Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series
None
IBM WebSphere MQ 6.0.1.1
CCEVS-VR-0031-2006
name RioRey Perimeter Protection Platform RE500, RE1500, RX1800, RX2300, RX4400 and RG Series IBM WebSphere MQ 6.0.1.1
category Boundary Protection Devices and Systems Other Devices and Systems
scheme TR US
not_valid_after 27.03.2017 06.09.2012
not_valid_before 15.03.2013 02.10.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20CERTIFICATION%20REPORT.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10117-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/RioRey%20ST-%20v0.9.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10117-st.pdf
manufacturer RIOREY Incorporated IBM United Kingdom Limited
manufacturer_web https://www.riorey.com/ https://www.ibm.com/uk/
security_level EAL4+, ALC_FLR.1 EAL4+, ALC_FLR.2
dgst 53265b9d283d6074 b2ecacee578355b5
heuristics/cert_id CCEVS-VR-0031-2006
heuristics/cert_lab [] US
heuristics/cpe_matches {} cpe:2.3:a:ibm:websphere_portal_unified_task_list_portlet:6.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_mq:6.0:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_application_server:6.0.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_application_server:6.0.1.1:*:*:*:*:*:*:*, cpe:2.3:a:ibm:websphere_mq:6.0.1.1:*:*:*:*:*:*:*
heuristics/related_cves {} CVE-2011-1318, CVE-2008-5411, CVE-2011-1316, CVE-2014-4816, CVE-2007-4833, CVE-2009-0504, CVE-2009-3160, CVE-2007-5799, CVE-2010-3271, CVE-2008-0741, CVE-2006-4137, CVE-2009-0433, CVE-2007-5798, CVE-2011-1307, CVE-2007-3265, CVE-2011-1224, CVE-2010-0768, CVE-2011-1309, CVE-2014-4770, CVE-2008-5413, CVE-2006-4136, CVE-2009-1900, CVE-2014-3056, CVE-2009-0896, CVE-2009-0434, CVE-2010-0776, CVE-2016-3013, CVE-2010-0774, CVE-2006-5324, CVE-2007-3263, CVE-2009-0905, CVE-2014-3054, CVE-2007-6679, CVE-2014-3057, CVE-2008-2550, CVE-2007-6705, CVE-2010-2637, CVE-2006-4222, CVE-2010-0782, CVE-2012-2162, CVE-2011-1311, CVE-2010-0779, CVE-2010-0777, CVE-2009-0436, CVE-2009-1901, CVE-2006-4223, CVE-2010-0775, CVE-2007-6044, CVE-2009-0900, CVE-2011-1308, CVE-2007-5483, CVE-2010-0769, CVE-2007-3262, CVE-2008-4284, CVE-2009-0217, CVE-2009-2747, CVE-2009-1898, CVE-2011-0314, CVE-2008-4679, CVE-2008-0740, CVE-2010-0770, CVE-2014-3055, CVE-2009-0439, CVE-2011-1314, CVE-2016-3052, CVE-2006-5323, CVE-2005-3498, CVE-2010-1650, CVE-2009-1899, CVE-2007-3264, CVE-2011-1315, CVE-2007-3960, CVE-2015-0176, CVE-2007-1608, CVE-2007-1944, CVE-2008-0389, CVE-2013-0542
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, AVA_SOF.1, ADV_FSP.2, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions - 6.0.1.1
maintenance_updates
pdf_data/report_filename RioRey CERTIFICATION REPORT.pdf st_vid10117-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-06-0031
    • cert_item: IBM UK Ltd IBM WebSphere MQ Version 6.0.1.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-06-0031: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 2
    • EAL 4+: 5
    • EAL4: 1
    • EAL4+: 1
  • EAL:
    • EAL 4: 7
    • EAL 4 augmented: 2
    • EAL4: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADO:
    • ADO_IGS.1: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 3
pdf_data/report_keywords/cc_sfr
  • FRU:
    • FRU_DDOS_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
    • TLS:
      • TLS: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025: 2
  • FIPS:
    • FIPS 140-2: 4
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /Author: Tse
  • /CreationDate: D:20130318153433-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130318153433-04'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 1
  • pdf_file_size_bytes: 511380
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 15
