Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX640 Matrix Switch
SERTIT-077
Microsoft Windows 2003 and Microsoft Windows XP
CCEVS-VR-0131-2005
name Thinklogical TLX640 Matrix Switch Microsoft Windows 2003 and Microsoft Windows XP
category Other Devices and Systems Operating Systems
scheme NO US
not_valid_after 22.09.2021 07.09.2012
not_valid_before 22.09.2016 06.11.2005
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-077%20CR%20v1.0%20Certification%20Report%20TLX640.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_4_TLX640.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4025-st.pdf
manufacturer Thinklogical Microsoft Corporation
manufacturer_web https://www.thinklogical.com/ https://www.microsoft.com
security_level EAL4 EAL4+, AVA_VLA.4, ALC_FLR.3
dgst 3e7985f9abf0e11b b3eff67d30a6fa07
heuristics/cert_id SERTIT-077 CCEVS-VR-0131-2005
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2003:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:*:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:*:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x86:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:arm64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:gold:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:gold:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:media_center:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:professional:*:-:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:media_center:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:professional:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:gold:64-bit-2002:*:*:*:*:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:tablet_pc:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:media_center:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:embedded:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:professional:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:starter:*:x86:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:starter:*:itanium:*, cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:embedded:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:-:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:home:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:tablet_pc:*:x64:*, cpe:2.3:o:microsoft:windows_xp:-:sp1:*:*:*:*:x64:*
heuristics/related_cves {} CVE-2011-0033, CVE-2002-1327, CVE-2009-1511, CVE-2010-0027, CVE-2005-4269, CVE-2013-3879, CVE-2007-1537, CVE-2010-2738, CVE-2010-4701, CVE-2013-1343, CVE-2011-3397, CVE-2009-2510, CVE-2011-0667, CVE-2014-0300, CVE-2010-2157, CVE-2008-1436, CVE-2011-0657, CVE-2011-2011, CVE-2013-3864, CVE-2004-0117, CVE-2004-1049, CVE-2013-1252, CVE-2011-2600, CVE-2014-0301, CVE-2009-2511, CVE-2009-0231, CVE-2006-4071, CVE-2011-1880, CVE-2005-1207, CVE-2009-2528, CVE-2010-3941, CVE-2013-1255, CVE-2010-4398, CVE-2005-1935, CVE-2002-2132, CVE-2008-1457, CVE-2012-1890, CVE-2010-3963, CVE-2013-1258, CVE-2013-1266, CVE-2007-0843, CVE-2011-1869, CVE-2008-1454, CVE-2009-4311, CVE-2012-0003, CVE-2012-0175, CVE-2011-2018, CVE-2013-1260, CVE-2007-0038, CVE-2008-2252, CVE-2007-3724, CVE-2009-2500, CVE-2010-0484, CVE-2010-2553, CVE-2012-1893, CVE-2007-2224, CVE-2009-0089, CVE-2009-2514, CVE-2011-1235, CVE-2002-0391, CVE-2011-0671, CVE-2012-5364, CVE-2006-3209, CVE-2010-3139, CVE-2011-0043, CVE-2012-1868, CVE-2010-1883, CVE-2011-0090, CVE-2008-4609, CVE-2010-0