Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ATEN/IOGear Secure KVM Switch Series
CCEVS-VR-10446-2011
VMware Horizon 6 version 6.2.2 and Horizon Client 3.5.2
383-4-356
name ATEN/IOGear Secure KVM Switch Series VMware Horizon 6 version 6.2.2 and Horizon Client 3.5.2
scheme US CA
not_valid_after 01.11.2014 12.08.2021
not_valid_before 01.07.2011 12.08.2016
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-356%20CT%20v1.1e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10446-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-356%20CR%20v1.0e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10446-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-356%20ST%20Version%200%208.pdf
manufacturer ATEN International Co., LTD VMware Inc.
manufacturer_web https://www.aten.com https://www.vmware.com
dgst 2b7233c8fe166ccf 141e6b0af31f2ede
heuristics/cert_id CCEVS-VR-10446-2011 383-4-356
heuristics/cert_lab US []
heuristics/cpe_matches {} cpe:2.3:a:vmware:horizon:6.2.2:*:*:*:*:*:*:*
heuristics/extracted_versions - 6.2.2, 3.5.2
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.07.2011
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10446
  • product: ATEN/IOGear Secure KVM Switch Series
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10446
  • vendor: ATEN International Co., Ltd.
heuristics/protection_profiles fd5d86dc01df0437 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/cert_filename 383-4-356 CT v1.1e.docx
pdf_data/report_filename st_vid10446-vr.pdf 383-4-356 CR v1.0e.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10446-2011
    • cert_item: ATEN/IOGear Secure KVM Switch Series
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10446-2011: 1
  • CA:
    • 383-4-356: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2+: 4
  • EAL:
    • EAL 2+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ALC:
    • ALC_FLR.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.TRANSFER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
pdf_data/report_keywords/crypto_protocol
  • IPsec:
    • IPsec: 2
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: Petty, Jean E
  • /CreationDate: D:20110714095732
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110714095732
  • /Producer: Microsoft® Office Word 2007
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 251018
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /Author: White, Debra E.
  • /Company: CSEC
  • /CreationDate: D:20160916111055-04'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /ModDate: D:20160916111127-04'00'
  • /Producer: Adobe PDF Library 11.0
  • /SourceModified: D:20160916145933
  • /Title: 383-4-XXX CR v0.1
  • pdf_file_size_bytes: 280616
  • pdf_hyperlinks: mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid10446-st.pdf 383-4-356 ST Version 0 8.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 2+: 1
    • EAL2: 3
    • EAL2 augmented: 3
  • EAL:
    • EAL 2: 2
    • EAL2: 1
    • EAL2+: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 2
    • ADV_TDS.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.2: 2
    • ALC_CMS.2: 2
    • ALC_DEL.1: 2
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ETC.1: 1
    • FDP_IFC.1: 5
    • FDP_IFF.1: 5
    • FDP_ITC.1: 1
    • FDP_MSA.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.3: 5
    • FMT_SMF.1: 4
    • FMT_SMR.1: 4
  • FCS:
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 11
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 12
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC: 2
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF: 2
    • FDP_ACF.1: 28
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 9
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 12
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 10
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT.1: 13
    • FPT_ITT.1.1: 1
  • FTA:
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • O:
    • O.CONF: 1
    • O.INDICATE: 1
    • O.ROM: 3
    • O.SELECT: 1
    • O.SWITCH: 1
    • O.USBDETECT: 1
  • OE:
    • OE.ACCESS: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.TRANSFER: 1
  • A:
    • A.CHANNEL_PROTECTION: 5
    • A.PHYSICAL: 3
    • A.VM_HOST: 2
  • O:
    • O.AUTH_USER: 8
    • O.CHANNEL_PROTECTION: 8
    • O.CONFIG_ACCESS: 9
    • O.ENDPOINT_RESOURCE: 3
    • O.SECURE_SETUP_DATA: 7
    • O.USER_ACCESS: 7
    • O.USE_FIPS: 5
  • OE:
    • OE.ADMIN_USERS: 3
    • OE.AUTHENTICATE: 6
    • OE.CHANNEL_PROTECTION: 9
    • OE.CONFIG_SERVER: 5
    • OE.CONFIG_TP_SW: 5
    • OE.CONFIG_VM_HOST: 6
    • OE.ENCRYPTION: 6
    • OE.SERVER_PHYSICAL: 4
  • T:
    • T.ATTACK_ACCESS: 3
    • T.INTERCEPT: 3
    • T.SPOOF: 2
    • T.USER_ACCESS: 2
    • T.USER_DATA: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 19
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 4
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 5
  • TLS:
    • TLS:
      • TLS: 8
      • TLS 1.2: 28
      • TLSv1.2: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RBG: 1
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 2
    • TLS_RSA_WITH_AES_128_CBC_SHA256: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA: 2
    • TLS_RSA_WITH_AES_256_CBC_SHA256: 2
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 33
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 140-2: 10
    • FIPS 186-4: 2
    • FIPS 197: 2
    • FIPS140-2: 1
  • RFC:
    • RFC 5246: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • desktops and applications from your device of choice. However Mac, Ubuntu Linux, Mobile devices are out of scope for the evaluation. The physical components of the TOE include the software that is installed: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_garbage False True
state/cert/download_ok False True
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different