Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Websense V10000 G2 Web Gateway Appliance v7.6
383-4-179
ECC CPU card (Version 1.2)
CRP277
name Websense V10000 G2 Web Gateway Appliance v7.6 ECC CPU card (Version 1.2)
category Boundary Protection Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA UK
not_valid_after 15.05.2017 19.10.2019
not_valid_before 18.01.2012 19.10.2014
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-cert-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP277.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/websense-v76-sec-eng.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST277.pdf
manufacturer Websense, Inc. Gemalto
manufacturer_web https://www.websense.com https://www.gemalto.com/
security_level EAL2+, ALC_FLR.2 EAL4+, ALC_DVS.2, AVA_VAN.5
dgst 2fa07c60f571d282 00c1aeb0ae6b7195
heuristics/cert_id 383-4-179 CRP277
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ADV_COMP.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_TSS.2, ASE_REQ.2, ADV_FSP.4, ASE_CCL.1
heuristics/extracted_versions 7.6 1.2
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0883-2013
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0883-2013
pdf_data/report_filename websense-v76-cert-eng.pdf CRP277.pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-179-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-179-CR: 1
  • DE:
    • BSI-DSZ-CC-0883: 1
  • UK:
    • CRP277: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 2
    • EAL 2+: 2
    • EAL2: 1
  • EAL:
    • EAL1: 1
    • EAL4: 5
    • EAL4 augmented: 2
    • EAL7: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 2
  • ADV:
    • ADV_ARC: 2
  • ALC:
    • ALC_DVS.2: 5
  • AVA:
    • AVA_VAN.5: 5
pdf_data/report_keywords/vendor
  • Gemalto:
    • Gemalto: 11
  • Infineon:
    • Infineon Technologies: 1
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 28
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
pdf_data/report_metadata
  • /Author: Shawn Pinet
  • /CCEF: CGI IT Security Evaluation & Test Facility
  • /CR date: 23 December 2011
  • /CR version: 0.1
  • /Certificate date: dd month yyyy
  • /Company:
  • /CreationDate: D:20120202110905-05'00'
  • /Creator: Acrobat PDFMaker 10.0 for Word
  • /Developer name: Websense, Inc.
  • /Document number: 383-4-179-CR
  • /ETR title, version, date: ETR title, version, date
  • /Evaluation completion date: dd month yyyy
  • /Keywords: Internet Proxy, Web Gateway, Triton, Websense
  • /Manager:
  • /ModDate: D:20120202110951-05'00'
  • /Producer: Acrobat Distiller 10.0.0 (Windows)
  • /ST Title: Websense, Inc. V10000 G2 Web Gateway Appliance v7.6 Security Target
  • /ST date: 22 December 2011
  • /ST version: 1.0
  • /SourceModified: D:20120202160256
  • /Sponsor: Websense, Inc.
  • /Subject:
  • /TOE Version: 7.6
  • /TOE name and version: Websense V10000 G2 Web Gateway Appliance v7.6
  • /TOE short name: Websense V10000 G2 7.6
  • /Title: EAL 2 Evaluation of V10000 G2 v7.6
  • pdf_file_size_bytes: 85151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename websense-v76-sec-eng.pdf ST277.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0883: 4
    • BSI-DSZ-CC-0883-: 1
    • BSI-DSZ-CC-0883-2013: 2
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL2: 4
    • EAL2 augmented: 1
    • EAL2+: 3
  • EAL:
    • EAL4: 4
    • EAL4 augmented: 3
    • EAL4+: 2
    • EAL5: 1
    • EAL5 augmented: 1
    • EAL5+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 8
    • ADV_COMP.1: 2
    • ADV_FSP.1: 5
    • ADV_FSP.2: 4
    • ADV_FSP.4: 11
    • ADV_IMP: 1
    • ADV_IMP.1: 5
    • ADV_TDS.1: 3
    • ADV_TDS.2: 1
    • ADV_TDS.3: 11
  • AGD:
    • AGD_OPE.1: 8
    • AGD_PRE.1: 6
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.1: 2
    • ALC_CMS.4: 1
    • ALC_DEL.1: 2
    • ALC_DVS.1: 1
    • ALC_DVS.2: 7
    • ALC_LCD.1: 5
    • ALC_TAT.1: 5
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 4
    • ASE_INT.1: 5
    • ASE_OBJ.2: 3