250, CVE-2007-3034, CVE-2011-1237, CVE-2013-3876, CVE-2010-0016, CVE-2013-3878, CVE-2011-1874, CVE-2021-36958, CVE-2011-3389, CVE-2009-1920, CVE-2013-1275, CVE-2006-2374, CVE-2013-1249, CVE-2004-0116, CVE-2009-1544, CVE-2012-0009, CVE-2010-0235, CVE-2004-0840, CVE-2013-1268, CVE-2010-2746, CVE-2011-1236, CVE-2005-1208, CVE-2013-1274, CVE-2009-1545, CVE-2004-0124, CVE-2013-3136, CVE-2011-0039, CVE-2003-0909, CVE-2017-8487, CVE-2007-1211, CVE-2013-1342, CVE-2012-2529, CVE-2013-3863, CVE-2011-0028, CVE-2004-0123, CVE-2010-1891, CVE-2008-3648, CVE-2011-1873, CVE-2014-0323, CVE-2013-3174, CVE-2006-4692, CVE-2008-3465, CVE-2008-1441, CVE-2003-0306, CVE-2013-3869, CVE-2008-3464, CVE-2013-1286, CVE-2010-1886, CVE-2012-0154, CVE-2011-1985, CVE-2010-0232, CVE-2011-1233, CVE-2004-0575, CVE-2008-4835, CVE-2011-0087, CVE-2011-0677, CVE-2009-1922, CVE-2012-2556, CVE-2013-0810, CVE-2011-1879, CVE-2002-2324, CVE-2010-1894, CVE-2010-0238, CVE-2012-0151, CVE-2009-0079, CVE-2010-1897, CVE-2010-2550, CVE-2008-0087, CVE-2009-0078, CVE-2010-3140, CVE-2012-2526, CVE-2008-0020, CVE-2010-0820, CVE-2011-1241, CVE-2013-1273, CVE-2013-1265, CVE-2011-2014, CVE-2009-2515, CVE-2011-1281, CVE-2010-0237, CVE-2001-0877, CVE-2013-5065, CVE-2012-0180, CVE-2013-3200, CVE-2011-1875, CVE-2012-1866, CVE-2004-0120, CVE-2010-0020, CVE-2010-2563, CVE-2011-0675, CVE-2007-1212, CVE-2011-3400, CVE-2013-3899, CVE-2003-0813, CVE-2012-0173, CVE-2010-3143, CVE-2009-1930, CVE-2009-0235, CVE-2012-4786, CVE-2008-2250, CVE-2011-1231, CVE-2001-1200, CVE-2010-1882, CVE-2010-0025, CVE-2013-1256, CVE-2010-2739, CVE-2013-3175, CVE-2009-2493, CVE-2008-1086, CVE-2011-5049, CVE-2013-0077, CVE-2009-0230, CVE-2001-0876, CVE-2010-0486, CVE-2008-3013, CVE-2013-3197, CVE-2009-0086, CVE-2010-3889, CVE-2012-1864, CVE-2010-0811, CVE-2009-4313, CVE-2009-0243, CVE-2007-0066, CVE-2004-2527, CVE-2011-1239, CVE-2011-0670, CVE-2013-5056, CVE-2010-2566, CVE-2011-2005, CVE-2011-0096, CVE-2010-0021, CVE-2013-3887, CVE-2011-1240, CVE-2011-1882, CVE-2009-4312, CVE-2003-0897, CVE-2013-1253, CVE-2009-0081, CVE-2010-3888, CVE-2008-1440, CVE-2009-0550, CVE-2012-4774, CVE-2011-1868, CVE-2010-0028, CVE-2008-2245, CVE-2013-1300, CVE-2009-2502, CVE-2010-0018, CVE-2010-0233, CVE-2008-1453, CVE-2011-0674, CVE-2010-3957, CVE-2010-0234, CVE-2009-4210, CVE-2009-1928, CVE-2011-1283, CVE-2019-1489, CVE-2002-0699, CVE-2013-3660, CVE-2009-2513, CVE-2010-0819, CVE-2013-1259, CVE-2010-2568, CVE-2009-1127, CVE-2013-3173, CVE-2011-3406, CVE-2011-1284, CVE-2011-1238, CVE-2009-2504, CVE-2007-0214, CVE-2010-1735, CVE-2013-1280, CVE-2011-1894, CVE-2003-0807, CVE-2004-0209, CVE-2007-0069, CVE-2008-1456, CVE-2008-4834, CVE-2008-4327, CVE-2013-3195, CVE-1999-0524, CVE-2011-1883, CVE-2011-1967, CVE-2012-0148, CVE-2012-1852, CVE-2009-2524, CVE-2007-2374, CVE-2009-0119, CVE-2012-2972, CVE-2007-1206, CVE-2008-4036, CVE-2013-3129, CVE-2009-1133, CVE-2009-0083, CVE-2004-0208, CVE-2010-3970, CVE-2009-1126, CVE-2010-3959, CVE-2013-3172, CVE-2009-2653, CVE-2009-2507, CVE-2006-5758, CVE-2013-1285, CVE-2010-1885, CVE-2003-0469, CVE-2010-2731, CVE-2012-0005, CVE-2010-0252, CVE-2006-3351, CVE-2011-0638, CVE-2008-3012, CVE-2005-3177, CVE-2014-4971, CVE-2010-3942, CVE-2011-1243, CVE-2009-3675, CVE-2011-1282, CVE-2013-1250, CVE-2017-8461, CVE-2009-1546, CVE-2004-0207, CVE-2013-1261, CVE-2013-1340, CVE-2010-1098, CVE-2013-1262, CVE-2010-1734, CVE-2012-2527, CVE-2013