Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX640 Matrix Switch
SERTIT-077
iSAS, Release 1.0
BSI-DSZ-CC-0619-V2-2022
name Thinklogical TLX640 Matrix Switch iSAS, Release 1.0
category Other Devices and Systems Network and Network-Related Devices and Systems
scheme NO DE
status archived active
not_valid_after 22.09.2021 02.03.2027
not_valid_before 22.09.2016 02.03.2022
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-077%20CR%20v1.0%20Certification%20Report%20TLX640.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_4_TLX640.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0619V2b_pdf.pdf
manufacturer Thinklogical Frequentis AG
manufacturer_web https://www.thinklogical.com/ https://www.frequentis.com
security_level EAL4 EAL4+, ADV_INT.3, ASE_TSS.2, AVA_VAN.5
dgst 3e7985f9abf0e11b 56159ceb71850ff4
heuristics/cert_id SERTIT-077 BSI-DSZ-CC-0619-V2-2022
heuristics/cert_lab [] BSI
heuristics/extracted_sars ADV_TDS.3, AVA_VAN.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ATE_DPT.2, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1 ADV_TDS.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ADV_INT.3, ASE_TSS.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1
heuristics/extracted_versions - 1.0
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-077
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE. The TOE is a high-end secure integrated circuit suitable for financial or governmental applications. The TOE consists of the IC hardware, IC dedicated test software and IC dedicated support software providing cryptographic functions. The hardware is based on a 32-bit CPU with volatile, non-volatile and read-only memory. The microcontroller incorporates cryptographic coprocessors for acceleration of symmetric and asymmetric encryption algorithms. The IC dedicated support software, also known as Crypto Library, provides DES, AES, RSA and random number generation functions.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135052-1607952667/SERTIT/Sertifikater/2016/77/20160922%20Sertit-077%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135055-1607952669/SERTIT/Sertifikater/2016/77/ThinklogicalSecurityTarget_1_4_TLX640.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135049-1607952664/SERTIT/Sertifikater/2016/77/20160922%20Sertit-077%20CR%20v1.0%20Certification%20Report%20TLX640.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX640 Matrix Switch Chassis (TLX-MSC-000640 Rev B), TLX640 Matrix Switch Data Input and Output Card, 20 Ports, SFP+, Multi-Mode (TLX-MSD-M00020 Rev C), Single Mode (TLX-MSD-S00020 Rev C), Velocity Matrix Switch 640 Data Input and Output Card, 20 Ports, SFP+, Multi-Mode (VXM-DIOR20 Rev A), Single-Mode (VXM-DIOS20 Rev A)
  • product: Thinklogical TLX640 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx640-matrix-switch
maintenance_updates
pdf_data/cert_filename 0619V2a_pdf.pdf
pdf_data/cert_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
pdf_data/cert_keywords/cc_sar
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
  • A:
    • A.VCS: 1
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/cert_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/cert_metadata
pdf_data/report_filename 20160922 Sertit-077 CR v1.0 Certification Report TLX640.pdf 0619V2a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • DE:
    • cert_id: BSI-DSZ-CC-0619-V2-2022
    • cert_item: iSAS Release 1.0
    • cert_lab: BSI
    • developer: Frequentis AG
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-077: 16
  • DE:
    • BSI-DSZ-CC-0619-V2-2022: 13
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 2: 2
    • EAL 2+: 1
    • EAL 4: 8
    • EAL 4 augmented: 3
    • EAL 5: 3
    • EAL 5+: 1
    • EAL 6: 1
    • EAL4+: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_INT.3: 5
  • ALC:
    • ALC_FLR: 3
  • ASE:
    • ASE_TSS.2: 5
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
  • A:
    • A.VCS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
  • DeutscheTelekom:
    • Deutsche Telekom Security: 3
pdf_data/report_keywords/side_channel_analysis
  • other:
    • JIL: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • BSI:
    • AIS 14: 1
    • AIS 19: 1
    • AIS 25: 1
    • AIS 26: 1
    • AIS 32: 1
    • AIS 34: 1
    • AIS 35: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • BSI-DSZ-CC-0619-V2, Deutsche Telekom Security GmbH (confidential document) [8] Security Target BSI-DSZ-CC-0619-V2-2022, Version 2.1, 02 February 2022, Secure Audio Switch: 1
    • Version 2.2, 19 January 2021, Secure Audio Switch Security Target, EWSE23EN90001 , FREQUENTIS AG (confidential document) [7] Evaluation Technical Report, Version 1.20, 03 February 2022, Summary of Evaluation Technical: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
    • list for the TOE, Version 1.3, 08 October 2021, Secure Audio Switch Configuration List (confidential document) [10] Guidance documentation for the TOE, V1.4, 26 July 2021, Secure Audio Switch Operational User: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162620Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162620Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 877332
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename ThinklogicalSecurityTarget_1_4_TLX640.pdf 0619V2b_pdf.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 6
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 8
    • EAL4 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_INT.3: 5
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS.2: 5
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_ARP.1: 11
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 1
    • FAU_SAA.1: 11
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FDP:
    • FDP_ETC.1: 12
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 5
    • FDP_IFF: 69
    • FDP_IFF.1: 30
    • FDP_IFF.5: 4
    • FDP_IFF.5.1: 1
    • FDP_ITC: 20
    • FDP_ITC.1: 10
  • FMT:
    • FMT_MSA: 38
    • FMT_MSA.1: 5
    • FMT_MSA.3: 8
    • FMT_SMF.1: 16
    • FMT_SMF.1.1: 1
    • FMT_SMR: 1
    • FMT_SMR.1: 4
  • FPT:
    • FPT_FLS: 1
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • A:
    • A.VCS: 5
  • OE:
    • OE.TEMPEST_: 1
    • OE.VCS: 5
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 5
    • malfunction: 7
    • physical tampering: 2
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • touch entry device). Protection of TSF The TOE provides a Fail Secure security function. 1.4.2.3 Out of Scope The following firmware and hardware features are outside the scope of the defined TSF and are: 1
    • 12 1.4.2.3 Out of Scope: 2
    • Microphone_Inputs/Earpiece_Outputs are connected to the BLACK or RED VCS. The touch entry device is out of scope of the TOE. Therefore, this setup requires that the MOD iSAS-P is mounted visible, and the operator: 1
    • Out of Scope: 2
    • out of scope: 1
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164410+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164410+00'00'
  • pdf_file_size_bytes: 604612
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: Frequentis
  • /CreationDate: D:20220202143605+01'00'
  • /Creator: Microsoft® Word 2019
  • /Keywords: Secure audio switch, Trusted audio switch, Red/Black separation, Audio interface
  • /ModDate: D:20220202143605+01'00'
  • /Producer: Microsoft® Word 2019
  • /Subject: Security Target Lite
  • /Title: iSAS
  • pdf_file_size_bytes: 898592
  • pdf_hyperlinks: http://www.frequentis.com/
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 81
state/cert/convert_ok False True
state/cert/download_ok False True
state/cert/extract_ok False True
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different