af43ea53867bdb4be1888', 'txt_hash': 'ef18d13a5543fd4915ae493f2850c926f2559eecd91ed1b10c20b38b8594eaa2'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': 'ccc2dde8815dced4a5dad1155ea55cfdfc0bbb03549e5572affa377979dbce6e', 'txt_hash': '3e0f4b32d3541deaabc1a8c3531e466582639db1dc1c9809bc91232fc0e2ea70'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 371708, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 32, '/Producer': 'Microsoft® Office Word 2007', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20130115103913', '/ModDate': 'D:20130115103913', 'pdf_hyperlinks': {'_type': 'Set', 'elements': ['mailto:[email protected]', 'mailto:[email protected]', 'http://www.niap-ccevs.org/cc-scheme', 'http://www.niap-ccevs.org/', 'http://www.cygnacom.com/labs/common-criteria/index.htm']}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 1295508, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 61, '/Producer': 'Microsoft® Office Word 2007', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20130115104027', '/ModDate': 'D:20130115104027', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{'US': {'cert_id': 'CCEVS-VR-VID10380-2012', 'cert_item': 'RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9', 'cert_lab': 'US NIAP'}}
. - The report_keywords property was set to
{'cc_cert_id': {'US': {'CCEVS-VR-VID10380-2012': 1}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL 4': 8, 'EAL 4 augmented': 1}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 2, 'AGD_PRE.1': 2}, 'ALC': {'ALC_FLR.1': 4, 'ALC_CMC.4': 2, 'ALC_CMS.4': 2, 'ALC_DEL.1': 2, 'ALC_DVS.1': 2, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_IND.2': 3, 'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1}, 'AVA': {'AVA_VAN.2': 1, 'AVA_VAN.3': 1}}, 'cc_sfr': {}, 'cc_claims': {'A': {'A.CONNECT': 1, 'A.PHYSICAL': 1, 'A.BACKUP': 1, 'A.NOEVIL': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 1858': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4+': 6}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 1, 'ADV_FSP.4': 1, 'ADV_IMP.1': 1, 'ADV_TDS.3': 1}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.1': 3, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_COV.2': 1, 'ATE_DPT.1': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 1}, 'AVA': {'AVA_VAN.3': 2}}, 'cc_sfr': {'FAU': {'FAU_GEN': 2, 'FAU_UAU_EXT.2': 1, 'FAU_GEN.1': 17, 'FAU_GEN.2': 8, 'FAU_STG.1': 7, 'FAU_SAR.1': 11, 'FAU_SAR.3': 8, 'FAU_GEN.1.1': 1, 'FAU_GEN.1.2': 1, 'FAU_GEN.2.1': 1, 'FAU_STG.1.1': 1, 'FAU_STG.1.2': 1, 'FAU_SAR.1.1': 1, 'FAU_SAR.1.2': 1, 'FAU_SAR.3.1': 1}, 'FIA': {'FIA_UAU_EXT.2': 14, 'FIA_UAU': 3, 'FIA_UAU.1': 2, 'FIA_UID.1': 8, 'FIA_UAU_EXT.2.1': 3, 'FIA_ATD.1': 8, 'FIA_UID.2': 7, 'FIA_UAU.5': 7, 'FIA_ATD.1.1': 1, 'FIA_UAU.5.1': 1, 'FIA_UAU.5.2': 1, 'FIA_UID.2.1': 1, 'FIA_UID': 1}, 'FMT': {'FMT_SMR.1': 11, 'FMT_MTD.1': 14, 'FMT_SMF.1': 10, 'FMT_SMR.1.1': 1, 'FMT_SMR.1.2': 1, 'FMT_MTD.1.1': 1, 'FMT_SMF.1.1': 1}, 'FPT': {'FPT_FLS.1': 8, 'FPT_ITT.1': 8, 'FPT_STM.1': 2, 'FPT_FLS.1.1': 1, 'FPT_ITT.1.1': 1}, 'FRU': {'FRU_DDOS_EXT.1': 13, 'FRU_DDOS': 2, 'FRU_DDOS_EXT.1.1': 3, 'FRU_DDOS_EXT.1.2': 3, 'FRU_DDOS_EXT.1.3': 3}}, 'cc_claims': {'O': {'O.DDOSMITIGATE': 6, 'O.MANAGE': 8, 'O.PROCOM': 5, 'O.AUDIT': 10, 'O.DDOSALERT': 5, 'O.IDAUTH': 9, 'O.FAILSAFE': 6, 