-3918, CVE-2009-0232, CVE-2008-4250, CVE-2010-2741, CVE-2010-3939, CVE-2009-0082, CVE-2010-0269, CVE-2004-0200, CVE-2007-1204, CVE-2003-1048, CVE-2010-1887, CVE-2011-2003, CVE-2011-0672, CVE-2013-1295, CVE-2011-3408, CVE-2013-3866, CVE-2018-0598, CVE-2005-1212, CVE-2011-1232, CVE-2009-2501, CVE-2011-0673, CVE-2007-5352, CVE-2007-6753, CVE-2001-0879, CVE-2013-1267, CVE-2012-0002, CVE-2014-0317, CVE-2010-1895, CVE-2013-1272, CVE-2012-0157, CVE-2011-1974, CVE-2013-3167, CVE-2008-2249, CVE-2010-0485, CVE-2004-2339, CVE-2011-0034, CVE-2011-1242, CVE-2010-0812, CVE-2009-0087, CVE-2009-3677, CVE-2012-0159, CVE-2009-1926, CVE-2010-0023, CVE-2011-1226, CVE-2003-0907, CVE-2013-1279, CVE-2006-0005, CVE-2012-0013, CVE-2009-3126, CVE-2012-1870, CVE-2008-0015, CVE-2010-0818, CVE-2006-4696, CVE-2012-0181, CVE-2005-0058, CVE-2005-1214, CVE-2011-0662, CVE-2007-1912, CVE-2013-5058, CVE-2013-1251, CVE-2012-1527, CVE-2009-1125, CVE-2010-1690, CVE-2011-0661, CVE-2013-3865, CVE-2011-0030, CVE-2018-0599, CVE-2010-0487, CVE-2007-5348, CVE-2010-1896, CVE-2009-0229, CVE-2011-1227, CVE-2007-1946, CVE-2013-3181, CVE-2013-1270, CVE-2010-0231, CVE-2010-1888, CVE-2010-4669, CVE-2010-2729, CVE-2011-0666, CVE-2007-2237, CVE-2012-1865, CVE-2011-1234, CVE-2008-3014, CVE-2011-1885, CVE-2007-2228, CVE-2013-1263, CVE-2010-2265, CVE-2012-5362, CVE-2010-0022, CVE-2001-0860, CVE-2007-1215, CVE-2010-3974, CVE-2012-1851, CVE-2013-1276, CVE-2013-3196, CVE-2013-1287, CVE-2012-2553, CVE-2007-2219, CVE-2010-3943, CVE-2011-3401, CVE-2013-1291, CVE-2011-1247, CVE-2013-1257, CVE-2009-1123, CVE-2011-3402, CVE-2008-2251, CVE-2014-0315, CVE-2009-0320, CVE-2011-1249, CVE-2010-0236, CVE-2010-3222, CVE-2013-1341, CVE-2011-1878, CVE-2010-0480, CVE-2006-5586, CVE-2002-2117, CVE-2013-1271, CVE-2012-2530, CVE-2011-1870, CVE-2011-0676, CVE-2013-1313, CVE-2011-0089, CVE-2006-2373, CVE-2009-1929, CVE-2002-0055, CVE-2017-0176, CVE-2013-1254, CVE-2009-2494, CVE-2010-2744, CVE-2012-1867, CVE-2011-1886, CVE-2008-0322, CVE-2006-6797, CVE-2012-1528, CVE-2009-2516, CVE-2011-1225, CVE-2013-1283, CVE-2011-0041, CVE-2008-4038, CVE-2013-1294, CVE-2013-1248, CVE-2004-0206, CVE-2013-1334, CVE-2002-0862, CVE-2008-1445, CVE-2013-1344, CVE-2002-0724, CVE-2010-2567, CVE-2009-0568, CVE-2010-2740, CVE-2011-1228, CVE-2010-3940, CVE-2012-1848, CVE-2012-0004, CVE-2008-0088, CVE-2008-4114, CVE-2011-0665, CVE-2011-1230, CVE-2013-1345, CVE-2007-3463, CVE-2002-0974, CVE-2010-3227, CVE-2011-0658, CVE-2010-2743, CVE-2011-5046, CVE-2011-1268, CVE-2004-0199, CVE-2004-0897, CVE-2013-1264, CVE-2011-0042, CVE-2007-6026, CVE-2010-3144, CVE-2012-0217, CVE-2013-3198, CVE-2009-1124, CVE-2007-5145, CVE-2010-3956, CVE-2011-1968, CVE-2007-1492, CVE-2011-1229, CVE-2005-0904, CVE-2008-6194, CVE-2008-0083, CVE-2004-0119, CVE-2010-4562, CVE-2011-0086, CVE-2011-0088, CVE-2009-1808, CVE-2002-0053, CVE-2010-1689, CVE-2009-2519, CVE-2013-1278, CVE-2013-3940, CVE-2011-1876, CVE-2011-0045, CVE-2013-3128, CVE-2007-2218, CVE-2001-0909, CVE-2007-1765, CVE-2013-3661, CVE-2006-7210, CVE-2004-0230, CVE-2010-0719, CVE-2008-1087, CVE-2006-6723, CVE-2012-1850, CVE-2011-0660, CVE-2011-1884, CVE-2008-1084, CVE-2007-1205, CVE-2008-1083, CVE-2013-3894, CVE-2001-0721, CVE-2013-1277, CVE-2010-1255, CVE-2013-1269, CVE-2000-1218, CVE-2002-0283, CVE-2009-2503, CVE-2009-0085, CVE-2012-2971, CVE-2007-1531, CVE-2012-1853, CVE-2014-0266, CVE-2010-0024, CVE-2005-1987, CVE-2007-5133, CVE-2011-1991, CVE-2011-1881
