Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Smart TV Security Solution V2.0 for Samsung Knox
KECS-CISS-0846-2017
KOMSCO JK11
KECS-ISIS-0272-2010
name Smart TV Security Solution V2.0 for Samsung Knox KOMSCO JK11
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
not_valid_after 27.12.2022 01.06.2019
not_valid_before 27.12.2017 12.10.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[KECS-CR-17-82]%20Smart%20TV%20Security%20Solution%20V2.0%20for%20Samsung%20Knox%20Certification%20Report.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-0272-2010(KOMSCO%20JK11)_e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[ENG]%20Smart%20TV%20Security%20Solution_V2.0_for_Samsung_Knox_Security_Target_V1.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KOMSCO%20JK11%20Security%20Target%20Lite_e.pdf
manufacturer Samsung Electronics Co., Ltd. KOMSCO
manufacturer_web https://www.samsung.com https://www.komsco.com
security_level EAL1 ATE_DPT.2, EAL4+, AVA_VAN.4
dgst 12b9f4a00b619e96 794dbdddfa49f688
heuristics/cert_id KECS-CISS-0846-2017 KECS-ISIS-0272-2010
heuristics/extracted_sars AGD_PRE.1, ASE_CCL.1, ASE_INT.1, ADV_FSP.1, ALC_CMS.1, AVA_VAN.1, ASE_OBJ.1, ASE_ECD.1, ATE_IND.1, ASE_REQ.1, ASE_TSS.1, ALC_CMC.1, AGD_OPE.1 ADV_IMP.2, ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, AVA_VLA.4, ASE_REQ.2, ALC_TAT.1, ALC_DVS.2, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ATE_DPT.2, ASE_OBJ.2, AVA_VAN.4, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, AVA_MSU.2, ALC_CMC.4, ALC_LCD.1
heuristics/extracted_versions 2.0 -
heuristics/scheme_data
  • category: Smart TV Security Solution
  • cert_id: KECS-CISS-0846-2017
  • certification_date: 27.12.2017
  • enhanced:
  • level: EAL1
  • product: Smart TV Security Solution V2.0 for Samsung Knox
  • product_link: https://itscc.kr/certprod/view.do?product_id=846&product_class=4
  • vendor: Samsung Electronics Co., Ltd.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0438-2007
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0438-2007
pdf_data/report_filename [KECS-CR-17-82] Smart TV Security Solution V2.0 for Samsung Knox Certification Report.pdf KECS-ISIS-0272-2010(KOMSCO JK11)_e.pdf
pdf_data/report_keywords/cc_cert_id
  • KR:
    • KECS-CISS-0846-2017: 1
  • KR:
    • KECS-ISIS-0272-2010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 6
  • EAL:
    • EAL4+: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.1: 2
    • ASE_REQ.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_IND.1: 3
  • AVA:
    • AVA_VAN.1: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_DPT.2: 2
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.4: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.TOE: 1
    • A.TSF: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 52
  • Samsung:
    • Samsung: 6
pdf_data/report_keywords/eval_facility
  • KSEL:
    • KSEL: 3
  • KISA:
    • KISA: 2
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 1
  • miscellaneous:
    • ARIA:
      • ARIA: 3
    • SEED:
      • SEED: 4
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 2
    • ECDH:
      • ECDH: 1
pdf_data/report_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 3
    • SHA2:
      • SHA-256: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
      • TLS 1.2: 1
pdf_data/report_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/report_keywords/tee_name
  • ARM:
    • ARM TrustZone: 2
  • other:
    • TEE: 8
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • SCP:
    • SCP02: 4
pdf_data/report_metadata
  • /Author: 이은경
  • /CreationDate: D:20171222093642+09'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20171222093642+09'00'
  • /Producer: Microsoft® Word 2013
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 314111
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
  • /Author: ITSCC
  • /CreationDate: D:20110729144857+09'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20110729144857+09'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: KECS-ISIS-0272-2010(KOMSCO JK11)_e.hwp
  • pdf_file_size_bytes: 306165
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename [ENG] Smart TV Security Solution_V2.0_for_Samsung_Knox_Security_Target_V1.4.pdf KOMSCO JK11 Security Target Lite_e.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0438-2007: 1
    • BSI-DSZ-CC-0501-2008-MA-04: 1
    • BSI-DSZ-CC-0624-2010-MA-04: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL1: 4
  • EAL:
    • EAL 4+: 1
    • EAL4: 12
    • EAL4+: 6
    • EAL5+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 14
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 9
  • ALC:
    • ALC_CMC.1: 5
    • ALC_CMS.1: 7
  • ASE:
    • ASE_CCL.1: 15
    • ASE_ECD.1: 13
    • ASE_INT.1: 15
    • ASE_OBJ.1: 5
    • ASE_REQ.1: 13
    • ASE_TSS.1: 6
  • ATE:
    • ATE_IND.1: 6
  • AVA:
    • AVA_VAN.1: 7
  • ADV:
    • ADV_ARC.1: 16
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 15
    • ADV_IMP.1: 11
    • ADV_IMP.2: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 21
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.4: 8
    • ALC_DEL.1: 7
    • ALC_DVS.1: 8
    • ALC_DVS.2: 1
    • ALC_LCD.1: 9
    • ALC_TAT.1: 10
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 1
    • ATE_DPT.2: 14
    • ATE_FUN.1: 14
    • ATE_IND.2: 9
  • AVA:
    • AVA_MSU.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 15
    • AVA_VLA.4: 1
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 14
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 19
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.1: 1
    • FDP_DAU.1: 4
    • FDP_DAU.1.1: 1
    • FDP_DAU.1.2: 1
    • FDP_IFC.1: 8
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
  • FIA:
    • FIA_AFL.1: 2
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_TEE.1: 5
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 13
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 18
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.2: 15
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 22
    • FIA_UAU.1.1: 7
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 15
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 6
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 6
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.TOE: 2
    • A.TSF: 2
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IDENTIFICATI: 1
    • O.JAVAOBJECT: 2
  • OE:
    • OE.TSF: 3
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 10
    • OP.INSTALL: 10
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 10
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 47
  • Samsung:
    • Samsung: 12
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 8
    • DES:
      • DES: 1
  • miscellaneous:
    • ARIA:
      • ARIA: 4
    • SEED:
      • SEED: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 6
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
  • RSA:
    • RSA 1024: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 3
  • SHA:
    • SHA2:
      • SHA-256: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 1
    • Key agreement: 1
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 2
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 7
    • Physical tampering: 2
    • malfunction: 2
  • SCA:
    • DPA: 1
    • SPA: 1
    • timing attack: 1
pdf_data/st_keywords/tee_name
  • ARM:
    • ARM TrustZone: 2
  • other:
    • TEE: 8
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-04-001: 1
    • CCMB-2017-04-002: 1
    • CCMB-2017-04-003: 1
  • FIPS:
    • FIPS PUB 180-4: 2
    • FIPS PUB 197: 2
  • RFC:
    • RFC2898: 1
  • BSI:
    • AIS20: 1
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
  • PKCS:
    • PKCS#2: 1
  • SCP:
    • SCP 02: 1
    • SCP02: 20
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible that load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE TOE is the JavaCard Platform that supports the analysis of: 1
pdf_data/st_metadata
  • /Author: ITSCC
  • /CreationDate: D:20110729101020+09'00'
  • /Creator: PDFCreator Version 1.2.0
  • /Keywords:
  • /ModDate: D:20110729101020+09'00'
  • /Producer: GPL Ghostscript 9.0
  • /Subject:
  • /Title: [????] Security Target Lite_e
  • pdf_file_size_bytes: 1626173
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 90
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different