Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ATEN/IOGear Secure KVM Switch Series
CCEVS-VR-10446-2011
RC-SA08/01et RC-SA08/02 version 1.00
ANSSI-CC-2017/44
name ATEN/IOGear Secure KVM Switch Series RC-SA08/01et RC-SA08/02 version 1.00
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 01.11.2014 21.08.2022
not_valid_before 01.07.2011 21.08.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10446-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-2017_44fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10446-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi_cible2017_44en.pdf
manufacturer ATEN International Co., LTD Sony Corporation
manufacturer_web https://www.aten.com https://www.sony.com/
security_level EAL2+, ALC_FLR.2 EAL5+, ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
dgst 2b7233c8fe166ccf 549050cd6694b982
heuristics/cert_id CCEVS-VR-10446-2011 ANSSI-CC-2017/44
heuristics/cert_lab US SERMA
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ADV_TDS.5, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ATE_FUN.2, ALC_TAT.3, ADV_FSP.5, AGD_OPE.1, AGD_PRE.1, ATE_DPT.3, ADV_ARC.1, ALC_CMC.5, ADV_IMP.2, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ADV_INT.3, ATE_IND.2, ASE_CCL.1, ATE_COV.3
heuristics/extracted_versions - 1.00
heuristics/report_references/directly_referencing {} ANSSI-CC-2016/58
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2016/58
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.07.2011
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10446
  • product: ATEN/IOGear Secure KVM Switch Series
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10446
  • vendor: ATEN International Co., Ltd.
heuristics/protection_profiles fd5d86dc01df0437 cf0f01bcd7be3e9c
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0084b_pdf.pdf
pdf_data/report_filename st_vid10446-vr.pdf anssi-cc-2017_44fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-10446-2011
    • cert_item: ATEN/IOGear Secure KVM Switch Series
    • cert_lab: US NIAP
  • FR:
    • cc_security_level: EAL 5 augmenté ASE_TSS.2, ALC_DVS.2, AVA_VAN.5
    • cc_version: Critères Communs version 3.1 révision 4
    • cert_id: ANSSI-CC-2017/44
    • cert_item: RC-SA08/01 et RC-SA08/02
    • cert_item_version: Version 1.00
    • cert_lab: Serma Safety & Security 14 rue Galilée, CS 10055, 33615 Pessac Cedex, France
    • developer: Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa- ku Tokyo, 141-86-10 Japan STMicroelectronics 190 avenue Celestin Coq, ZI de Rousset, 13106 Rousset, France Commanditaire Sony Corporation Sony City Osaki 2-10-1 Osaki Shinagawa-ku Tokyo, 141-86-10 Japan
    • match_rules: ['Référence du rapport de certification(.+)Nom du produit(.+)Référence/version du produit(.*)Conformité à un profil de protection(.+)Critères d’évaluation et version(.+)Niveau d’évaluation(.+)Développeurs(.+)Centre d’évaluation(.+)Accords de reconnaissance applicables']
    • ref_protection_profiles: PP 0084], version 1.0 Security IC Platform Protection Profile with Augmentation Packages
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10446-2011: 1
  • FR:
    • ANSSI-CC-2016/58: 2
    • ANSSI-CC-2017/44: 17
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084-2014: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2+: 4
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 3
    • EAL 7: 1
    • EAL2: 2
    • EAL5: 1
    • EAL7: 1
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_DVS.2: 2
    • ALC_FLR: 2
    • ALC_FLR.1: 1
    • ALC_TAT: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
    • ASE_TSS.2: 3
  • ATE:
    • ATE_COV: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.5: 5
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.TRANSFER: 1
pdf_data/report_keywords/vendor
  • STMicroelectronics:
    • STMicroelectronics: 1
pdf_data/report_keywords/eval_facility
  • Serma:
    • SERMA: 1
    • Serma Safety & Security: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/cplc_data
  • ICType:
    • IC Type: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /Author: Petty, Jean E
  • /CreationDate: D:20110714095732
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110714095732
