Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Youwipe Erasure Tool 4 with WipeCenter 4
NSCIB-CC-0114526-CR
Enveil ZeroReveal™ Compute Fabric Client v2.5.4
CCEVS-VR-11136-2021
name Youwipe Erasure Tool 4 with WipeCenter 4 Enveil ZeroReveal™ Compute Fabric Client v2.5.4
category Data Protection Other Devices and Systems
scheme NL US
status active archived
not_valid_after 12.08.2025 02.06.2023
not_valid_before 12.08.2020 02.06.2021
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/certificate%200114526.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11136-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/NSCIB-CC-0114526-CR.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11136-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11136-st.pdf
manufacturer AllWipe Oy Ltd. Enveil
manufacturer_web https://www.youwipe.com https://www.enveil.com
security_level ALC_FLR.1, EAL3+ {}
dgst 3c9501fa938f3556 2171b98a33b7d3af
heuristics/cert_id NSCIB-CC-0114526-CR CCEVS-VR-11136-2021
heuristics/cert_lab US
heuristics/extracted_sars ALC_CMC.3, ADV_ARC.1, ADV_TDS.2, ATE_IND.2, ADV_FSP.3, AGD_PRE.1, ALC_FLR.1, AGD_OPE.1, ALC_CMS.3, ASE_REQ.2, ASE_ECD.1, AVA_VAN.2, ATE_COV.2, ASE_SPD.1, ASE_INT.1, ASE_TSS.1, ALC_DEL.1, ATE_DPT.1, ALC_DVS.1, ASE_CCL.1, ALC_LCD.1, ATE_FUN.1 AGD_OPE.1, ASE_SPD.1, ADV_FSP.1, ASE_REQ.1, ASE_OBJ.1, AVA_VAN.1, ASE_ECD.1, ASE_CCL.1, AGD_PRE.1, ALC_CMS.1, ALC_TSU_EXT.1, ALC_CMC.1, ASE_INT.1, ASE_TSS.1, ATE_IND.1
heuristics/extracted_versions 4 2.5.4
heuristics/scheme_data
heuristics/protection_profiles {} c40ae795865a0dba, a1cc4a4e079f4d1f
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PKG_TLS_V1.1.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf
pdf_data/cert_filename certificate 0114526.pdf st_vid11136-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • NL:
    • CC-20-0114526: 1
  • US:
    • CCEVS-VR-VID11136-2021: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL4: 1
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 1
  • ALC:
    • ALC_FLR: 1
pdf_data/cert_keywords/cc_claims
  • R:
    • R.L: 1
pdf_data/cert_keywords/eval_facility
  • Secura:
    • Secura: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 1
pdf_data/cert_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 18045: 2
pdf_data/cert_metadata
  • /CreationDate: D:20200820105007+01'00'
  • /Creator: C458-M
  • /ModDate: D:20200820163719+02'00'
  • /Producer: KONICA MINOLTA bizhub C458
  • /Title: C458-M&S20082010490
  • pdf_file_size_bytes: 66649
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20210604122950-04'00'
  • /ModDate: D:20210604122950-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182011
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename NSCIB-CC-0114526-CR.pdf st_vid11136-vr.pdf
pdf_data/report_frontpage
  • NL:
    • cert_id: NSCIB-CC-0114526-CR
    • cert_item: Youwipe Erasure Tool 4 with WipeCenter 4
    • cert_lab: Secura B.V.
