Comparing certificates Experimental feature

You are comparing two certificates. By default, only different attributes are shown. Use the button below to show/hide all attributes.

IC chip for the reader / writer RC-S940 (CXD9768GG), version 4
BSI-DSZ-CC-0588-2009
Oracle Database 11g Enterprise Edition with Oracle Database Vault Release 11.1.0.7 with Critical Patch Updates up to and including July 2009
BSI-DSZ-CC-0588-2009
name IC chip for the reader / writer RC-S940 (CXD9768GG), version 4 Oracle Database 11g Enterprise Edition with Oracle Database Vault Release 11.1.0.7 with Critical Patch Updates up to and including July 2009
category ICs, Smart Cards and Smart Card-Related Devices and Systems Databases
not_valid_before 2009-07-30 2009-10-12
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0308b_pdf.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0588b_pdf.pdf
manufacturer Sony Corporation Oracle Corporation
manufacturer_web https://www.sony.com/ https://www.oracle.com
security_level EAL4 EAL4+, ALC_FLR.3
state/st/pdf_hash e9e1220e48d91026af3d57651c2d4aafc383d7e462d61de9efc9a0f5fddd44b4 369e104d3865128871a11f5e87fa417f74f5dc7fd957f75db8ef5fd936d8a3f0
state/st/txt_hash 06f0047ce2d6262bd013e6c87868a2b41c26a9c06801a15179fafef22c05fe3c 949de8e7228cefba1fe056f073cf9242381195eaeef0e5b515beb078ae475dc9
heuristics/extracted_versions 4 11.1.0.7
heuristics/report_references/directly_referencing BSI-DSZ-CC-0403-2008 None
heuristics/report_references/indirectly_referencing BSI-DSZ-CC-0403-2008 None
pdf_data/st_filename 0308b_pdf.pdf 0588b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0486-2004: 1
  • US:
    • CCEVS-VR-07-0054: 2
    • CCEVS-VR-VID10271-2007: 1
    • CCEVS-VR-VID10271: 1
pdf_data/st_keywords/cc_claims
  • O:
    • O.PROTECT_REALM: 4
    • O.PROTECT_COMMAND: 2
    • O.RESTRICT_MGMT: 3
    • O.DBV_ACCOUNT: 2
    • O.AUDIT_REVIEW: 1
  • T:
    • T.ADMIN_ACCESS: 3
    • T.DBV_MGMT: 2
    • T.DBV_ACCOUNT: 1
  • A:
    • A.DBV_INSTALL: 2
  • OE:
    • OE.DBV_INSTALL: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 3
    • ACM_CAP.4: 3
    • ACM_SCP.2: 3
    • ACM_SCP.1: 1
    • ACM_CAP.3: 1
  • ADO:
    • ADO_DEL.2: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.2: 3
    • ADV_HLD.2: 5
    • ADV_IMP.1: 4
    • ADV_LLD.1: 5
    • ADV_RCR.1: 4
    • ADV_SPM.1: 6
    • ADV_FSP.1: 7
    • ADV_HLD.1: 2
  • AGD:
    • AGD_ADM.1: 7
    • AGD_USR.1: 3
  • ALC:
    • ALC_DVS.1: 4
    • ALC_LCD.1: 3
    • ALC_TAT.1: 4
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.2: 3
    • AVA_SOF.1: 3
    • AVA_VLA.2: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_TDS.3: 1
    • ADV_IMP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_FLR.3: 9
    • ALC_FLR: 2
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.2: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sar/ADV
  • ADV_FSP.2: 3
  • ADV_HLD.2: 5
  • ADV_IMP.1: 4
  • ADV_LLD.1: 5
  • ADV_RCR.1: 4
  • ADV_SPM.1: 6
  • ADV_FSP.1: 7
  • ADV_HLD.1: 2
  • ADV_ARC.1: 1
