Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Owl DualDiode Communication Cards v.7
383-4-273
EnterpriseDB Postgres Plus Advanced Server 8.4
CCEVS-VR-VID-10412-2011
name Owl DualDiode Communication Cards v.7 EnterpriseDB Postgres Plus Advanced Server 8.4
category Boundary Protection Devices and Systems Databases
scheme CA US
not_valid_after 23.12.2019 01.11.2014
not_valid_before 23.12.2014 29.07.2011
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-273%20CT%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-273%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/owldualdiode-v7-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10412-st.pdf
manufacturer Owl Cyber Defense Solutions, LLC EnterpriseDB Corporation
manufacturer_web https://www.owlcyberdefense.com/ https://www.enterprisedb.com/
security_level EAL2 EAL2+, ALC_FLR.2
dgst 272a3f25ffd3140d 711c094f140cc311
heuristics/cert_id 383-4-273 CCEVS-VR-VID-10412-2011
heuristics/cert_lab CANADA US
heuristics/extracted_sars ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ASE_SPD.1, ALC_CMC.2, ATE_COV.2, ADV_FSP.2, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1, ADV_VAN.2 ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ALC_CMS.2, ASE_INT.1, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, AVA_VAN.2, ADV_TDS.1, ALC_FLR.2, ASE_SPD.1, ALC_CMC.2, ADV_FSP.2, ATE_COV.1, AGD_OPE.1, ALC_DEL.1, ASE_TSS.1, ADV_ARC.1
heuristics/extracted_versions 7 8.4
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10412/
  • categories: ['DBMS']
  • category: DBMS
  • certification_date: 29.07.2011
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10412
  • product: EnterpriseDB Postgres Plus Advanced Server 8.4
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10412
  • vendor: EnterpriseDB Corporation
heuristics/protection_profiles {} 110f0820b080edc2
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_DBMS_BR_V1.2.pdf
pdf_data/cert_filename 383-4-273 CT v1.0e.docx
pdf_data/report_filename 383-4-273 CR v1.0e.pdf st_vid10412-vr.pdf
pdf_data/report_frontpage
  • US:
  • CA:
    • cert_id: 383-4-273-CR
    • cert_lab: CANADA
  • US:
    • cert_id: CCEVS-VR-VID10412-2011
    • cert_item: Postgres Plus Advanced Server v8.4
    • cert_lab: US NIAP
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-273-CR: 1
  • US:
    • CCEVS-VR-VID10412-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
    • EAL2: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ATE:
    • ATE_FUN.1: 1
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
  • FMT:
    • FMT_REV.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_PURPOSE: 1
    • A.OS_PP_VALIDATED: 1
    • A.PHYSICAL: 1
  • T:
    • T.DENIAL_OF_SERVICE: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNIDENTIFIED_ACTIONS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 5
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 5
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2007-09-003: 2
  • RFC:
    • RFC 1321: 2
    • RFC 1413: 2
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • TOE within its Operational Environment. 5.2. Clarification of Scope Configuration Options that are Out of Scope: “Trust” authentication option (not in TOE) When the trust authentication option is specified: 1
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /CreationDate: D:20150227124752-05'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150227124752-05'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 383-4-273 CR v0.2e
  • pdf_file_size_bytes: 259117
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
pdf_data/st_filename owldualdiode-v7-sec-eng.pdf st_vid10412-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 13
    • EAL2: 1
  • EAL:
    • EAL2: 3
    • EAL2 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 16
    • ADV_FSP.1: 9
    • ADV_FSP.2: 24
    • ADV_TDS.1: 20
    • ADV_VAN.2: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 18
    • AGD_PRE: 1
    • AGD_PRE.1: 12
  • ALC:
    • ALC_CMC.2: 11
    • ALC_CMS.1: 3
    • ALC_CMS.2: 7
    • ALC_DEL.1: 8
  • ASE:
    • ASE_CCL.1: 19
    • ASE_ECD.1: 15
    • ASE_INT.1: 22
    • ASE_OBJ.2: 17
    • ASE_REQ.1: 5
    • ASE_REQ.2: 16
    • ASE_SPD.1: 13
    • ASE_TSS.1: 10
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 11
    • ATE_COV.2: 1
    • ATE_FUN.1: 14
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN.2: 9
  • ADV:
    • ADV_ARC.1: 7
    • ADV_FSP.1: 2
    • ADV_FSP.2: 6
    • ADV_TDS.1: 7
  • AGD:
    • AGD_OPE.1: 10
    • AGD_PRE: 1
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 4
    • ALC_DEL.1: 4
    • ALC_FLR.2: 9
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 5
    • ATE_FUN.1: 6
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.2: 6
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 1
    • FDP_IFC: 5