    • ASE_REQ.1: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV.1: 4
    • ATE_COV.2: 4
    • ATE_DPT.1: 2
    • ATE_FUN.1: 8
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 8
    • FAU_GEN.1: 16
    • FAU_SAR: 6
    • FAU_SAR.1: 11
    • FAU_SAR.2: 6
    • FAU_SAR.2.1: 1
    • FAU_SEL.1: 6
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 8
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ROL: 1
    • FDP_ROL.2: 1
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 7
    • FIA_ATD.1.1: 1
    • FIA_UAU.1: 9
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 7
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 16
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SAE.1: 6
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 12
    • FPT_STM.1.1: 1
  • FRU:
    • FRU_FLT.1: 1
    • FRU_FLT.2: 6
    • FRU_FLT.2.1: 1
    • FRU_RSA: 8
    • FRU_RSA.1: 6
  • FTA:
    • FTA_MCS.1: 1
    • FTA_MCS.2: 6
    • FTA_MCS.2.1: 1
    • FTA_MCS.2.2: 1
    • FTA_SSL.3: 6
    • FTA_SSL.3.1: 1
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 2
    • FAU_GEN: 1
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_SAA: 1
    • FAU_SAA.1: 13
    • FAU_SAA.1.1: 3
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 3
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAS.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCO:
    • FCO_NRO: 6
    • FCO_NRO.1: 3
    • FCO_NRO.2: 2
    • FCO_NRO.2.2: 3
    • FCO_NRO.2.3: 3
  • FCS:
    • FCS_CKM: 13
    • FCS_CKM.1: 11
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 5
    • FCS_CKM.2.1: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 2
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 2
    • FCS_COP: 13
    • FCS_COP.1: 16
    • FCS_COP.1.1: 2
    • FCS_RNG.1: 1
  • FDP:
    • FDP_ACC: 31
    • FDP_ACC.1: 27
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 9
    • FDP_ACC.2.2: 1
    • FDP_ACF: 11
    • FDP_ACF.1: 31
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC: 12
    • FDP_IFC.1: 19
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 3
    • FDP_IFCC: 1
    • FDP_IFF: 5
    • FDP_IFF.1: 14
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC: 6
    • FDP_ITC.1: 8
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 4
    • FDP_ITT.1: 1
    • FDP_RIP: 10
    • FDP_RIP.1: 3
    • FDP_RIP.1.1: 1
    • FDP_ROL: 8
    • FDP_ROL.1: 4
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 4
    • FDP_SDI.2: 6
    • FDP_SDI.2.2: 2
    • FDP_UCT: 1
    • FDP_UCT.1: 5
    • FDP_UCT.1.1: 2
    • FDP_UIT.1: 7
    • FDP_UIT.1.1: 2
    • FDP_UIT.1.2: 2
    • FDP_UTC.1: 1
  • FIA:
    • FIA_ATD: 5
    • FIA_ATD.1: 4
    • FIA_ATD.1.1: 1
    • FIA_SOS: 1
    • FIA_SOS.2: 6
    • FIA_SOS.2.1: 2
    • FIA_SOS.2.2: 2
    • FIA_UAU: 23
    • FIA_UAU.1: 4
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.3: 2
    • FIA_UAU.3.1: 2
    • FIA_UAU.3.2: 2
    • FIA_UAU.4: 2
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 2
    • FIA_UAU.6.1: 1
    • FIA_UID: 4
    • FIA_UID.1: 21
    • FIA_UID.2: 1
    • FIA_USB: 4
    • FIA_USB.1: 4
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM.1: 2
    • FMT_LIM.2: 2
    • FMT_MOF.1: 5
    • FMT_MSA: 38
    • FMT_MSA.1: 13
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 1
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 16
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 2
    • FMT_SMF: 4
    • FMT_SMF.1: 13
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPR:
    • FPR_UNO: 1
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 2
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 2
    • FPT_ITC: 1
    • FPT_ITC.1: 4
    • FPT_ITC.1.1: 2
    • FPT_ITI: 1
    • FPT_ITI.1: 8
    • FPT_ITI.1.1: 2
    • FPT_ITI.1.2: 2
    • FPT_ITT.1: 1
    • FPT_PHP: 2
    • FPT_PHP.1: 2
    • FPT_PHP.2: 4
    • FPT_PHP.2.2: 2
    • FPT_PHP.2.3: 2
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 2
    • FPT_RCV.4: 7
    • FPT_RCV.4.1: 2
    • FPT_RPL: 1
    • FPT_RPL.1: 5
    • FPT_RPL.1.1: 2
    • FPT_RPL.1.2: 2
