Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Remote Communication Gate Application Software 3.34
JISEC-CC-CRP-C0048
Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
BSI-DSZ-CC-0570-2009
name Remote Communication Gate Application Software 3.34 Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
category Network and Network-Related Devices and Systems Operating Systems
scheme JP DE
not_valid_after 07.10.2013 01.09.2019
not_valid_before 28.06.2006 24.07.2009
report_link https://www.commoncriteriaportal.org/files/epfiles/c0048_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570a_pdf.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/ https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0570b_pdf.pdf
manufacturer Ricoh Company, Ltd. Microsoft Corporation
manufacturer_web https://www.microsoft.com
security_level EAL3 EAL4+, ALC_FLR.3
dgst 16c85272260e72be 4f57d0ebb73a69ed
heuristics/cert_id JISEC-CC-CRP-C0048 BSI-DSZ-CC-0570-2009
heuristics/cert_lab [] BSI
heuristics/direct_transitive_cves {} CVE-2018-0887, CVE-2008-3013, CVE-2018-0975, CVE-2009-0081, CVE-2008-2250, CVE-2008-2251, CVE-2018-0970, CVE-2009-0082, CVE-2011-1229, CVE-2009-2532, CVE-2009-0094, CVE-2009-0085, CVE-2009-0230, CVE-2008-4268, CVE-2008-2252, CVE-2009-2526, CVE-2018-0972, CVE-2009-0320, CVE-2010-0025, CVE-2018-0960, CVE-2010-0024, CVE-2018-0973, CVE-2009-0078, CVE-2018-0971, CVE-2017-11831, CVE-2008-4036, CVE-2009-0083, CVE-2009-1536, CVE-2009-0234, CVE-2024-29056, CVE-2009-3103, CVE-2010-4562, CVE-2010-4398, CVE-2009-0086, CVE-2008-1441, CVE-2010-4669, CVE-2008-4269, CVE-2018-0974, CVE-2010-3227, CVE-2009-1216, CVE-2009-2493, CVE-2007-6753, CVE-2009-0093, CVE-2009-0233, CVE-2018-0968, CVE-2009-0080, CVE-2008-1084, CVE-2009-0568, CVE-2018-0969, CVE-2017-11852, CVE-2010-0719, CVE-2018-8641, CVE-2009-0231, CVE-2017-0175, CVE-2012-1194, CVE-2008-4038
heuristics/indirect_transitive_cves {} CVE-2018-0887, CVE-2008-3013, CVE-2018-0975, CVE-2009-0081, CVE-2008-2250, CVE-2008-2251, CVE-2018-0970, CVE-2009-0082, CVE-2011-1229, CVE-2009-2532, CVE-2009-0094, CVE-2009-0085, CVE-2009-0230, CVE-2008-4268, CVE-2008-2252, CVE-2009-2526, CVE-2018-0972, CVE-2009-0320, CVE-2010-0025, CVE-2018-0960, CVE-2010-0024, CVE-2018-0973, CVE-2009-0078, CVE-2018-0971, CVE-2017-11831, CVE-2008-4036, CVE-2009-0083, CVE-2009-1536, CVE-2009-0234, CVE-2024-29056, CVE-2009-3103, CVE-2010-4562, CVE-2010-4398, CVE-2009-0086, CVE-2008-1441, CVE-2010-4669, CVE-2008-4269, CVE-2018-0974, CVE-2010-3227, CVE-2009-1216, CVE-2009-2493, CVE-2007-6753, CVE-2009-0093, CVE-2009-0233, CVE-2018-0968, CVE-2009-0080, CVE-2008-1084, CVE-2009-0568, CVE-2018-0969, CVE-2017-11852, CVE-2010-0719, CVE-2018-8641, CVE-2009-0231, CVE-2017-0175, CVE-2012-1194, CVE-2008-4038
heuristics/extracted_sars {} ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, APE_ECD.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, APE_OBJ.2, ADV_IMP.1, ALC_LCD.1, ADV_FSP.4, ATE_DPT.2, ASE_SPD.1, APE_INT.1, ATE_COV.2, ADV_INT.3, ALC_DVS.1, ALC_TAT.1, APE_CCL.1, AGD_OPE.1, ALC_CMS.4, APE_SPD.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions 3.34 2008
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0755-2012
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0755-2012
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0048
  • certification_date: 01.06.2006
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.1
    • cert_link: https://www.ipa.go.jp/en/security/c0048_eimg.pdf