  • /Producer: Microsoft® Office Word 2007
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 251018
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20170904143302+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: ANSSI-CC-CER-F-07.024
  • /ModDate: D:20170911160750+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 531170
  • pdf_hyperlinks: http://www.ssi.gouv.fr/, mailto:[email protected]
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename st_vid10446-st.pdf anssi_cible2017_44en.pdf
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0084: 36
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 2+: 1
    • EAL2: 3
    • EAL2 augmented: 3
  • EAL:
    • EAL5: 9
    • EAL5 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 6
    • ADV_FSP: 1
    • ADV_FSP.5: 6
    • ADV_IMP.1: 3
    • ADV_IMP.2: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 2
    • ADV_TDS.5: 1
  • AGD:
    • AGD_OPE.1: 4
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.5: 5
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 10
    • ALC_FLR.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 3
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 2
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 9
  • ATE:
    • ATE_COV.2: 2
    • ATE_COV.3: 1
    • ATE_DPT.1: 1
    • ATE_DPT.3: 2
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 10
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ETC.1: 1
    • FDP_IFC.1: 5
    • FDP_IFF.1: 5
    • FDP_ITC.1: 1
    • FDP_MSA.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.3: 5
    • FMT_SMF.1: 4
    • FMT_SMR.1: 4
  • FAU:
    • FAU_SAS: 1
    • FAU_SAS.1: 6
    • FAU_SAS.1.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.4: 2
    • FCS_RNG: 1
    • FCS_RNG.1: 7
    • FCS_RNG.1.1: 1
    • FCS_RNG.1.2: 1
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 1
    • FDP_ACF.1: 11
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 10
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
    • FDP_ITC.2: 2
    • FDP_ITT.1: 8
    • FDP_ITT.1.1: 1
    • FDP_RIP.1: 2
    • FDP_ROL.1: 1
    • FDP_SDC: 1
    • FDP_SDC.1: 5
    • FDP_SDC.1.1: 1
    • FDP_SDI: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_TDC.1: 1
  • FIA:
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 2
    • FIA_UAU.4: 4
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 2
    • FIA_UID.1: 7
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 2
  • FMT:
    • FMT_LIM.1: 9
    • FMT_LIM.1.1: 1
    • FMT_LIM.2: 9
    • FMT_LIM.2.1: 1
    • FMT_MOF.1: 5
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MTD.1: 2
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 13
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNL.1: 7
    • FPR_UNL.1.1: 1
  • FPT:
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 9
    • FPT_PHP.3.1: 1
    • FPT_RPL.1: 2
    • FPT_TDC.1: 1
    • FPT_TRP.1: 2
  • FRU:
    • FRU_FLT.2: 9
    • FRU_FLT.2.1: 1
    • FRU_RSA.2: 2
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • O:
    • O.CONF: 1
    • O.INDICATE: 1
    • O.ROM: 3
    • O.SELECT: 1
    • O.SWITCH: 1
    • O.USBDETECT: 1
  • OE:
    • OE.ACCESS: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.TRANSFER: 1
  • O:
    • O.AC: 18
    • O.RND: 5
    • O.SC: 12
  • T:
    • T.RND: 4
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 7
    • STMicroelectronics: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • DES:
      • DES: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 10
    • RNG: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 9
  • FI:
    • Malfunction: 13
    • malfunction: 3
  • SCA:
    • Leak-Inherent: 13
    • Physical Probing: 2
    • Side-channel: 1
    • physical probing: 4
    • side-channel: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 18092: 2
    • ISO/IEC 7816: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • FeliCa OS, and APDU commands, which are processed by the Java Card System. The antenna, which is out of scope of the TOE, provides the RF interface on the smart card. The Java Card System and Java Applets are: 1
    • out of scope: 2
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different