  • ADV_FSP.4: 1
  • ADV_TDS.3: 1
  • ADV_IMP.1: 1
pdf_data/st_keywords/cc_sar/ADV/ADV_IMP.1 4 1
pdf_data/st_keywords/cc_sar/AGD
  • AGD_ADM.1: 7
  • AGD_USR.1: 3
  • AGD_OPE.1: 1
  • AGD_PRE.1: 1
pdf_data/st_keywords/cc_sar/ALC
  • ALC_DVS.1: 4
  • ALC_LCD.1: 3
  • ALC_TAT.1: 4
  • ALC_FLR.3: 9
  • ALC_FLR: 2
  • ALC_CMC.4: 1
  • ALC_CMS.4: 1
  • ALC_DEL.1: 1
  • ALC_DVS.1: 1
  • ALC_LCD.1: 1
  • ALC_TAT.1: 1
pdf_data/st_keywords/cc_sar/ALC/ALC_DVS.1 4 1
pdf_data/st_keywords/cc_sar/ALC/ALC_LCD.1 3 1
pdf_data/st_keywords/cc_sar/ALC/ALC_TAT.1 4 1
pdf_data/st_keywords/cc_sar/ATE
  • ATE_COV.2: 3
  • ATE_DPT.1: 3
  • ATE_FUN.1: 3
  • ATE_IND.2: 3
  • ATE_COV.2: 1
  • ATE_DPT.2: 1
  • ATE_FUN.1: 1
  • ATE_IND.2: 1
pdf_data/st_keywords/cc_sar/ATE/ATE_COV.2 3 1
pdf_data/st_keywords/cc_sar/ATE/ATE_FUN.1 3 1
pdf_data/st_keywords/cc_sar/ATE/ATE_IND.2 3 1
pdf_data/st_keywords/cc_sar/AVA
  • AVA_MSU.2: 3
  • AVA_SOF.1: 3
  • AVA_VLA.2: 3
  • AVA_VAN.3: 1
pdf_data/st_keywords/cc_security_level/EAL
  • EAL4: 10
  • EAL4: 10
  • EAL4 augmented: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 22
    • FCS_CKM.1: 20
    • FCS_CKM.4: 16
    • FCS_COP.1.1: 2
    • FCS_CKM.1.1: 2
    • FCS_CKM.4.1: 2
  • FDP:
    • FDP_IFC.1: 20
    • FDP_IFF.1: 15
    • FDP_ITT.1: 12
    • FDP_SDI.1: 14
    • FDP_UIT.1: 11
    • FDP_UCT.1: 11
    • FDP_ACC.1: 13
    • FDP_ACF.1: 10
    • FDP_IFC.1.1: 1
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITT.1.1: 1
    • FDP_SDI.1.1: 1
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
    • FDP_UCT.1.1: 1
    • FDP_ACC.1.1: 1
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ITC.1: 2
    • FDP_ACC: 3
  • FIA:
    • FIA_UID.1: 11
    • FIA_UAU.2: 10
    • FIA_AFL.1: 7
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UAU.2.1: 1
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 2
    • FIA_ALF.1: 2
    • FIA_UAU: 1
    • FIA_AFL: 1
  • FMT:
    • FMT_SMR.1: 15
    • FMT_MTD.1: 10
    • FMT_MSA.2: 11
    • FMT_MSA.3: 12
    • FMT_MSA.1: 22
    • FMT_SMF.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MTD.1.1: 1
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MSA.1.1: 2
    • FMT_SMF.1.1: 1
    • FMT_MSA: 1
  • FPT:
    • FPT_FLS.1: 19
    • FPT_PHP.3: 14
    • FPT_ITT.1: 12
    • FPT_RCV.4: 20
    • FPT_TST.1: 11
    • FPT_FLS.1.1: 1
    • FPT_TST.1.1: 1
    • FPT_TST: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_PHP.3.1: 1
    • FPT_ITT.1.1: 1
    • FPT_RCV.4.1: 1
    • FPT_SDI.1: 1
    • FPT_AMT.1: 3
  • FTP:
    • FTP_ITC.1: 22
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 2
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.2: 5
    • FAU_SAR.1: 6
    • FAU_STG.1: 6
    • FAU_GEN.1.1: 2
    • FAU_SAR.3: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2.1: 2
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FDP:
    • FDP_ACF.1: 7
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 3
    • FDP_ACF.1.4: 4
    • FDP_ACC.1: 7
    • FDP_ACC.1.1: 2
    • FDP_ACF.1.1: 2
  • FIA:
    • FIA_ATD.1.1: 4
    • FIA_ATD.1: 6
    • FIA_USB.1: 6
    • FIA_USB.1.1: 2
    • FIA_USB.1.2: 2
    • FIA_USB.1.3: 2
    • FIA_USB: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_SMF.1.1: 3
    • FMT_SMT.1.1: 1
    • FMT_MOF.1: 6
    • FMT_MSA.1: 7
    • FMT_MSA.3: 7
    • FMT_MTD.1: 6
    • FMT_SMF.1: 6
    • FMT_SMR.1: 9
    • FMT_MOF.1.1: 2
    • FMT_MSA.1.1: 3
    • FMT_MSA.3.1: 2
    • FMT_MTD.1.1: 2
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 1
pdf_data/st_keywords/cc_sfr/FDP
  • FDP_IFC.1: 20
  • FDP_IFF.1: 15
  • FDP_ITT.1: 12
  • FDP_SDI.1: 14
  • FDP_UIT.1: 11
  • FDP_UCT.1: 11
  • FDP_ACC.1: 13
  • FDP_ACF.1: 10
  • FDP_IFC.1.1: 1
  • FDP_IFF.1.1: 1
  • FDP_IFF.1.2: 1
  • FDP_IFF.1.3: 1
  • FDP_IFF.1.4: 1
  • FDP_IFF.1.5: 1
  • FDP_IFF.1.6: 1
  • FDP_ITT.1.1: 1
  • FDP_SDI.1.1: 1
  • FDP_UIT.1.1: 1
  • FDP_UIT.1.2: 1
  • FDP_UCT.1.1: 1
  • FDP_ACC.1.1: 1
  • FDP_ACF.1.1: 1
  • FDP_ACF.1.2: 1
  • FDP_ACF.1.3: 1
  • FDP_ACF.1.4: 1
  • FDP_ITC.1: 2
  • FDP_ACC: 3
  • FDP_ACF.1: 7
  • FDP_ACF.1.2: 3
  • FDP_ACF.1.3: 3
  • FDP_ACF.1.4: 4
  • FDP_ACC.1: 7
  • FDP_ACC.1.1: 2
  • FDP_ACF.1.1: 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1 13 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACC.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1 10 7
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.1 1 2
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.2 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.3 1 3
pdf_data/st_keywords/cc_sfr/FDP/FDP_ACF.1.4 1 4
pdf_data/st_keywords/cc_sfr/FIA
  • FIA_UID.1: 11
  • FIA_UAU.2: 10
  • FIA_AFL.1: 7
  • FIA_UID.1.1: 1
  • FIA_UID.1.2: 1
  • FIA_UAU.2.1: 1
  • FIA_AFL.1.1: 1
  • FIA_AFL.1.2: 2
  • FIA_ALF.1: 2
  • FIA_UAU: 1
  • FIA_AFL: 1
  • FIA_ATD.1.1: 4
  • FIA_ATD.1: 6
  • FIA_USB.1: 6
  • FIA_USB.1.1: 2
  • FIA_USB.1.2: 2
  • FIA_USB.1.3: 2
  • FIA_USB: 1
  • FIA_UID.1: 3
pdf_data/st_keywords/cc_sfr/FIA/FIA_UID.1 11 3
pdf_data/st_keywords/cc_sfr/FMT
  • FMT_SMR.1: 15
  • FMT_MTD.1: 10
  • FMT_MSA.2: 11
  • FMT_MSA.3: 12
  • FMT_MSA.1: 22
  • FMT_SMF.1: 11
  • FMT_SMR.1.1: 1
  • FMT_SMR.1.2: 1
  • FMT_MSA.2.1: 1
  • FMT_MTD.1.1: 1
  • FMT_MSA.3.1: 1
  • FMT_MSA.3.2: 1
  • FMT_MSA.1.1: 2
  • FMT_SMF.1.1: 1
  • FMT_MSA: 1
  • FMT_SMF.1.1: 3
  • FMT_SMT.1.1: 1
  • FMT_MOF.1: 6
  • FMT_MSA.1: 7
  • FMT_MSA.3: 7
  • FMT_MTD.1: 6
  • FMT_SMF.1: 6
  • FMT_SMR.1: 9
  • FMT_MOF.1.1: 2
  • FMT_MSA.1.1: 3
  • FMT_MSA.3.1: 2
  • FMT_MTD.1.1: 2
  • FMT_SMR.1.1: 2
  • FMT_SMR.1.2: 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1 22 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.1.1 2 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3 12 7
pdf_data/st_keywords/cc_sfr/FMT/FMT_MSA.3.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1 10 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_MTD.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1 11 6
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMF.1.1 1 3
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1 15 9
