Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
Bit9 Parity Version 6.0
CCEVS-VR-VID-10436-2011
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series Bit9 Parity Version 6.0
category Boundary Protection Devices and Systems Access Control Devices and Systems
scheme TR US
not_valid_after 27.03.2017 01.11.2014
not_valid_before 15.03.2013 23.02.2011
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10436-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10436-st.pdf
manufacturer RIOREY Incorporated Bit9, Inc.
manufacturer_web https://www.riorey.com/ https://www.bit9.com
security_level EAL4+, ALC_FLR.1 EAL2+, ASE_TSS.2, ALC_FLR.1
dgst 53265b9d283d6074 9a5df60f41545692
heuristics/cert_id CCEVS-VR-VID-10436-2011
heuristics/cert_lab [] US
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ALC_FLR.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ASE_TSS.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 6.0
heuristics/scheme_data
  • category: System Access Control
  • certification_date: 23.02.2011
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10436
  • product: Bit9 Parity Version 6.0
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10436
  • vendor: Bit9, Inc.
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf st_vid10436-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10436-2011
    • cert_item: Bit9, Inc. Parity™ 6.0.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10436-2011: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 2: 2
    • EAL2: 4
    • EAL2 augmented: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ALC:
    • ALC_FLR.1: 3
  • ASE:
    • ASE_TSS.2: 3
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.PASSWORD: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 14
    • TLS:
      • TLS: 3
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • NIST:
    • NIST SP 800-53: 1
  • RFC:
    • RFC 5321: 1
    • RFC 821: 1
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
  • /Author: Eric Winterton
  • /CreationDate: D:20110405111603
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110405111603
  • /Producer: Microsoft® Office Word 2007
  • /Title: National Information Assurance Partnership
  • pdf_file_size_bytes: 524640
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 26
pdf_data/st_filename RioRey ST- v0.9.pdf st_vid10436-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL 2: 2
    • EAL2: 6
    • EAL2 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.2: 13
    • ADV_TDS.1: 13
  • AGD:
    • AGD_OPE.1: 12
    • AGD_PRE.1: 8
  • ALC:
    • ALC_CMC.2: 10
    • ALC_CMS.2: 8
    • ALC_DEL.1: 7
    • ALC_FLR.1: 12
  • ASE:
    • ASE_CCL.1: 13
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.2: 12
    • ASE_REQ.2: 15
    • ASE_SPD.1: 9
    • ASE_TSS.2: 13
  • ATE:
    • ATE_COV.1: 6
    • ATE_FUN.1: 10
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.2: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_ARP.1: 8
    • FAU_ARP.1.1: 1
    • FAU_GEN: 1
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_GEN_EXT: 1
    • FAU_GEN_EXT.1: 12
    • FAU_GEN_EXT.1.1: 4
    • FAU_GEN_EXT.1.2: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR: 1
    • FAU_SAR.1: 7
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 5
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
    • FAU_STG_EXT: 1
    • FAU_STG_EXT.3: 15
    • FAU_STG_EXT.3.1: 2
  • FCS:
    • FCS_CKM.1: 3
    • FCS_COP.1: 10
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 3
    • FDP_ACF: 2
    • FDP_ACF.1: 19
    • FDP_ACF.1.1: 5
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ITC.1: 1
    • FDP_ITC.2: 1
  • FIA:
    • FIA_ATD.1: 15
    • FIA_ATD.1.1: 1
    • FIA_MTD.1: 2
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT: 3
    • FIA_UAU_EXT.2: 9
    • FIA_UAU_EXT.2.1: 3
    • FIA_UAU_EXT.8: 10
    • FIA_UAU_EXT.8.1: 3
    • FIA_UID.1: 4
    • FIA_UID.2: 10
    • FIA_UID.2.1: 1
    • FIA_UID_EXT: 1
    • FIA_UID_EXT.2: 12
    • FIA_UID_EXT.2.1: 3
    • FIA_USB.1: 13
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 9
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC.1: 1
    • FPT_ITC_EXT: 1
    • FPT_ITC_EXT.1: 15
    • FPT_ITC_EXT.1.1: 2
    • FPT_ITT.1: 1
    • FPT_ITT_EXT: 1
    • FPT_ITT_EXT.1: 14
    • FPT_ITT_EXT.1.1: 2
    • FPT_STM.1: 5
  • FTA:
    • FTA_TAB.1: 8
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_TRP.1: 1
    • FTP_TRP_EXT: 1
    • FTP_TRP_EXT.1: 11
    • FTP_TRP_EXT.1.1: 2
    • FTP_TRP_EXT.1.2: 2
    • FTP_TRP_EXT.1.3: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.ADMIN: 1
    • A.CLIENTID: 2
    • A.CONNECT: 2
    • A.CONTEXT: 2
    • A.LOCATE: 2
    • A.NOEVIL: 2
    • A.PASSWORD: 2
    • A.PATCHES: 1
  • O:
    • O.ACCESS: 5
    • O.ALERT: 3
    • O.AUDIT: 4
    • O.AUTH: 3
    • O.CRYPTOGRAPHY: 3
    • O.DISPLAY_BANNER: 3
    • O.EAVESDROPPING: 3
    • O.MANAGE: 3
    • O.MUTUAL: 3
    • O.PROTECT: 3
    • O.WHITELIST: 3
  • OE:
    • OE: 1
    • OE.ADMIN: 4
    • OE.ATTRIBUTES: 2
    • OE.AUTH: 2
    • OE.CLIENTID: 2
    • OE.CONNECT: 2
    • OE.CRYPTOGRAPHY: 2
    • OE.FILESYS: 7
    • OE.LOCATE: 2
    • OE.NOEVIL: 4
    • OE.PASSWORD: 2
    • OE.SYSTIME: 3
  • T:
    • T.ACCESS: 5
    • T.ADMIN_ERROR: 3
    • T.MASK: 4
    • T.MASQUERADE: 1
    • T.REVERSE: 2
    • T.UNAUTH: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 31
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 4
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • MD:
    • MD5:
      • MD5: 6
  • SHA:
    • SHA1:
      • SHA-1: 3
      • SHA1: 3
    • SHA2:
      • SHA-256: 7
      • SHA256: 5
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 16
    • TLS:
      • TLS: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • CC:
    • CCMB-2009-07-004: 1
  • FIPS:
    • FIPS 180-3: 1
  • PKCS:
    • PKCS#12: 2
  • RFC:
    • RFC 5321: 1
    • RFC 821: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different