Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
PostgreSQL Certified Version V8.1.5 for Linux
JISEC-CC-CRP-C0089
Virtual Machine of Multos M3 G230M mask with AMD 113v4
ANSSI-CC-2013/40
name PostgreSQL Certified Version V8.1.5 for Linux Virtual Machine of Multos M3 G230M mask with AMD 113v4
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP FR
not_valid_after 07.10.2013 01.09.2019
not_valid_before 22.03.2007 04.07.2013
report_link https://www.commoncriteriaportal.org/files/epfiles/c0089_ecvr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC_2013-40fr.pdf
st_link https://www.commoncriteriaportal.org/files/epfiles/ https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-cible_2013-40en.pdf
manufacturer NTT Data Corporation Multos international / Trusted Labs
manufacturer_web https://www.multosiniternational.com
security_level EAL1 EAL7
dgst 5646aebd043d2630 e2e9e34e9a3dfb6f
heuristics/cert_id JISEC-CC-CRP-C0089 ANSSI-CC-2013/40
heuristics/extracted_sars {} ADV_COMP.1
heuristics/extracted_versions 8.1.5 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2013/39
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, ANSSI-CC-2013/39, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0089
  • certification_date: 01.03.2007
  • claim: EAL1
  • enhanced:
    • assurance_level: EAL1
    • description: PRODUCT DESCRIPTION PostgreSQL Certified Version is a relational database management system, which is applicable to enterprise business. It is an enhanced version of the open source PostgreSQL and delivered from NTT Data Corp. PostgreSQL Certified Version runs on Red Hat Enterprise Linux AS v.4 for x86.
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center (JEITA ITSEC)
    • product: PostgreSQL Certified Version
    • product_type: IT Product (Database management system)
    • toe_version: V8.1.5 for Linux
    • vendor: NTT DATA CORPORATION
  • expiration_date: 01.10.2013
  • supplier: NTT DATA CORPORA TION
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0089_it6109.html
  • toe_japan_name: PostgreSQL Certified Version V8.1.5 for Linux
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0606-2010, BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0813-2012
protection_profile_links {} {}
pdf_data/report_filename c0089_ecvr.pdf ANSSI-CC_2013-40fr.pdf
pdf_data/report_frontpage
  • FR:
  • FR:
pdf_data/report_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2013/39: 5
    • ANSSI-CC-2013/40: 17
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 3
    • EAL4: 2
    • EAL7: 2
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • ITSC:
    • Information Technology Security Center: 1
  • TrustedLabs:
    • Trusted Labs: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
pdf_data/report_metadata
  • /Author: IPA/JISEC
  • /Company: IPA/ISEC
  • /CreationDate: D:20070406181635+09'00'
  • /Creator: Word 用 Acrobat PDFMaker 6.0
  • /ModDate: D:20070406181648+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /SourceModified: D:20070404120340
  • /Title: TOE List
  • pdf_file_size_bytes: 20755
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate:
  • /CreationDate--Text:
  • /Creator: PDFCreator Version 1.2.1
  • /Keywords:
  • /ModDate:
  • /ModDate--Text:
  • /Producer: GPL Ghostscript 9.02
  • /Subject:
  • /Title:
  • pdf_file_size_bytes: 176731
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
pdf_data/st_filename ANSSI-CC-cible_2013-40en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0606-2010: 7
    • BSI-DSZ-CC-0640-2010: 7
    • BSI-DSZ-CC-0813-2012: 1
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL5+: 1
    • EAL7: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_COMP.1: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ACC.2: 1
    • FAU_ARP: 3
    • FAU_ARP.1: 1
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 3
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 2
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 4
    • FDP_ACC.2: 3
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 4
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 1
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 2
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 3
    • FPT_RCV.4: 1
    • FPT_RCV.4.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 3
    • FRU_RSA.1: 1
    • FRU_RSA.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.APPLI_CONT: 3
    • A.CIPHER: 3
    • A.CLON: 3
    • A.DECIPHER: 3
    • A.DIS_MEMORY: 3
    • A.LOAD: 4
    • A.MOD_MEMORY: 3
    • A.OPERATE: 3
    • A.REMOVE: 3
    • A.SECURITY: 4
    • A.SIDE: 3
    • A.TAMPER_ES: 4
  • O:
    • O.APPLI_DEV: 5
    • O.CIPHER: 2
    • O.CLON: 2
    • O.DECIPHER: 3
    • O.DEV_DIS_ES: 4
    • O.DIS_MEMORY: 2
    • O.DLV_: 2
    • O.DLV_DATA: 4
    • O.EFFECT_LOAD: 2
    • O.EFFECT_REMOVE: 2
    • O.INIT_ACS: 3
    • O.LOAD: 4
    • O.MOD_MEMORY: 1
    • O.OPERATE: 1
    • O.REMOVE: 3
    • O.RESOURCE: 1
    • O.RND: 1
    • O.ROLLBACK: 1
    • O.SAMPLE_ACS: 1
    • O.SECURITY: 2
    • O.SEGREGATE: 2
    • O.SIDE: 4
    • O.TAMPER_ES: 7
    • O.TEST_OPERA: 1
  • OSP:
    • OSP.CIPHER: 1
    • OSP.CONF-ALU: 1
  • T:
    • T.APP_CORR: 3
    • T.APP_DISC: 3
    • T.APP_MOD: 4
    • T.APP_READ: 3
    • T.APP_REMOVE: 4
    • T.DEL_REMOVE: 4
    • T.DIS_DATA: 6
    • T.DIS_TEST_ES: 2
    • T.ERR_REMOVE: 3
    • T.LOAD_APP: 4
    • T.LOAD_MAN: 2
    • T.LOAD_MOD: 2
    • T.LOAD_OTHER: 2
    • T.MOD: 2
    • T.MOD_DATA: 4
    • T.MOD_EXE: 4
    • T.MOD_LOAD: 2
    • T.MOD_SHARE: 2
    • T.MOD_TSF: 3
    • T.RESOURCES: 2
    • T.RND: 1
    • T.T_CMD: 4
    • T.T_ES: 2
    • T.T_TOOLS: 2
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 5
  • Thales:
    • Thales: 1
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 4
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
pdf_data/st_keywords/crypto_protocol
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 1
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • physical probing: 1
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.6.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
    • out of scope: 3
    • these elements are out of scope of the TOE: 1
    • this space in loading time and controls the access to its elements in runtime. (these elements are out of scope of the TOE) PUBLIC MULTOS M3 Common Criteria Virtual Machine Public Security Target Document: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
pdf_data/st_metadata
state/report/convert_garbage True False
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok False True
state/st/download_ok False True
state/st/extract_ok False True
state/st/pdf_hash Different Different
state/st/txt_hash Different Different