    • description: PRODUCT DESCRIPTION Remote Communication Gate Type N/L/BN1/BM1 (hereafter "RC Gate") is a communication device, which connects image I/O devices to a remote server. RC Gate is used primarily in business offices and offers the maintenance services such as machine trouble notification, automatic counter checking, ordering supplies like toner and firmware upgrading for the image I/O device. The TOE is application software embedded in the RC Gate. The security features of RC Gate are identification and authentication of operators, access control facilities for operators, identification and authentication of the server based on a digital certificate, and encrypted communication to protect information from Internet or telephone line threats.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: Remote Communication Gate Application Software
    • product_type: IT Product (Software for remote service appliance)
    • report_link: https://www.ipa.go.jp/en/security/c0048_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0048_est.pdf
    • toe_version: 3.34
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.10.2013
  • revalidations: [frozendict({'date': '2008-08', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0048_it5049_02.html'})]
  • supplier: Ricoh Company, Ltd.
  • toe_japan_name: Remote Communication Gate Application Software 3.34
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0048_it5049.html
  • toe_overseas_name: Remote Communication Gate Application Software 3.57
protection_profile_links {} {}
pdf_data/report_filename c0048_ecvr.pdf 0570a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0570-2009
    • cert_item: Microsoft Windows Server 2008 Hyper-V Role with HotFix KB950050
    • cert_lab: BSI
    • developer: Microsoft Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • JP:
    • Certification No. C0048: 1
  • DE:
    • BSI-DSZ-CC-0570-2009: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL3: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 5
    • EAL 4 augmented: 3
    • EAL 7: 1
    • EAL1: 6
    • EAL2: 3
    • EAL3: 4
    • EAL4: 4
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 2
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_DVS.1: 2
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 6
    • ALC_LCD.1: 2
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 2
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 25
    • Microsoft Corporation: 7
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Final Evaluation Technical Report Microsoft Hyper-V Server 2008, atsec information security GmbH, (confidential document) [8] Configuration lists for the TOE (confidential documents): ● Configuration List – Hyper-V RTM: 1
pdf_data/report_metadata
  • /CreationDate: D:20060628102008+09'00'
  • /ModDate: D:20060628102008+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 12877
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20090731095448+02'00'
  • /Creator: Writer
  • /Keywords: "Common Criteria, Certification, Zertifizierung, Microsoft, Hyper-V, Server 2008, Virtualization, Operating System"
  • /ModDate: D:20090803083941+02'00'
  • /Producer: StarOffice 9
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0570-2009
  • pdf_file_size_bytes: 734094
  • pdf_hyperlinks: http://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename 0570b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 1
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 2
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 6
    • FAU_GEN.1.2: 6
    • FAU_GEN.2: 12
    • FAU_GEN.2.1: 6
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 4