heuristics/extracted_sars ADV_ARC.1, ATE_COV.2, ASE_TSS.1, AGD_OPE.1, ADV_IMP.1, ALC_DVS.1, ASE_REQ.2, ALC_TAT.1, AGD_PRE.1, ASE_CCL.1, ATE_IND.2, ALC_CMS.4, ASE_ECD.1, ADV_TDS.3, ALC_DEL.1, ATE_DPT.2, ASE_OBJ.2, AVA_VAN.3, ADV_FSP.4, ASE_INT.1, ASE_SPD.1, ATE_FUN.1, ALC_CMC.4, ALC_LCD.1 ASE_OBJ.1, ATE_COV.2, AGD_USR.1, ASE_REQ.1, ADV_HLD.2, ATE_DPT.1, ADV_IMP.1, ALC_FLR.3, ADV_FSP.2, ALC_DVS.1, AVA_VLA.4, ADV_SPM.1, ALC_TAT.1, ATE_IND.2, AGD_ADM.1, ATE_FUN.1, ADV_RCR.1, AVA_MSU.2, ALC_LCD.1, AVA_SOF.1, ADV_LLD.1
heuristics/extracted_versions - 2003
heuristics/report_references/directly_referenced_by {} BSI-DSZ-CC-0366-2008, BSI-DSZ-CC-0416-2007
heuristics/report_references/indirectly_referenced_by {} BSI-DSZ-CC-0366-2008, BSI-DSZ-CC-0416-2007
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-077
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE. The TOE is a high-end secure integrated circuit suitable for financial or governmental applications. The TOE consists of the IC hardware, IC dedicated test software and IC dedicated support software providing cryptographic functions. The hardware is based on a 32-bit CPU with volatile, non-volatile and read-only memory. The microcontroller incorporates cryptographic coprocessors for acceleration of symmetric and asymmetric encryption algorithms. The IC dedicated support software, also known as Crypto Library, provides DES, AES, RSA and random number generation functions.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135052-1607952667/SERTIT/Sertifikater/2016/77/20160922%20Sertit-077%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135055-1607952669/SERTIT/Sertifikater/2016/77/ThinklogicalSecurityTarget_1_4_TLX640.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135049-1607952664/SERTIT/Sertifikater/2016/77/20160922%20Sertit-077%20CR%20v1.0%20Certification%20Report%20TLX640.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX640 Matrix Switch Chassis (TLX-MSC-000640 Rev B), TLX640 Matrix Switch Data Input and Output Card, 20 Ports, SFP+, Multi-Mode (TLX-MSD-M00020 Rev C), Single Mode (TLX-MSD-S00020 Rev C), Velocity Matrix Switch 640 Data Input and Output Card, 20 Ports, SFP+, Multi-Mode (VXM-DIOR20 Rev A), Single-Mode (VXM-DIOS20 Rev A)
  • product: Thinklogical TLX640 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx640-matrix-switch
heuristics/st_references/directly_referenced_by {} BSI-DSZ-CC-0387-2007, BSI-DSZ-CC-0453-2009, BSI-DSZ-CC-0416-2007
heuristics/st_references/indirectly_referenced_by {} BSI-DSZ-CC-0387-2007, BSI-DSZ-CC-0453-2009, BSI-DSZ-CC-0416-2007
pdf_data/report_filename 20160922 Sertit-077 CR v1.0 Certification Report TLX640.pdf st_vid4025-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-05-0131
    • cert_item: Microsoft Windows 2003 Server and XP Workstation
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-077: 16
  • US:
    • CCEVS-VR-05-0131: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL 4 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ACM:
    • ACM_CAP.3: 1
    • ACM_SCP.1: 2
  • ADO:
    • ADO_DEL: 1
    • ADO_IGS.1: 1
  • ALC:
    • ALC_FLR.3: 3
  • ASE:
    • ASE_OBJ.1: 2
    • ASE_REQ: 2
    • ASE_REQ.1: 1
  • AVA:
    • AVA_VLA.1.1: 1
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
  • FAU:
    • FAU_GEN.1: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACF.1: 1
  • FIA:
    • FIA_USB.1: 1
  • FMT:
    • FMT_REV.1: 1
    • FMT_SMF.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Infineon:
    • Infineon: 1
  • Microsoft:
    • Microsoft: 24
    • Microsoft Corporation: 2
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • X509:
    • X.509: 3
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162620Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162620Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 877332
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename ThinklogicalSecurityTarget_1_4_TLX640.pdf st_vid4025-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 6
  • EAL:
    • EAL 3: 4
    • EAL 4: 14
    • EAL 4 augmented: 5
    • EAL3: 2
    • EAL4: 21
    • EAL4 augmented: 4
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT.1: 14
    • ACM_CAP.4: 24
    • ACM_SCP.2: 11
  • ADO:
    • ADO_DEL.2: 11
    • ADO_IGS.1: 10
  • ADV:
    • ADV_FSP.2: 14
    • ADV_HLD.2: 16
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 8
    • ADV_SPM.1: 14
  • AGD:
    • AGD_ADM.1: 15
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 11
    • ALC_FLR.3: 25
    • ALC_LCD.1: 12
    • ALC_TAT.1: 13
  • ATE:
    • ATE_COV.2: 11
    • ATE_DPT.1: 9
    • ATE_FUN.1: 14
    • ATE_IND.2: 12
  • AVA:
    • AVA_MSU.2: 18
    • AVA_SOF.1: 11
    • AVA_VLA.2: 16
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_GEN: 3
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 14
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 13
    • FAU_SAR.3.1: 2
    • FAU_SEL.1: 7
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 12
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 10
    • FAU_STG.3.1: 1
    • FAU_STG.4: 14
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM: 10
    • FCS_CKM.1: 19
    • FCS_CKM.1.1: 5
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 2
    • FCS_CKM.4: 9
    • FCS_CKM.4.1: 1
    • FCS_CKM_EXP.1: 1
    • FCS_CKM_EXP.2.2: 1
    • FCS_COP: 1
    • FCS_COP.1: 31
    • FCS_COP.1.1: 16
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.2: 30
    • FDP_ACC.2.1: 3
    • FDP_ACC.2.2: 3
    • FDP_ACF.1: 36
    • FDP_ACF.1.1: 3
    • FDP_ACF.1.2: 5
    • FDP_ACF.1.3: 5
    • FDP_ACF.1.4: 3
    • FDP_ACF.2: 2
    • FDP_IFC.1: 30
    • FDP_IFC.1.1: 2
    • FDP_IFF.1: 20
    • FDP_IFF.1.1: 2
    • FDP_IFF.1.2: 2
    • FDP_IFF.1.3: 2
    • FDP_IFF.1.4: 2
    • FDP_IFF.1.5: 2
    • FDP_IFF.1.6: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 4
    • FDP_ITT.1: 9
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 11
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 11
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 15
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 14
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 8
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 13
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB: 18
    • FIA_USB.1: 4
  • FMT:
    • FMT_MOF.1: 39
    • FMT_MOF.1.1: 4
    • FMT_MSA: 1
    • FMT_MSA.1: 64
    • FMT_MSA.1.1: 6
    • FMT_MSA.2: 9
    • FMT_MSA.3: 50
    • FMT_MSA.3.1: 5
    • FMT_MSA.3.2: 5
    • FMT_MTD.1: 140
    • FMT_MTD.1.1: 16
    • FMT_MTD.1.2: 1
    • FMT_MTD.2: 11
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV: 1
    • FMT_REV.1: 19
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 11
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 45
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