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.1 1 2
pdf_data/st_keywords/cc_sfr/FMT/FMT_SMR.1.2 1 2
pdf_data/st_keywords/cc_sfr/FPT
  • FPT_FLS.1: 19
  • FPT_PHP.3: 14
  • FPT_ITT.1: 12
  • FPT_RCV.4: 20
  • FPT_TST.1: 11
  • FPT_FLS.1.1: 1
  • FPT_TST.1.1: 1
  • FPT_TST: 1
  • FPT_TST.1.2: 1
  • FPT_TST.1.3: 1
  • FPT_PHP.3.1: 1
  • FPT_ITT.1.1: 1
  • FPT_RCV.4.1: 1
  • FPT_SDI.1: 1
  • FPT_AMT.1: 3
  • FPT_STM.1: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 10
    • Out of scope: 1
    • i.e. TOE is operating in Normal Mode) is out of scope of this evaluation: 1
    • Out scope of the TOE) The firmware downloaded to EEPROM during IPL Mode out of scope the TOE: 1
    • of the TOE, the operation with firmware loaded in the TOE (i.e. TOE is operating in Normal Mode) is out of scope of this evaluation. Nevertheless, the assumption A.Priv is necessary to ensure, that no malicious: 1
    • 2.2. Scope of TOE This section describes which IC-chip components are scopes of TOE and which are out of scope based on the “2.1 Product Type”. Be careful that only a part of the IC-Chip components are scope of: 1
    • mode to enter if any problems were detected that interferes RC-S940 from operating. Normal Mode (Out of scope in this evaluation) Normal Mode is the operating mode in which the downloaded reader / writer: 1
    • up. Firmware of IC-Chip (Out scope of the TOE) The firmware downloaded to EEPROM during IPL Mode out of scope the TOE. Only the administrator who is privileged by the Controller is able to download the: 1
    • that the following paragraphs describe the TOE’s usage where the components are included that out of scope the TOE. Customers are able to create the firmware to be downloaded to EEPROM of the IC-Chip. The: 1
    • utilizing mutual authentication as well as data encryption. Be careful that, however, the firmware out of scopes the TOE. The list below shows an example of operation as a system or a unit provided by the: 1
    • level is sufficient. Note: The reader is reminded that the operation of the TOE in Normal Mode is out of scope of this evaluation. 3.1.Assets Assets that must be protected by TOE are defined as the: 1
    • results) is assumed. Note: The reader is reminded that the operation of the TOE in Normal Mode is out of scope of this evaluation. T.Leak_Inherent Inherent Information Leakage Attackers may disclose the data: 1
    • processes) is assumed. Note: The reader is reminded that the operation of the TOE in Normal Mode is out of scope of this evaluation. T.Phys_Prob Physical Probing Attackers may disclose the data in the TOE: 1
    • of this document. Note: The reader is reminded that the operation of the TOE in Normal Mode is out of scope of this evaluation. 4.1. Security Objectives for the TOE 4.1.1. Security Objectives for the IC-Chip: 1
    • Information Leakage Note: The reader is reminded that the operation of the TOE in Normal Mode is out of scope of this evaluation. TOE shall provide protection to the data in the TOE from leakage of information: 1