'O.TRANSMISSION': 1}, 'T': {'T.DDOSATTACK': 3, 'T.MANAGE': 3, 'T.PROCOM': 3, 'T.AUDIT': 4, 'T.NOAUTH': 3, 'T.FAILURE': 3}, 'A': {'A.CONNECT': 3, 'A.PHYSICAL': 3, 'A.BACKUP': 3, 'A.NOEVIL': 3}, 'OE': {'OE.CONNECT': 3, 'OE.BACKUP': 3, 'OE.NOEVIL': 3, 'OE.PHYSICAL': 3, 'OE.TIME': 5, 'OE.AUDIT': 4}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {'AES_competition': {'AES': {'AES': 1}}}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {'SSH': {'SSH': 2}}, 'randomness': {}, 'cipher_mode': {'CBC': {'CBC': 1}, 'CTR': {'CTR': 1}}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {'CVE': {'CVE-2008-5161': 1}}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'RFC': {'RFC 1858': 2, 'RFC 1918': 1, 'RFC1858': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI': 1}}}
. - The report_filename property was set to
st_vid10380-vr.pdf
. - The st_filename property was set to
st_vid10380-st.pdf
.
The computed heuristics were updated.
- The cert_lab property was set to
['US']
. - The cert_id property was set to
CCEVS-VR-VID-10380-2012
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_lab property was set to
None
. - The cert_id property was set to
None
. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_DPT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "7f09c099abfb5dbf",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CCEVS-VR-VID-10380-2012",
"cert_lab": [
"US"
],
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"5.0.12"
]
},
"indirect_transitive_cves": null,
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"scheme_data": {
"category": "Miscellaneous",
"certification_date": "2012-12-21",
"evaluation_facility": "CygnaCom Solutions, Inc",
"expiration_date": "2014-12-21",
"id": "CCEVS-VR-VID10380",
"product": "RioRey\u2122 Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9",
"scheme": "US",
"url": "https://www.niap-ccevs.org/product/10380",
"vendor": "RioRey, Inc."
},
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "RIOREY Incorporated",
"manufacturer_web": "https://www.riorey.com/",
"name": "RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9",
"not_valid_after": "2014-12-31",
"not_valid_before": "2012-12-21",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "st_vid10380-vr.pdf",
"report_frontpage": {
"US": {
"cert_id": "CCEVS-VR-VID10380-2012",
"cert_item": "RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9",
"cert_lab": "US NIAP"
}
},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"US": {
"CCEVS-VR-VID10380-2012": 1
}
},
"cc_claims": {
"A": {
"A.BACKUP": 1,
"A.CONNECT": 1,
"A.NOEVIL": 1,
"A.PHYSICAL": 1
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 2,
"AGD_PRE.1": 2
},
"ALC": {
"ALC_CMC.4": 2,
"ALC_CMS.4": 2,
"ALC_DEL.1": 2,
"ALC_DVS.1": 2,
"ALC_FLR.1": 4,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 3
},
"AVA": {
"AVA_VAN.2": 1,
"AVA_VAN.3": 1
}
},
"cc_security_level": {
"EAL": {
"EAL 4": 8,
"EAL 4 augmented": 1
}
},
"cc_sfr": {},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 1858": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/CreationDate": "D:20130115103913",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20130115103913",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 371708,
"pdf_hyperlinks": {
"_type": "Set",
"elements": [
"http://www.cygnacom.com/labs/common-criteria/index.htm",
