Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
ATEN/IOGear Secure KVM Switch Series
CCEVS-VR-10446-2011
Positive Technologies Application Firewall 3.6.3.758
2015-11-INF-3525
name ATEN/IOGear Secure KVM Switch Series Positive Technologies Application Firewall 3.6.3.758
category Other Devices and Systems Boundary Protection Devices and Systems
scheme US ES
status archived active
not_valid_after 01.11.2014 18.06.2026
not_valid_before 01.07.2011 18.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015-11-Diploma.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10446-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015-11-INF-3525.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10446-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/2015-11-ST.pdf
manufacturer ATEN International Co., LTD Positive Technologies
manufacturer_web https://www.aten.com https://www.ptsecurity.com
dgst 2b7233c8fe166ccf ce227b07a6391582
heuristics/cert_id CCEVS-VR-10446-2011 2015-11-INF-3525
heuristics/cert_lab US []
heuristics/extracted_versions - 3.6.3.758
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.07.2011
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10446
  • product: ATEN/IOGear Secure KVM Switch Series
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10446
  • vendor: ATEN International Co., Ltd.
  • category: Firewall
  • certification_date: 18.06.2021
  • enhanced:
  • manufacturer: Positive Technologies
  • product: Positive Technologies Application Firewall 3.6.3.758
  • product_link: https://oc.ccn.cni.es/en/certified-products/certified-products/698-positive-technologies-application-firewall-3-6-3-758
heuristics/protection_profiles fd5d86dc01df0437 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/cert_filename 2015-11-Diploma.pdf
pdf_data/cert_keywords/cc_cert_id
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • A:
    • A.U: 1
  • O:
    • O.E: 1
  • T:
    • T.I: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /Author:
  • /CreationDate:
  • /Creator:
  • /Keywords:
  • /ModDate:
  • /Producer:
  • /Subject:
  • /Title:
  • /Trapped:
  • pdf_file_size_bytes: 843786
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 2
pdf_data/report_filename st_vid10446-vr.pdf 2015-11-INF-3525.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10446-2011
    • cert_item: ATEN/IOGear Secure KVM Switch Series
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10446-2011: 1
  • ES:
    • 2015-11-INF-3525- v2: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2+: 4
  • EAL:
    • EAL 1: 1
    • EAL 2: 1
    • EAL 4: 2
    • EAL2: 3
    • EAL2+: 5
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 2
    • ALC_FLR.2: 7
  • ASE:
    • ASE_CCL.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.TRANSFER: 1
  • A:
    • A.U: 5
pdf_data/report_keywords/eval_facility
  • DEKRA:
    • DEKRA Testing and Certification: 5
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 8
pdf_data/report_metadata
  • /Author: Petty, Jean E
  • /CreationDate: D:20110714095732
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110714095732
  • /Producer: Microsoft® Office Word 2007
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 251018
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid10446-st.pdf 2015-11-ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 2+: 1
    • EAL2: 3
    • EAL2 augmented: 3
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL2: 4
    • EAL2 augmented: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 6
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 3
    • ALC_FLR.2: 3
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ETC.1: 1
    • FDP_IFC.1: 5
    • FDP_IFF.1: 5
    • FDP_ITC.1: 1
    • FDP_MSA.1: 1
  • FMT:
    • FMT_MSA.1: 5
    • FMT_MSA.3: 5
    • FMT_SMF.1: 4
    • FMT_SMR.1: 4
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 13
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 11
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • O:
    • O.CONF: 1
    • O.INDICATE: 1
    • O.ROM: 3
    • O.SELECT: 1
    • O.SWITCH: 1
    • O.USBDETECT: 1
  • OE:
    • OE.ACCESS: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.TRANSFER: 1
  • A:
    • A.AUTHEN: 3
    • A.MANAGE: 3
    • A.OS: 3
    • A.PROTECT: 3
    • A.STORAGE: 3
  • O:
    • O.ACCESS: 9
    • O.ANALYSIS: 1
    • O.AUDIT: 9
    • O.AUTH: 10
    • O.MANAGE: 9
    • O.PATTERN: 9
    • O.RESPONSE: 8
  • OE:
    • OE.AUTHEN: 5
    • OE.MANAGE: 3
    • OE.OS: 7
    • OE.PROTECT: 5
    • OE.STORAGE: 3
  • T:
    • T.CONFIG: 3
    • T.UNAUTH: 3
    • T.UNDETECTED: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA2:
      • SHA256: 5
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
  • VPN:
    • VPN: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Physical Tampering: 9
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
pdf_data/st_metadata
state/cert/convert_garbage False True
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different