Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211
CRP214
Virtual Machine of ID Motion V1 G230 mask with AMD 122v1
ANSSI-CC-2013/10
name Tarantella Enterprise 3 Version 3.40.911 with Tarantella Security Pack, Version 3.41.211 Virtual Machine of ID Motion V1 G230 mask with AMD 122v1
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme UK FR
not_valid_after 05.03.2013 01.09.2019
not_valid_before 13.05.2005 25.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP214.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_10_fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Tarantella_V2.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible2013_10en.pdf
manufacturer Tarantella LTD Gemalto / Trusted Labs
manufacturer_web https://www.tarantella.com https://www.gemalto.com
security_level EAL2 EAL7
dgst 3db22e4de890393a 36c11c9e89af25a3
heuristics/cert_id CRP214 ANSSI-CC-2013/10
heuristics/extracted_sars ALC_DVS.1, ADV_RCR.1, ADV_FSP.1, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, ATE_IND.2, AGD_ADM.1, ATE_COV.1, ADV_HLD.1, AVA_SOF.1 ALC_LCD.2, ATE_DPT.4, ADV_INT.3, AVA_VAN.5, ADV_COMP.1, ADV_FSP.6, ALC_DVS.2, ALC_TAT.3, ATE_FUN.2, ADV_IMP.2, ALC_CMC.5, ADV_TDS.6, ATE_COV.3, ADV_SPM.1
heuristics/extracted_versions 3.40.911, 3.41.211 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/44
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, ANSSI-CC-2012/44, BSI-DSZ-CC-0813-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
pdf_data/report_filename CRP214.pdf ANSSI-CC-2013_10_fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P214: 1
  • FR:
    • ANSSI-CC-2012/44: 5
    • ANSSI-CC-2013/10: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL2: 16
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 3
    • EAL4: 2
    • EAL7: 2
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ACC.2: 1
    • FDP_ACF.1: 1
  • FMT:
    • FMT_MSA.1: 1
  • FTP:
    • FTP_ITC: 4
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 1
  • Microsoft:
    • Microsoft: 1
    • Microsoft Corporation: 1
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • TLS:
      • TLS: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
  • FIPS:
    • FIPS 140-2: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • Solaris 8. Users should note that these Application Servers and the communications with them are out of scope of the evaluation. 6. Users login to the Tarantella Server via a web browser and are then presented: 1
    • The evaluated configuration is as illustrated in the diagram above although the firewall shown is out of scope. The product can be used in more complex network environments. These network configurations, which: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20050526142837Z
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20131204151607Z
  • /Producer: Acrobat Distiller 5.0 (Windows)
  • /Title: Microsoft Word - LFL_T206_Tarantella_CertRep_10.doc
  • pdf_file_size_bytes: 667201
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /Author: torno
  • /CreationDate: D:20130325134815+01'00'
  • /Creator: PDFCreator Version 0.9.0
  • /Keywords:
  • /ModDate: D:20130325134815+01'00'
  • /Producer: AFPL Ghostscript 8.53
  • /Subject:
  • /Title: ANSSI-CC-2013_10_fr
  • pdf_file_size_bytes: 167352
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename Tarantella_V2.4.pdf anssi-cc-cible2013_10en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0606-2010: 4
    • BSI-DSZ-CC-0640-2010: 7
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 6
  • EAL:
    • EAL5+: 1
    • EAL7: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.2: 1
  • ADO:
    • ADO_DEL.1: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 1
    • ADV_HLD.1: 1
    • ADV_RCR.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_SOF.1: 1
    • AVA_VLA.1: 2
  • ADV:
    • ADV_COMP.1: 1
    • ADV_FSP.6: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.6: 2
  • ALC:
    • ALC_CMC.5: 2
    • ALC_DVS.2: 2
    • ALC_LCD.2: 2
    • ALC_TAT.3: 2
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.4: 2
    • ATE_FUN.2: 2
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 6
    • FAU_GEN.1.1: 3
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 2
    • FAU_SAR.1: 2
    • FAU_SAR.1.1: 2
    • FAU_SAR.1.2: 2
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 2
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 2
  • FCS:
    • FCS_COP.1: 3
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 2
    • FDP_ACC.2: 6
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 2
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ITC.1: 3