    • FMT_SMR.3: 8
    • FMT_SMR.3.1: 1
  • FPT:
    • FPT_AMT.1: 7
    • FPT_ITT.1: 6
    • FPT_ITT.3: 3
    • FPT_RPL: 1
    • FPT_RPL.1: 3
    • FPT_RVM.1: 10
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 9
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM.1: 11
    • FPT_STM.1.1: 1
    • FPT_TRC.1: 4
  • FRU:
    • FRU_RSA.1: 9
    • FRU_RSA.1.1: 1
  • FTA:
    • FTA_LSA.1: 1
    • FTA_MCS.1: 2
    • FTA_MSC.1: 1
    • FTA_SSL.1: 8
    • FTA_SSL.1.1: 1
    • FTA_SSL.1.2: 1
    • FTA_SSL.2: 12
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_SSL.3: 7
    • FTA_SSL.3.1: 1
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
    • FTA_TRP.1: 1
    • FTA_TSE.1: 10
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 11
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • A:
    • A.CONNECT: 3
    • A.COOP: 5
    • A.LOCATE: 3
    • A.MANAGE: 2
    • A.NO_EVIL_ADM: 3
    • A.PEER: 3
    • A.PROTECT: 2
  • O:
    • O.ASSURANCE: 4
    • O.AUDITING: 7
    • O.AUDIT_: 1
    • O.AUDIT_PROTECTION: 4
    • O.AUTHORIZATION: 7
    • O.CREDEN: 4
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENCRYPTED_DATA: 10
    • O.ENFORCEMENT: 8
    • O.INSTALL: 4
    • O.IPSEC: 12
    • O.LEGAL_WARNING: 4
    • O.LIMIT_AUTHORIZATION: 8
    • O.MANAGE: 7
    • O.MEDIATE: 8
    • O.PHYSICAL: 5
    • O.PROTECT: 9
    • O.RESIDUAL_INFORMATION: 7
    • O.TRUSTED_PATH: 8
  • T:
    • T.ADDRESS_MASQUERADE: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 5
    • T.AUDIT_CORRUPT: 4
    • T.CONFIG_CORRUPT: 3
    • T.EAVESDROP: 4
    • T.MASQUERADE: 3
    • T.OBJECTS_NOT_CLEAN: 4
    • T.POOR_DESIGN: 3
    • T.POOR_IMPLEMENTATION: 4
    • T.REPLAY: 4
    • T.SPOOF: 4
    • T.SYSACC: 4
    • T.TCPIP_ATTACK: 3
    • T.UNATTENDED_SESSION: 5
    • T.UNAUTH_ACCESS: 7
    • T.UNAUTH_MODIFICATION: 4
    • T.UNDETECTED_ACTIONS: 4
    • T.UNIDENTIFIED_ACTIONS: 8
    • T.USER_CORRUPT: 7
    • T.USER_CURRUPT: 1
pdf_data/st_keywords/vendor
  • Broadcom:
    • Broadcom: 1
  • Infineon:
    • Infineon: 2
  • Microsoft:
    • Microsoft: 42
    • Microsoft Corporation: 168
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
    • RC:
      • RC4: 2
  • DES:
    • 3DES:
      • 3DES: 12
    • DES:
      • DES: 18
  • constructions:
    • MAC:
      • HMAC: 6
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 9
      • Diffie-Hellman: 3
    • DSA:
      • DSA: 17
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • SHA:
    • SHA1:
      • SHA-1: 21
      • SHA1: 2
    • SHA2:
      • SHA-256: 3
      • SHA-384: 3
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
    • Key exchange: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 11
  • TLS:
    • SSL:
      • SSL: 12
    • TLS:
      • TLS: 5
  • VPN:
    • VPN: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 10
  • ECB:
    • ECB: 5
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 5
    • FIPS 140-1: 6
    • FIPS 140-2: 5
    • FIPS 140-214: 1
    • FIPS 180-2: 1
    • FIPS 186-2: 2
    • FIPS 197: 2
    • FIPS 46-3: 3
  • PKCS:
    • PKCS#1: 2
    • PKCS#5: 7
  • RFC:
    • RFC 2617: 1
    • RFC 3739: 1
  • X509:
    • X.509: 3
    • x.509: 1
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164410+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164410+00'00'
  • pdf_file_size_bytes: 604612
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different