"mailto:[email protected]",
"http://www.niap-ccevs.org/cc-scheme",
"http://www.niap-ccevs.org/",
"mailto:[email protected]"
]
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 32
},
"st_filename": "st_vid10380-st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.BACKUP": 3,
"A.CONNECT": 3,
"A.NOEVIL": 3,
"A.PHYSICAL": 3
},
"O": {
"O.AUDIT": 10,
"O.DDOSALERT": 5,
"O.DDOSMITIGATE": 6,
"O.FAILSAFE": 6,
"O.IDAUTH": 9,
"O.MANAGE": 8,
"O.PROCOM": 5,
"O.TRANSMISSION": 1
},
"OE": {
"OE.AUDIT": 4,
"OE.BACKUP": 3,
"OE.CONNECT": 3,
"OE.NOEVIL": 3,
"OE.PHYSICAL": 3,
"OE.TIME": 5
},
"T": {
"T.AUDIT": 4,
"T.DDOSATTACK": 3,
"T.FAILURE": 3,
"T.MANAGE": 3,
"T.NOAUTH": 3,
"T.PROCOM": 3
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 1,
"ADV_FSP.4": 1,
"ADV_IMP.1": 1,
"ADV_TDS.3": 1
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.1": 3,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT.1": 1,
"ATE_FUN.1": 1,
"ATE_IND.2": 1
},
"AVA": {
"AVA_VAN.3": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4+": 6
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 2,
"FAU_GEN.1": 17,
"FAU_GEN.1.1": 1,
"FAU_GEN.1.2": 1,
"FAU_GEN.2": 8,
"FAU_GEN.2.1": 1,
"FAU_SAR.1": 11,
"FAU_SAR.1.1": 1,
"FAU_SAR.1.2": 1,
"FAU_SAR.3": 8,
"FAU_SAR.3.1": 1,
"FAU_STG.1": 7,
"FAU_STG.1.1": 1,
"FAU_STG.1.2": 1,
"FAU_UAU_EXT.2": 1
},
"FIA": {
"FIA_ATD.1": 8,
"FIA_ATD.1.1": 1,
"FIA_UAU": 3,
"FIA_UAU.1": 2,
"FIA_UAU.5": 7,
"FIA_UAU.5.1": 1,
"FIA_UAU.5.2": 1,
"FIA_UAU_EXT.2": 14,
"FIA_UAU_EXT.2.1": 3,
"FIA_UID": 1,
"FIA_UID.1": 8,
"FIA_UID.2": 7,
"FIA_UID.2.1": 1
},
"FMT": {
"FMT_MTD.1": 14,
"FMT_MTD.1.1": 1,
"FMT_SMF.1": 10,
"FMT_SMF.1.1": 1,
"FMT_SMR.1": 11,
"FMT_SMR.1.1": 1,
"FMT_SMR.1.2": 1
},
"FPT": {
"FPT_FLS.1": 8,
"FPT_FLS.1.1": 1,
"FPT_ITT.1": 8,
"FPT_ITT.1.1": 1,
"FPT_STM.1": 2
},
"FRU": {
"FRU_DDOS": 2,
"FRU_DDOS_EXT.1": 13,
"FRU_DDOS_EXT.1.1": 3,
"FRU_DDOS_EXT.1.2": 3,
"FRU_DDOS_EXT.1.3": 3
}
},
"certification_process": {
"OutOfScope": {
"out of scope": 1,
"software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI": 1
}
},
"cipher_mode": {
"CBC": {
"CBC": 1
},
"CTR": {
"CTR": 1
}
},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {
"SSH": {
"SSH": 2
}
},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"RFC": {
"RFC 1858": 2,
"RFC 1918": 1,
"RFC1858": 1
}
},
"symmetric_crypto": {
"AES_competition": {
"AES": {
"AES": 1
}
}
},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {
"CVE": {
"CVE-2008-5161": 1
}
}
},
"st_metadata": {
"/CreationDate": "D:20130115104027",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20130115104027",
"/Producer": "Microsoft\u00ae Office Word 2007",
"pdf_file_size_bytes": 1295508,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 61
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf",
"scheme": "US",
"security_level": {
"_type": "Set",
"elements": [
"ALC_FLR.1",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "c2b9de909b2ea7c091e5fe6298c6c7f60e49758d9e3af43ea53867bdb4be1888",
"txt_hash": "ef18d13a5543fd4915ae493f2850c926f2559eecd91ed1b10c20b38b8594eaa2"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "ccc2dde8815dced4a5dad1155ea55cfdfc0bbb03549e5572affa377979dbce6e",
"txt_hash": "3e0f4b32d3541deaabc1a8c3531e466582639db1dc1c9809bc91232fc0e2ea70"
}
},
"status": "archived"
}