    • FAU_SAR.1.2: 4
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 3
    • FAU_STG.1: 6
    • FAU_STG.1.1: 3
    • FAU_STG.1.2: 3
    • FAU_STG.3: 5
    • FAU_STG.3.1: 3
    • FAU_STG.4: 6
    • FAU_STG.4.1: 4
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 6
    • FDP_ACF.1: 17
    • FDP_ACF.1.1: 6
    • FDP_ACF.1.2: 6
    • FDP_ACF.1.3: 6
    • FDP_ACF.1.4: 6
    • FDP_IFC.1: 2
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 3
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 4
    • FIA_AFL.1.2: 4
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 7
    • FIA_SOS.1: 5
    • FIA_SOS.1.1: 4
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 4
    • FIA_UAU.1.2: 3
    • FIA_UAU.2: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 4
    • FIA_UID.1: 8
    • FIA_UID.1.1: 4
    • FIA_UID.1.2: 4
    • FIA_UID.2: 6
    • FIA_UID.2.1: 3
    • FIA_USB.1: 13
    • FIA_USB.1.1: 6
    • FIA_USB.1.2: 6
    • FIA_USB.1.3: 6
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 3
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 3
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 4
    • FMT_MTD.1: 36
    • FMT_MTD.1.1: 24
    • FMT_REV.1: 7
    • FMT_REV.1.1: 3
    • FMT_REV.1.2: 4
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 6
    • FMT_SMR.1: 10
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 3
  • FPT:
    • FPT_STM.1: 8
    • FPT_STM.1.1: 3
  • FRU:
    • FRU_RSA.1: 6
    • FRU_RSA.1.1: 3
  • FTP:
    • FTP_STM.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.CLEAN_ROOT: 2
    • A.CORRECT_HARDWARE: 3
    • A.DEFINED_INSTALL: 2
    • A.MEMORY_MANAGEMENT: 2
    • A.MEMORY_MANGEMENT: 1
    • A.PARTITION_CONNECT: 2
    • A.PHYSICAL: 3
    • A.REMOTE_ADMIN: 2
    • A.REMOTE_IT_PRODUCTS: 2
    • A.SUBJECT_ALLOCATION: 1
  • O:
    • O.AUDIT_GENERATION: 15
    • O.AUTHORIZED_SUBJECT: 12
    • O.INIT_SECURE_STATE: 7
    • O.MANAGE: 20
    • O.PARTITION_ACCESS: 11
    • O.PARTITION_ISOLATION: 4
    • O.PRESERVE_PART_PRIV: 5
    • O.RESIDUAL_INFORMATION: 6
    • O.RESOURCE_ALLOCATION: 6
  • OE:
    • OE.HW_MECHANISMS: 4
    • OE.HW_SIDE_EFFECTS: 1
    • OE.MEMORY_MANAGEMENT: 2
    • OE.NETWORK: 3
    • OE.PARTITION_USER: 2
    • OE.PHYSICAL: 4
    • OE.REMOTE_ADMIN: 3
    • OE.REMOTE_IT_PRODUCT: 8
    • OE.SUBJECT_ALLOCATION: 4
    • OE.TRUSTED_INDIVIDUAL: 4
    • OE.TRUSTED_INDIVIDUALS: 1
    • OE.TRUSTED_ROOT: 4
  • T:
    • T.CONFIGURATION_CHANGE: 3
    • T.DENIAL_OF_SERVICE: 3
    • T.PARTITION_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 112
    • Microsoft Corporation: 3
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • HPC:
      • HPC: 1
    • RC:
      • RC4: 1
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-001: 1
    • CCMB-2007-09-004: 1
  • RFC:
    • RFC 3720: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /Author: Microsoft
  • /CreationDate: D:20090723152525Z
  • /Creator: Microsoft® Word 2010 (Technical Preview)
  • /Keywords: Microsoft, Windows Server 2008, Hyper-V, Security Target, Commcon Criteria Evauatin
  • /ModDate: D:20090803090123+02'00'
  • /Producer: PDF-XChange Viewer [Version: 2.0 (Build 41.5) (Mar 30 2009; 19:53:50)]
  • /Subject: Microsoft Windows Server 2008 Hyper-V Security Target
  • /Title: Microsoft Windows Server 2008 Hyper-V Security Target
  • pdf_file_size_bytes: 1098933
  • pdf_hyperlinks: http://creativecommons.org/licenses/by-nd-nc/1.0/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 93
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different