    • FPT_STM.1: 5
    • FPT_TDC: 3
    • FPT_TDC.1: 3
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TST: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 2
    • FPT_TST.1.2: 2
    • FPT_TST.1.3: 2
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 2
  • FTP:
    • FTP_ITC.1: 9
    • FTP_TRP.1: 9
pdf_data/st_keywords/cc_claims
  • A:
    • A.EXCLUSIVE: 2
    • A.INSTALL: 2
    • A.LOCATE: 3
    • A.MANAGE: 3
    • A.NETWORK: 2
    • A.NOEVIL: 2
  • O:
    • O.AUDIT: 12
    • O.AUTHENTICATE: 11
    • O.DB_RESILIENCY: 7
    • O.HARMFUL_CONTENT: 8
    • O.MANAGE: 10
    • O.PROTECT: 9
    • O.QUOTA: 6
    • O.RESOURCE_CONTROL: 8
    • O.TIMESTAMP: 5
  • OE:
    • OE.NETWORK: 3
  • T:
    • T.DB_FAILURE: 2
    • T.EXTERNAL_CONTENT: 2
    • T.MASQUERADE: 2
    • T.NACCESS: 2
    • T.RESOURCE: 2
    • T.UNAUTHORIZED_ACCESS: 2
  • A:
    • A.PHYSICAL: 4
    • A.PROTECTION_AFTER_TOE_DE: 1
    • A.PROTECTION_AFTER_TOE_DELIVERY: 3
  • D:
    • D.COUNTERS: 6
    • D.EM: 13
    • D.EP_CODE: 5
    • D.EP_IVDATA: 3
    • D.EP_IV_DATA: 1
    • D.EP_STATE: 5
    • D.KEYS: 9
    • D.LOG_DATA: 4
  • O:
    • O.AUTH: 13
    • O.CONFID_DATA: 1
    • O.CONF_DATA: 12
    • O.EM: 6
    • O.INTEG_DATA: 7
    • O.JAVAOBJECT: 10
    • O.MEM_ACCE: 1
    • O.OPERATE: 17
    • O.RECORD: 5
    • O.REPLAY: 7
    • O.RND: 1
    • O.TAMPER: 16
  • OE:
    • OE.DEBIT_BEFORE_CREDIT: 3
    • OE.PHYSICAL: 3
    • OE.PROTECTION_AFTER_TOE_DELIVERY: 3
    • OE.PURSE_BEHAVIOR: 3
    • OE.SECRET_MNGT: 3
  • OP:
    • OP.ARRAY_ACCESS: 2
    • OP.CREATE: 4
    • OP.INSTANCE_FIELD: 1
    • OP.INVK_INTERFACE: 4
    • OP.INVK_VIRTUAL: 2
    • OP.JAVA: 3
    • OP.PUT: 3
    • OP.THROW: 2
    • OP.TYPE_ACCESS: 2
  • OSP:
    • OSP.DEBIT_BEFORE_CREDIT: 3
    • OSP.PURSE_BEHAVIOR: 4
    • OSP.SECRET_MNGT: 4
  • R:
    • R.JAVA: 5
  • T:
    • T.COUNTERFEITING: 2
    • T.COUNTERFEITING_AUTH: 2
    • T.COUNTERFEITING_AUTOLOAD: 6
    • T.COUNTERFEITING_CREDIT: 2
    • T.COUNTERFEITING_DEBIT: 6
    • T.COUNTERFEITING_UPDATE: 4
    • T.DISCLOSURE_KEYS: 10
    • T.INTEG: 4
    • T.INTEG_: 1
    • T.INTEG_CODE: 6
    • T.INTEG_COUNTERS: 6
    • T.INTEG_EM: 6
    • T.INTEG_EP_IVDATA: 2
    • T.INTEG_EP_STATE: 6
    • T.INTEG_IVDATA: 1
    • T.INTEG_KEYS: 3
    • T.INTEG_LOG_DATA: 3
    • T.REPLAY: 2
    • T.REPLAY_AUTOLOAD: 4
    • T.REPLAY_CREDIT: 3
    • T.REPLAY_DEBIT: 4
    • T.REPLAY_UPDATE: 3
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Gemalto:
    • Gemalto: 21
  • Infineon:
    • Infineon: 11
    • Infineon Technologies: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 23
  • DES:
    • 3DES:
      • 3DES: 5
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 244
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 12
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 3
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 4
    • Physical tampering: 1
    • malfunction: 3
    • physical tampering: 13
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • Side channel: 1
    • physical probing: 3
  • other:
    • JIL: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • RFC:
    • RFC3447: 1
pdf_data/st_keywords/javacard_version
  • JavaCard:
    • Java Card 2.2: 1
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 2
pdf_data/st_keywords/javacard_packages
  • javacard:
    • javacard.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s: 1
    • libraries itself) (Crypto libs) written in native language, The IC M7794 The elements out of scope of the TOE are: Other application(s) written in java language 2.3.2 Logical scope of the TOE The: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: C. Teri
  • /CreationDate: D:20140930094956+02'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20141110132727Z
  • /Producer: Microsoft® Office Word 2007
  • /Title: Security Target ECC CPU card
  • pdf_file_size_bytes: 1345514
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 104
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different