    • developer: AllWipe Ltd
  • US:
  • NL:
  • US:
    • cert_id: CCEVS-VR-11136-2021
    • cert_item: for the Enveil ZeroReveal® Compute Fabric Client v2.5.4
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-0114526-CR: 11
  • US:
    • CCEVS-VR-11136-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 1
    • EAL3 augmented: 1
    • EAL3+: 1
    • EAL4: 1
  • EAL:
    • EAL 1: 5
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 1
pdf_data/report_keywords/eval_facility
  • Secura:
    • Secura: 2
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • HMAC: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDH:
      • ECDH: 1
    • ECDSA:
      • ECDSA: 3
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 10
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
pdf_data/report_keywords/ecc_curve
  • NIST:
    • P-256: 2
    • P-384: 2
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/report_keywords/standard_id
  • NIST:
    • NIST SP 800-38C: 1
    • NIST SP 800-38D: 1
    • NIST SP 800-90A: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • The TOE is a software application, and as such many of the functions of the application itself are out of scope of a Common Criteria Evaluation. The following functionality is explicitly excluded from the scope: 1
    • out of scope: 1
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20220118225432-05'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20220118225432-05'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 361349
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename YouWipe_Common_Criteria_EAL3_ST_V6.0.pdf st_vid11136-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 4
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 6
    • ALC_LCD.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 2
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FCS:
    • FCS_CKM.1: 6
    • FCS_CKM.2: 5
    • FCS_COP: 20
    • FCS_COP.1: 3
    • FCS_COP.1.1: 3
    • FCS_RNG: 3
    • FCS_RNG.1: 8
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_RNG.1: 1
  • FIA:
    • FIA_AFL: 1
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.1: 3
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 9
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 9
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITI.1: 6
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_STM.1: 2
  • FCS:
    • FCS_CKM.1: 7
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_COP: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.2: 3
    • FCS_RBG_EXT.2.1: 1
    • FCS_RBG_EXT.2.2: 1
    • FCS_STO_EXT.1: 6
    • FCS_STO_EXT.1.1: 1
    • FCS_TLSC_EXT.1: 4
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.2: 3
    • FCS_TLSC_EXT.2.1: 1
    • FCS_TLSC_EXT.3: 3
    • FCS_TLSC_EXT.3.1: 1
    • FCS_TLSC_EXT.5: 3
    • FCS_TLSC_EXT.5.1: 1
    • FCS_TLSS_EXT.1: 3
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.2: 3
    • FCS_TLSS_EXT.2.1: 1
    • FCS_TLSS_EXT.2.2: 1
    • FCS_TLSS_EXT.2.3: 1
    • FCS_TLSS_EXT.3: 2
    • FCS_TLSS_EXT.3.1: 1
    • FCS_TLS_EXT.1: 4
    • FCS_TLS_EXT.1.1: 1
  • FDP:
    • FDP_DAR_EXT.1: 5
    • FDP_DEC_EXT.1: 4
    • FDP_DEC_EXT.1.1: 1
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 5
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 5
    • FMT_MEC_EXT.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 5
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 2
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 1
    • FPT_AEX_EXT.1.5: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_API_EXT.2: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
    • FPT_TUD_EXT.2: 3
    • FPT_TUD_EXT.2.1: 1
    • FPT_TUD_EXT.2.2: 1
    • FPT_TUD_EXT.2.3: 1
  • FTP:
    • FTP_DIT_EXT.1: 4
    • FTP_DIT_EXT.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BEHAVED_DRIV: 1
    • A.BEHAVED_DRIVES: 2
    • A.BIOS_PREVENTI: 1
    • A.BIOS_PREVENTING: 2
    • A.COMPETENT_U: 1
    • A.COMPETENT_USERS: 2
    • A.CORRECT_DEPL: 1
    • A.CORRECT_DEPLOYMENT: 3
    • A.SECURE_LOCAT: 1
    • A.SECURE_LOCATION: 3
    • A.SYSTEM_TIME: 3
    • A.TRUSTED_NET: 1
    • A.TRUSTED_NETWORK: 2
  • O:
    • O.AUTHENTIC: 1
    • O.AUTHENTICATED_USER: 5
    • O.PROPER_A: 1
    • O.PROPER_AUDIT: 5
    • O.PROPER_ER: 1
    • O.PROPER_ERASE: 7
    • O.PROPER_RE: 1
    • O.PROPER_REPORTS: 5
    • O.USER_SEPARATION: 2
    • O.USER_SEPE: 1
    • O.USER_SEPERATION: 4
  • OE:
    • OE.BEHAVED_DRIVES: 2
    • OE.BIOS_PREVENTING: 3
    • OE.COMPETENT_USERS: 3
    • OE.CORRECT_DEPLOYMENT: 2
    • OE.PROPER_TIME: 1
    • OE.SECURE_LOCATION: 4
    • OE.SYSTEM_TIME: 2
  • T:
    • T.DATA_RECOVER: 1