pdf_data/st_filename RioRey ST- v0.9.pdf st_vid10117-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL4: 51
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT.1: 1
    • ACM_CAP.4: 1
    • ACM_SCP.2: 1
  • ADO:
    • ADO_DEL.2: 1
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.2: 1
    • ADV_HLD.2: 1
    • ADV_IMP.1: 1
    • ADV_LLD.1: 1
    • ADV_RCR.1: 1
    • ADV_SPM.1: 1
  • AGD:
    • AGD_ADM.1: 1
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 1
    • ALC_FLR.2: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU.2: 1
    • AVA_SOF.1: 1
    • AVA_VLA.2: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 13
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 12
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 2
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 3
    • FAU_SAR: 1
    • FAU_SAR.2: 2
    • FAU_SAR.2.1: 2
    • FAU_STG: 1
    • FAU_STG.1: 3
    • FAU_STG.1.1: 2
    • FAU_STG.1.2: 3
  • FCS:
    • FCS_COP: 1
    • FCS_COP.1: 4
    • FCS_COP.1.1: 8
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 3
    • FDP_ACC.1.1: 3
    • FDP_ACF: 1
    • FDP_ACF.1: 3
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 3
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 3
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 2
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 6
    • FIA_UID.2.1: 2
  • FMT:
    • FMT_MSA: 1
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 2
    • FMT_MTD: 1
    • FMT_MTD.1: 5
    • FMT_MTD.1.1: 3
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 2
    • FMT_SMR: 1
    • FMT_SMR.1: 5
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_ITT: 1
    • FPT_ITT.1: 3
    • FPT_ITT.1.1: 2
    • FPT_RVM: 1
    • FPT_RVM.1: 3
    • FPT_RVM.1.1: 2
    • FPT_SEP.1: 4
    • FPT_SEP.1.1: 2
    • FPT_SEP.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 2
  • FTP:
    • FTP_ITT.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 6
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.ADMIN: 3
    • A.OS: 4
    • A.PROTECT: 3
  • O:
    • O.ACCESS: 7
    • O.ACCOUNT: 4
    • O.ADMIN: 8
    • O.AUDIT: 5
    • O.CONFIG: 8
    • O.IDENTIFY: 6
    • O.MANAGE: 7
    • O.OS: 7
    • O.PROTECT: 4
    • O.RECOVER: 3
    • O.ROLE: 5
    • O.TIME: 6
    • O.TOE_PROTECTION: 4
  • T:
    • T.ACCESS_RES: 3
    • T.ACCESS_TOE: 3
    • T.ACCOUNT: 3
    • T.CHANNEL: 3
    • T.OS: 3
    • T.ROLE: 3
pdf_data/st_keywords/vendor
  • STMicroelectronics:
    • STM: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDEA: 3
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 3
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
  • MD:
    • MD5:
      • MD5: 4
  • SHA:
    • SHA1:
      • SHA-1: 7
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
  • TLS:
    • SSL:
      • SSL: 8
    • TLS:
      • TLS: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 6
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_3DES_EDE_CBC_SHA: 1
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
    • TLS_RSA_WITH_DES_CBC_SHA: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • FIPS:
    • FIPS 140-2: 15
    • FIPS 180-2: 3
    • FIPS 186-2: 1
    • FIPS 197: 1
    • FIPS 198: 1
    • FIPS 46-3: 2
    • FIPS 81: 2
    • FIPS140-2: 9
    • FIPS180-2: 3
    • FIPS186-2: 1
    • FIPS197: 1
    • FIPS198: 1
    • FIPS46-3: 2
    • FIPS81: 2
  • RFC:
    • RFC 1319: 1
    • RFC 1321: 2
    • RFC 2246: 1
    • RFC 2313: 4
    • RFC 2437: 4
    • RFC1319: 1
    • RFC1321: 2
    • RFC2313: 4
    • RFC2437: 4
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130328162641+02'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130328162641+02'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1068348
  • pdf_hyperlinks: https://tools.ietf.org/html/rfc6151
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different