    • FDP_IFC.1: 5
    • FDP_IFC.2: 3
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF: 11
    • FDP_IFF.1: 4
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.5: 3
    • FDP_IFF.5.1: 1
    • FDP_RIP.2: 1
  • FMT:
    • FMT_MSA.3: 5
  • FPT:
    • FPT_FLS: 6
    • FPT_FLS.1: 1
    • FPT_FLS.1.1: 1
    • FPT_PHP: 4
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_GEN: 12
    • FAU_GEN.1: 4
    • FAU_GEN.2: 1
    • FAU_SEL: 10
    • FAU_SEL.1: 2
  • FDP:
    • FDP_ACC.1: 14
    • FDP_ACC.1.1: 1
    • FDP_ACF: 7
    • FDP_ACF.1: 5
    • FDP_ITC: 1
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 14
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 1
    • FIA_UAU.5: 10
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 6
    • FIA_UID.2: 1
    • FIA_UID_EXT: 2
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 3
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 11
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITA.1: 2
    • FPT_ITT.1: 2
    • FPT_OVR_EXT.1: 1
    • FPT_STM.1: 2
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 8
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 2
  • FTP:
    • FTP_ITC: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.CONNECTION: 2
    • A.GUIDE: 2
    • A.NETBREAK: 3
    • A.PHYSICAL: 3
  • O:
    • O.NON_ROUTABLE: 3
    • O.PROTOCOL_BREAK: 1
    • O.PROXY: 1
    • O.READONLY: 4
    • O.TAMPER_SEALS: 5
    • O.WRITEONLY: 3
  • OE:
    • OE.ADMIN: 2
    • OE.CONNECTION: 2
    • OE.EMISSION: 2
    • OE.GUIDE: 2
    • OE.NETBREAK: 2
    • OE.PHYSICAL: 2
  • T:
    • T.FAILURE: 3
    • T.OLD_INF: 2
    • T.TAMPER: 3
    • T.WRONGWAY: 3
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.OS_PP_VALIDA: 1
    • A.OS_PP_VALIDATED: 2
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_: 2
    • O.ACCESS_HISTORY: 4
    • O.ADMIN_: 3
    • O.ADMIN_GUIDANCE: 11
    • O.ADMIN_ROLE: 3
    • O.AUDIT_: 4
    • O.AUDIT_GENERATION: 4
    • O.AUTH: 8
    • O.AVAIL: 7
    • O.CONFIGURATION_IDEN: 1
    • O.CONFIGURATION_IDENTIFICATI: 4
    • O.CONFIGURATION_IDENTIFICATION: 4
    • O.DOCUMENTED_DESIGN: 9
    • O.INTERNAL_: 2
    • O.INTERNAL_TOE_DOMAINS: 4
    • O.MANAGE: 15
    • O.MEDIATE: 8
    • O.PARTIAL_: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 6
    • O.PARTIAL_SELF_PROTECTION: 6
    • O.PROTCOMM: 7
    • O.RESIDUAL_INFORMATIO: 1
    • O.RESIDUAL_INFORMATION: 7
    • O.TOE_ACCESS: 10
    • O.VULNERABILITY_ANALY: 1
    • O.VULNERABILITY_ANALYSIS: 9
  • OE:
    • OE.AUTH: 7
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 2
    • OE.OS_PP_VALIDATED: 5
    • OE.PHYSICAL: 4
    • OE.PROTCOMM: 8
  • T:
    • T.ACCIDENTAL_ADMIN_ERR: 1
    • T.DENIAL_OF_SERVICE: 5
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 5
    • T.POOR_IMPLEMENTATION: 3
    • T.POOR_TEST: 3
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 7
    • T.UNAUTHORIZED_ACCESS: 4
    • T.UNIDENTIFIED_ACTIONS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 11
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 40
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-09-003: 1
    • CCMB-2012-09-002: 1
  • NIST:
    • NIST SP 800-53: 2
  • RFC:
    • RFC 1321: 4
    • RFC 1413: 2
    • RFC 1964: 1
    • RFC 2743: 1
    • RFC 4510: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • PostGIS Spatial Extensions EDB*Plus Slony Replication PG Agent Update Monitor 1.4.7.2 Out of Scope The following components of the PPAS 8.4 product are not included in the TOE: Infinite Cache: 1
    • Bouncer Procedural Language Debugger StackBuilder Plus 1.4.7.3 Configuration Options that are Out of Scope. 1.4.7.3.1 “Trust” authentication option (not in TOE) When the trust authentication option is: 1
    • Out of Scope: 2
    • out of scope: 1
    • platforms are included in the TOE. In addition, the following components in the IT environment are out of scope. Postgres Plus Advanced Server v8.4 Security Target 15 Authenticator servers, if configured : 1
pdf_data/st_metadata
  • /Author: Randall Colette
  • /Company: Microsoft
  • /CreationDate: D:20160811132208-04'00'
  • /Creator: Acrobat PDFMaker 9.1 for Word
  • /ModDate: D:20160815084623-04'00'
  • /Producer: Adobe PDF Library 9.0
  • /SourceModified: D:20160811172141
  • /Subject: Security Target
  • /Title: Owl Computing Technologies DualDiode Communication Cards 10G, 2.5G, 1.0G v.7 & v.7t Models
  • pdf_file_size_bytes: 761603
  • pdf_hyperlinks: http://www.owlcti.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 39
  • /CreationDate: D:20110812120756
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110812120756
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1153309
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 94
state/cert/download_ok True False
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different