    • T.DATA_RECOVERY: 2
    • T.UNAUTHENTIC: 1
    • T.UNAUTHENTICATED_USER: 2
  • A:
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 1
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
pdf_data/st_keywords/eval_facility
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES-256: 1
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
      • HMAC-SHA-256: 1
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDH:
      • ECDH: 2
      • ECDHE: 1
    • ECDSA:
      • ECDSA: 5
  • FF:
    • DH:
      • Diffie-Hellman: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA256: 13
  • SHA:
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 2
      • SHA256: 4
      • SHA384: 4
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
  • TLS:
    • SSL:
      • SSL: 2
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 72
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 3
      • TLSv1.2: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • PRNG:
    • DRBG: 7
  • RNG:
    • RBG: 1
pdf_data/st_keywords/ecc_curve
  • NIST:
    • P-256: 10
    • P-384: 10
    • secp256r1: 6
    • secp384r1: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 4
    • TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180-4: 2
  • PKCS:
    • PKCS#1: 3
  • FIPS:
    • FIPS PUB 186-4: 4
  • NIST:
    • NIST SP 800-38C: 2
    • NIST SP 800-38D: 2
    • NIST SP 800-57: 1
    • NIST SP 800-90A: 1
  • RFC:
    • RFC 2818: 3
    • RFC 5246: 3
    • RFC 5280: 5
    • RFC 5289: 8
    • RFC 6125: 3
  • X509:
    • X.509: 5
pdf_data/st_keywords/javacard_packages
  • com:
    • com.esri: 1
    • com.facebook: 11
    • com.fasterxml.jackson: 13
    • com.github: 1
    • com.google: 6
    • com.google.auto: 1
    • com.google.code: 3
    • com.google.inject: 2
    • com.jayway: 1
    • com.squareup: 4
    • com.sun: 2
    • com.sun.xml: 1
  • java:
    • java.beans: 1
    • java.dev: 1
    • java.io: 28
    • java.lang.annotation: 7
    • java.lang.instrument: 1
    • java.lang.invoke: 1
    • java.lang.management: 1
    • java.lang.ref: 1
    • java.lang.reflect: 7
    • java.math: 2
    • java.net: 10
    • java.nio: 1
    • java.nio.charset: 1
    • java.nio.file: 8
    • java.nio.file.attribute: 1
    • java.security: 22
    • java.security.cert: 13
    • java.security.interfaces: 3
    • java.security.spec: 1
    • java.sql: 9
    • java.text: 5
    • java.time: 5
    • java.time.format: 1
    • java.util: 41
    • java.util.concurrent: 21
    • java.util.concurrent.atomic: 5
    • java.util.concurrent.locks: 3
    • java.util.function: 7
    • java.util.logging: 4
    • java.util.regex: 2
    • java.util.stream: 4
    • java.util.zip: 2
  • org:
    • org.apache: 35
    • org.apache.maven: 1
    • org.codehaus: 5
    • org.eclipse: 13
    • org.eclipse.jetty: 5
    • org.geotools: 2
    • org.glassfish: 13
    • org.glassfish.hk2: 3
    • org.glassfish.jersey: 9
    • org.hibernate: 1
    • org.iq80: 2
    • org.jboss: 1
    • org.jboss.spec.javax: 1
    • org.jetbrains: 2
    • org.jvnet: 2
    • org.locationtech: 1
    • org.openjdk: 1
    • org.ow2: 4
    • org.sonatype: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Erasure Tool User Manual v.2.0.6 well as all the hardware associated with the targeted media, are out of scope for the evaluation. YouWipe lists all the detected hardware via its user interface (GUI). The user: 1
    • as well as the hardware of the mobile phone are assumed to be operating correctly and are out of scope of the evaluation. After overwriting step, the data in disk is verified to be overwritten: 1
    • out of scope: 2
  • OutOfScope:
    • The TOE is a software application, and as such many of the functions of the application itself are out of scope of a Common Criteria Evaluation. The following functionality is explicitly excluded from the scope: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: f.kirbiyik
  • /CreationDate: D:20200803163651+02'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200803163651+02'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1239579
  • pdf_hyperlinks: https://www.commoncriteriaportal.org/products/#DP
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
  • /Author: Acumen Security, LLC.
  • /CreationDate: D:20210603093820-04'00'
  • /Creator: Microsoft® Word for Microsoft 365
  • /ModDate: D:20210603093820-04'00'
  • /Producer: Microsoft® Word for Microsoft 365
  • pdf_file_size_bytes: 775739
  • pdf_hyperlinks: https://www.niap-ccevs.org/Documents_and_Guidance/view_tds.cfm
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 44
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different