    • parts of the TOE. Note: The reader is reminded that the operation of the TOE in Normal Mode is out of scope of this evaluation. Threats: T.Power_Down RC-S940 Security Target (Public Version) Version.2.04: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
pdf_data/st_keywords/side_channel_analysis
  • SCA:
    • Physical Probing: 5
    • physical probing: 3
    • DPA: 1
  • FI:
    • Malfunction: 26
    • DFA: 1
  • other:
    • reverse engineering: 1
  • other:
    • Reverse engineering: 1
pdf_data/st_keywords/side_channel_analysis/other
  • reverse engineering: 1
  • Reverse engineering: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS20: 2
    • AIS 20: 1
  • ISO:
    • ISO/IEC 18092: 2
    • ISO/IEC 15408: 6
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • FIPS:
    • FIPS46-3: 2
    • FIPS81: 2
    • FIPS PUB 46-3: 1
    • FIPS PUB 81: 1
  • ISO:
    • ISO/IEC 9075:1992: 1
pdf_data/st_keywords/standard_id/ISO
  • ISO/IEC 18092: 2
  • ISO/IEC 15408: 6
  • ISO/IEC 9075:1992: 1
pdf_data/st_keywords/symmetric_crypto/DES
  • DES:
    • DES: 17
  • 3DES:
    • Triple-DES: 4
  • DES:
    • DES: 2
pdf_data/st_keywords/symmetric_crypto/DES/DES/DES 17 2
pdf_data/st_metadata
  • pdf_file_size_bytes: 309061
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 70
  • /Author: EbisawaHiroki
  • /Comments: 英文校正 by H.Hamada
  • /Company: Sony Corporation
  • /CreationDate: D:20050819223433+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 7.0
  • /ModDate: D:20050819223926+09'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /Subject: 英文(K.H.)
  • /Title: MDPU2 ST Ver1.11
  • pdf_hyperlinks:
  • pdf_file_size_bytes: 449794
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 59
  • /CreationDate: D:20091022100134Z
  • /Subject: Security Evaluation of Oracle Database
  • /Author: Oracle Corporation
  • /Creator: FrameMaker 8.0
  • /Keywords: Certification, Evaluation, Oracle Database, Database Vault
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /ModDate: D:20091030121717+01'00'
  • /Title: Security Target for Oracle Database 11g Release 1 (11.1.0) with Oracle Database Vault
  • pdf_hyperlinks:
pdf_data/st_metadata//Author EbisawaHiroki Oracle Corporation
pdf_data/st_metadata//CreationDate D:20050819223433+09'00' D:20091022100134Z
pdf_data/st_metadata//Creator Word 用 Acrobat PDFMaker 7.0 FrameMaker 8.0
pdf_data/st_metadata//ModDate D:20050819223926+09'00' D:20091030121717+01'00'
pdf_data/st_metadata//Producer Acrobat Distiller 7.0 (Windows) Acrobat Distiller 7.0.5 (Windows)
pdf_data/st_metadata//Subject 英文(K.H.) Security Evaluation of Oracle Database
pdf_data/st_metadata//Title MDPU2 ST Ver1.11 Security Target for Oracle Database 11g Release 1 (11.1.0) with Oracle Database Vault
pdf_data/st_metadata/pdf_file_size_bytes 309061 449794
pdf_data/st_metadata/pdf_is_encrypted True False
pdf_data/st_metadata/pdf_number_of_pages 70 59
dgst 16dd51266c48e083 e7708b4461093f8f