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_RIP.2: 2
    • FDP_RIP.2.1: 4
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_UAU.2: 5
    • FIA_UAU.2.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 2
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 2
    • FIA_UID.1: 2
    • FIA_UID.2: 7
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA.1: 3
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 1
    • FMT_MTD.1: 3
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 1
    • FMT_SMF.1.1: 2
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITC: 3
    • FPT_ITC.2: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 2
    • FPT_ITT.3: 2
    • FPT_ITT.3.1: 2
    • FPT_ITT.3.2: 2
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
  • FTP:
    • FTP_ITC: 6
  • FAU:
    • FAU_ACC.2: 1
    • FAU_ARP: 3
    • FAU_ARP.1: 4
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 5
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 2
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 4
    • FDP_ACC.2: 6
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 3
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 3
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 3
    • FRU_RSA.1: 4
    • FRU_RSA.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 2
    • A.AUTH: 2
    • A.CERTIFICATE: 3
    • A.CONFIG: 2
    • A.CONNECT: 2
    • A.PHYSICAL: 2
    • A.USER: 2
  • O:
    • O.ADMIN: 4
    • O.AUDIT: 5
    • O.AUTH_SERVER: 4
    • O.DAC: 8
    • O.SECURE_ENCRYPTION: 4
    • O.TPATH: 8
  • OE:
    • OE.ACCOUNT: 5
    • OE.AUDMAN: 3
    • OE.AUDREC: 4
    • OE.AUTHDATA: 4
    • OE.INSTALL: 9
    • OE.KEYMGMT: 9
    • OE.OSAUTH: 4
    • OE.OSCONFIG: 3
    • OE.OSKEYS: 10
  • OSP:
    • OSP.CRYPTO: 2
  • T:
    • T.CHANNEL: 3
    • T.EXCEED: 3
    • T.MISDIRECT: 3
    • T.UNAUTH: 3
  • A:
    • A.APPLI_CONT: 1
    • A.CIPHER: 1
    • A.CLON: 1
    • A.DECIPHER: 1
    • A.DIS_MEMORY: 1
    • A.LOAD: 2
    • A.MOD_MEMORY: 1
    • A.OPERATE: 1
    • A.REMOVE: 1
    • A.SECURITY: 2
    • A.SIDE: 1
    • A.TAMPER_ES: 2
  • O:
    • O.APPLI_DEV: 3
    • O.CIPHER: 1
    • O.DECIPHER: 1
    • O.DEV_DIS_ES: 4
    • O.DLV_DATA: 4
    • O.EFECT_REMOVE: 1
    • O.EFFECT_LOAD: 3
    • O.EFFECT_REMOVE: 3
    • O.FLAW: 1
    • O.INIT_ACS: 3
    • O.LOAD: 2
    • O.REMOVE: 1
    • O.RESOURCE: 3
    • O.RND: 1
    • O.ROLLBACK: 2
    • O.SAMPLE_ACS: 1
    • O.SECURITY: 1
    • O.SEGREGATE: 3
    • O.SIDE: 3
    • O.TAMPER_ES: 5
  • OSP:
    • OSP.CIPHER: 1
    • OSP.CONF-ALU: 1
  • T:
    • T.APP_CORR: 3
    • T.APP_DISC: 3
    • T.APP_MOD: 4
    • T.APP_READ: 3
    • T.APP_REMOVE: 4
    • T.DEL_REMOVE: 4
    • T.DIS_DATA: 6
    • T.DIS_TEST_ES: 2
    • T.ERR_REMOVE: 3
    • T.LOAD_APP: 4
    • T.LOAD_MAN: 2
    • T.LOAD_MOD: 2
    • T.LOAD_OTHER: 2
    • T.MOD: 2
    • T.MOD_DATA: 4
    • T.MOD_EXE: 4
    • T.MOD_LOAD: 2
    • T.MOD_SHARE: 2
    • T.MOD_TSF: 3
    • T.RESOURCES: 2
    • T.RND: 1
    • T.T_CMD: 4
    • T.T_ES: 2
    • T.T_TOOLS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Gemalto:
    • Gemalto: 318
  • Infineon:
    • Infineon: 4
    • Infineon Technologies: 5
  • Thales:
    • Thales: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 1
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 4
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • TLS:
      • TLS: 8
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 1
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • physical probing: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
  • FIPS:
    • FIPS 140-2: 2
    • FIPS140-2: 2
  • RFC:
    • RFC 2246: 2
  • X509:
    • X.509: 6
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope: 1
    • out of scope: 1
    • server. (Note that these application servers and the communications with them (RDP/SSH/X11) are out of scope). Evaluation of Tarantella Enterprise 3 Tarantella Enterprise 3 Security Target/Issue 2.4 11 April: 1
  • OutOfScope:
    • for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
    • out of scope: 3
    • the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
    • these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
pdf_data/st_metadata
  • /Author: griffinh@griffinh
  • /CreationDate: D:20050411140335+00'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20050411141010
  • /Producer: Jaws PDF Creator v2.11.1164
  • /Title: Microsoft Word - T206-ST.doc
  • pdf_file_size_bytes: 384411
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 42
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different