Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
XPCore v1.0
ISCB-3-RPT-C098-CR-v1
INTEGRITY Enterprise OS - Archon Edition
CCEVS-VR-11258-2022
name XPCore v1.0 INTEGRITY Enterprise OS - Archon Edition
category Other Devices and Systems Operating Systems
scheme MY US
not_valid_after 21.07.2024 03.05.2024
not_valid_before 21.07.2019 03.05.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C098-CERTIFICATE-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11258-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-3-RPT-C098-CR-v1.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11258-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XPCore%20Security%20Target%20v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11258-st.pdf
manufacturer MicroEngine Technology Sdn Bhd Archon Secure LLC
manufacturer_web https://www.microengine.net/ https://www.archonsec.com
security_level EAL2 {}
dgst 04e883ae3c82332b 99da63e987e2ce63
heuristics/cert_id ISCB-3-RPT-C098-CR-v1 CCEVS-VR-11258-2022
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1 ALC_TSU.1, ASE_CCL.1, AGD_PRE.1, AVA_VAN.1, ASE_OBJ.2, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ALC_CMS.1, ASE_TSS.1, ALC_TSU_EXT.1, ASE_REQ.2, ADV_FSP.1
heuristics/extracted_versions 1.0 -
heuristics/scheme_data
  • cert_no: 2019-007-C098
  • certification_date: 21.07.2019
  • developer: MicroEngine Networks Sdn Bhd
  • enhanced:
    • assurance_level: EAL2
    • category: Other Devices and Systems
    • cert_id: C098
    • certification_date: 21.07.2019
    • developer: MicroEngine Networks Sdn BhdNo.29, Jalan 19/4A, 47600 Subang Jaya, Selangor.
    • expiration_date: 21.07.2024
    • mutual_recognition: CCRA
    • product: XPCore v1.0
    • report_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C098/ISCB-3-RPT-C098-CR-v1.pdf
    • scope: The Target of Evaluation (TOE) is XPCore version 1.0. XPCore is a platform that allows multiple software components, function modules or system to exchange data and communicate with each other through the XPCore API (Application Programming Interface). The TOE can be accessible by user via a web browser and can be deploy either in a cloud environment (hosted by MicroEngine Network) or in the customer’s premises/data center (hosted by the customers). Authorized 3rd party developers will be able to integrate their own system/program with XPcore platform and utilize XPCore features. XPCore features include managing either third party or MicroEngine’s: Alarm Monitoring System CCTV Monitoring System Door Access Control Management System Time Attendance Management System System User Authentication And many more
    • status: Archive
    • target_link: https://iscb.cybersecurity.my/resources/document/mycc/mycpr/C098/XPCore%20Security%20Target%20v1.0.pdf
    • type: Cloud services platform to exchange data and communicate with each other through the XPCore API (Application Programming Interface).
  • expiration_date: 21.07.2024
  • level: EAL2
  • product: XPCore v1.0
  • recognition: CCRA
  • url: https://iscb.cybersecurity.my/index.php/certification/product-certification/mycc/archived-certified-products-and-systems/submission-view/137
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11258/
  • categories: ['Operating System']
  • category: Operating System
  • certification_date: 03.05.2022
  • evaluation_facility: Acumen Security
  • expiration_date: 03.05.2024
  • id: CCEVS-VR-VID11258
  • product: INTEGRITY Enterprise OS - Archon Edition
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11258
  • vendor: Archon Secure LLC
heuristics/protection_profiles {} e34797b67a3163c5
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_V4.2.1.pdf
pdf_data/cert_filename ISCB-5-CERT-C098-CERTIFICATE-v1.pdf st_vid11258-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11258-2022: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/eval_facility
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_metadata
  • /AAPL:Keywords: []
  • /CreationDate: D:20190808063741Z00'00'
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20190808063741Z00'00'
  • /Producer: macOS Version 10.14.5 (Build 18F132) Quartz PDFContext
  • /Title: Microsoft Word - ISCB-5-CERT-C098-CERTIFICATE-v1.docx
  • pdf_file_size_bytes: 269191
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20220510124045-04'00'
  • /ModDate: D:20220510124045-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 179620
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename ISCB-3-RPT-C098-CR-v1.pdf st_vid11258-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-11258-2022
    • cert_item: for the INTEGRITY Enterprise OS – Archon Edition
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • MY:
    • ISCB-3-RPT-C098-CR-v1: 29
  • US:
    • CCEVS-VR-11258-2022: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL2: 3
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_ACC.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.2: 1
  • FMT:
    • FMT_MSA.1: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
  • FTP:
    • FTP_TRP.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP.1: 4
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ADMIN: 1
    • A.PHYSICAL: 1
    • A.PLATFORM: 1
    • A.TIMESTAMP: 1
    • A.USER: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSI: 1
    • T.LOCAL_ATTAC: 1
    • T.NETWORK_ATT: 1
    • T.NETWORK_EAV: 1
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 6
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 3
      • SHA-384: 4
      • SHA-512: 4
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 1
  • TLS:
    • TLS:
      • TLS: 4
  • VPN:
    • VPN: 8
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 5
    • P-521: 2
    • curve P-384: 1
pdf_data/report_keywords/crypto_library
  • Generic:
    • Crypto Library v1.0: 1
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 18045: 2
    • ISO/IEC15408: 2
  • FIPS:
    • FIPS 186-4: 1
  • NIST:
    • NIST SP 800-38D: 1
    • NIST SP 800-38E: 1
    • NIST SP 800-56A: 1
    • NIST SP 800-90A: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/report_metadata
  • /AAPL:Keywords: []
  • /CreationDate: D:20190808070542Z00'00'
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20190808070542Z00'00'
  • /Producer: macOS Version 10.14.5 (Build 18F132) Quartz PDFContext
  • /Title: Microsoft Word - ISCB-3-RPT-C098-CR-v1-autorize.docx
  • pdf_file_size_bytes: 940396
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
  • /Author: ppatin
  • /CreationDate: D:20220510122315-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220510122315-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 387333
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename XPCore Security Target v1.0.pdf st_vid11258-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 8
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
  • ASE:
    • ASE_CCL.1: 4
    • ASE_ECD.1: 1
    • ASE_INT.1: 4
    • ASE_OBJ.2: 4
    • ASE_REQ.2: 7
    • ASE_SPD.1: 4
    • ASE_TSS.1: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU.1: 1
    • ALC_TSU_EXT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
  • FDP:
    • FDP_ACC.1: 13
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 2
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 5
    • FIA_UAU.1: 1
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 1
    • FMT_MTD.1: 6
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 2
  • FTP:
    • FTP_TRP.1: 5
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
  • FAU:
    • FAU_GEN.1: 2
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 3
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.4: 2
    • FCS_CKM_EXT.4.1: 2
    • FCS_CKM_EXT.4.2: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 8
    • FCS_RBG_EXT.1: 3
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_STO_EXT.1: 2
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 3
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 2
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.4: 2
    • FCS_TLSC_EXT.4.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 2
    • FDP_ACF_EXT.1.1: 1
    • FDP_IFC_EXT.1: 2
    • FDP_IFC_EXT.1.1: 1
  • FIA:
    • FIA_AFL.1: 2
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.5: 2
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
  • FMT:
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 2
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF_EXT.1: 2
    • FMT_SMF_EXT.1.1: 2
  • FPT:
    • FPT_ACF_EXT.1: 2
    • FPT_ACF_EXT.1.1: 1
    • FPT_ACF_EXT.1.2: 1
    • FPT_ASLR_EXT.1: 2
    • FPT_ASLR_EXT.1.1: 1
    • FPT_SBOP_EXT.1: 2
    • FPT_SBOP_EXT.1.1: 1
    • FPT_TST_EXT.1: 2
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.2: 2
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
  • FTA:
    • FTA_TAB.1: 2
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC_EXT.1: 2
    • FTP_ITC_EXT.1.1: 1
    • FTP_TRP.1: 2
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.PHYSICAL: 3
    • A.PLATFORM: 3
    • A.TIMESTAMP: 3
    • A.USER: 3
  • O:
    • O.ACCESS: 5
    • O.CONFIG: 4
    • O.MANAGE: 4
    • O.TOECOM: 4
    • O.USER: 5
  • OE:
    • OE.ADMIN: 3
    • OE.PHYSICAL: 2
    • OE.PLATFORM: 3
    • OE.TIMESTAMP: 2
    • OE.USER: 3
  • T:
    • T.CONFIG: 3
    • T.MANAGEMENT: 3
    • T.TOECOM: 2
    • T.UNAUTHORISED_A: 1
    • T.UNAUTHORISED_AC: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ACCOUNTABILITY: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LIMITED_PHYSICAL_ACCESS: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • STMicroelectronics:
    • STM: 1
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 1
      • HMAC-SHA-512: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
    • ECDSA:
      • ECDSA: 7
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 4
    • SHA2:
      • SHA-256: 7
      • SHA-384: 15
      • SHA-512: 8
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 4
    • TLS:
      • TLS: 1
  • IPsec:
    • IPsec: 2
  • TLS:
    • TLS:
      • TLS: 34
      • TLS 1.2: 3
  • VPN:
    • VPN: 7
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 1
pdf_data/st_keywords/cipher_mode
  • GCM:
    • GCM: 3
  • XTS:
    • XTS: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 8
    • P-384: 14
    • P-521: 6
    • curve P-384: 2
    • secp384r1: 5
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 2
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 2
pdf_data/st_keywords/crypto_library
  • Generic:
    • Crypto Library v1.0: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
    • CCMB-2017-04-004: 1
  • FIPS:
    • FIPS 186-4: 2
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38D: 2
    • NIST SP 800-38E: 2
    • NIST SP 800-56A: 1
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 2818: 1
    • RFC 5246: 2
    • RFC 5280: 3
    • RFC 5289: 2
    • RFC 5759: 2
    • RFC 6125: 2
    • RFC 6960: 2
  • X509:
    • X.509: 5
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The OS relies upon a trustworthy computing platform for its execution. This underlying platform is out of scope of this PP. A.PROPER_USER The user of the OS is not willfully negligent or hostile, and uses the: 1
    • out of scope: 1
pdf_data/st_metadata
  • /AAPL:Keywords: []
  • /CreationDate: D:20190627152545Z00'00'
  • /Creator: Word
  • /Keywords:
  • /ModDate: D:20190627152545Z00'00'
  • /Producer: macOS Version 10.14.5 (Build 18F132) Quartz PDFContext
  • /Title: Microsoft Word - XPCore Security Target v1.0.docx
  • pdf_file_size_bytes: 1081939
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 30
  • /Author: Acumen Security, LLC.
  • /CreationDate: D:20220504153555-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220504153555-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 695576
  • pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 31
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different