Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tintri VMstore v3.1.2.1
383-4-318
KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
KECS-ISIS-0468-2013
name Tintri VMstore v3.1.2.1 KOMSCO JK21 V1.0 on S3CT9KA/KC/KW
category Other Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme CA KR
not_valid_after 10.08.2020 01.06.2019
not_valid_before 10.08.2015 08.11.2013
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-318%20CT%20v1.0e.docx
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-318%20CR%20v1.0e.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-13-37%20KOMSCO%20JK21%20V1.0%20on%20S3CT9KAKCKW(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-318%20ST%20v1.4.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK21-TR-0001]%20Security%20Target-Lite-e-v1.1.pdf
manufacturer Tintri, Inc. KOMSCO
manufacturer_web https://ttp://www.tintri.com/ https://www.komsco.com
security_level EAL2+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 6747c88af78346a3 fd0beec036b21950
heuristics/cert_id 383-4-318 KECS-ISIS-0468-2013
heuristics/cert_lab CANADA []
heuristics/extracted_sars ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 3.1.2.1 1.0
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, BSI-DSZ-CC-0639-2010, BSI-DSZ-CC-0547-2009
heuristics/scheme_data
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0719-2011, ANSSI-CC-2012/70, ANSSI-CC-2012/72
pdf_data/cert_filename 383-4-318 CT v1.0e.docx
pdf_data/report_filename 383-4-318 CR v1.0e.pdf KECS-CR-13-37 KOMSCO JK21 V1.0 on S3CT9KAKCKW(eng).pdf
pdf_data/report_frontpage
  • CA:
    • cert_id: 383-4-318-CR
    • cert_lab: CANADA
  • CA:
pdf_data/report_keywords/cc_cert_id
  • CA:
    • 383-4-318-CR: 1
  • DE:
    • BSI-DSZ-CC-0719: 3
    • BSI-DSZ-CC-0719-2011: 1
  • FR:
    • ANSSI-CC-2012/70: 4
  • KR:
    • KECS-ISIS-0468-2013: 1
  • NL:
    • CC-2011-002: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 2+: 2
    • EAL2+: 1
  • EAL:
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 3
    • EAL6: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 1
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 2
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 8
pdf_data/report_keywords/cc_sfr
  • FIA:
    • FIA_UIA_EXT.1: 1
  • FPT:
    • FPT_TST_EXT.1: 1
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 8
pdf_data/report_keywords/eval_facility
  • KISA:
    • KISA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • DES:
      • DES: 3
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 1
pdf_data/report_keywords/randomness
  • TRNG:
    • TRNG: 4
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 17025:2005: 1
  • BSI:
    • AIS 34: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
  • SCP:
    • SCP02: 1
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 1
  • JavaCard:
    • Java Card 2.2.2: 3
pdf_data/report_metadata
  • /Author: Clark, Cory P.
  • /CR version: 0.1
  • /Company: CSEC-CSTC
  • /CreationDate: D:20151007105426-04'00'
  • /Creator: Acrobat PDFMaker 11 for Word
  • /Developer name: Tintri, Inc.
  • /Document number: 383-4-318-CR
  • /ETR title, version, date: Tintri VMstore v3.1.2.1 Common Criteria EAL2+ Evaluation Evaluation Technical Report v1.0, 10 August 2015
  • /Evaluation completion date: 10 August 2015
  • /ModDate: D:20151007105439-04'00'
  • /Producer: Adobe PDF Library 11.0
  • /ST Title: Security Target: Tintri VMstore v3.1.2.1, version 1.4, 10 August 2015
  • /SourceModified: D:20150911142412
  • /TOE name and version: Tintri VMstore v3.1.2.1
  • /TOE short name: Tintri VMstore v3.1.2.1
  • /Title: 383-4-XXX CR vxe
  • pdf_file_size_bytes: 466058
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /Author: 이은경
  • /CreationDate: D:20131107180619+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131107180619+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 571329
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename 383-4-318 ST v1.4.pdf [JK21-TR-0001] Security Target-Lite-e-v1.1.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0719-: 1
    • BSI-DSZ-CC-0719-2011: 3
  • FR:
    • ANSSI-CC-2012/70: 3
    • ANSSI-CC-2012/72: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL2: 1
    • EAL2 augmented: 1
    • EAL2+: 4
  • EAL:
    • EAL 5+: 1
    • EAL3: 1
    • EAL4: 3
    • EAL4+: 1
    • EAL5: 11
    • EAL5 augmented: 1
    • EAL5+: 13
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 4
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 5
    • ADV_TDS.4: 19
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 20
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 2
    • AVA_VAN.5: 20
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 11
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 6
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 6
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC.1: 19
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 15
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ETC.2: 6
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_ATD.1: 6
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 7
    • FIA_UAU.5: 6
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.7: 6
    • FIA_UAU.7.1: 1
    • FIA_UIA.1: 3
    • FIA_UIA_EXT: 1
    • FIA_UIA_EXT.1: 15
    • FIA_UIA_EXT.1.1: 2
    • FIA_UIA_EXT.1.2: 2
    • FIA_UID: 1
    • FIA_UID.1: 9
  • FMT:
    • FMT_MSA.1: 7
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST: 4
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 9
    • FPT_TST_EXT.1.1: 2
    • FPT_UIA_EXT: 2
  • FRU:
    • FRU_FLT.1: 6
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_SSL.4: 6
    • FTA_SSL.4.1: 1
  • FAU:
    • FAU_ARP.1: 7
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 10
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 3
  • FCS:
    • FCS_CKM: 2
    • FCS_CKM.1: 29
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 12
    • FCS_CKM.4: 21
    • FCS_CKM.4.1: 2
    • FCS_COP: 6
    • FCS_COP.1: 44
    • FCS_COP.1.1: 7
    • FCS_RNG: 2
    • FCS_RNG.1: 14
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 17
    • FDP_ACC.2: 15
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 22
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 9
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_ITT.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 6
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 8
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 7
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 13
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 7
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 22
    • FIA_UAU.1.1: 7
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 7
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 6
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 14
    • FIA_UID.1.1: 2
    • FIA_UID.1.2: 1
    • FIA_USB.1: 6
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_LIM.1: 3
    • FMT_LIM.2: 3
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 16
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 11
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 7
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 18
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 8
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 2
    • FPT_ITT.1: 1
    • FPT_PHP.3: 8
    • FPT_RCV.2: 1
    • FPT_RCV.3: 6
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT.2: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_TRP.1: 5
pdf_data/st_keywords/cc_claims
  • A:
    • A.LOCATE: 2
    • A.MANAGE: 2
    • A.MANAGEMENT_INTERFACE: 2
    • A.NOEVIL: 1
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 2
    • A.PROTECTED: 2
    • A.TRUSTED: 2
  • O:
    • O.ACCESS_CONTROL: 4
    • O.AVAILABILITY: 4
    • O.SYSTEM_MONITORING: 3
    • O.TIMESTAMP: 4
    • O.TOE_ADMINISTRATION: 4
    • O.TSF_SELF_TEST: 4
  • OE:
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.PHYSICAL: 2
    • OE.PROTECT: 5
    • OE.SECURE_NETWORK: 5
    • OE.TRUSTED_ADMIN: 3
    • OE.TRUSTED_DEVICES: 5
  • T:
    • T.DATA_AVAILABILITY: 2
    • T.DATA_TAMPERING: 2
    • T.MASQUERADE: 2
    • T.UNDETECTED_ACTIONS: 2
  • A:
    • A.TOE: 3
    • A.TSF: 3
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 23
    • O.RND: 1
  • OE:
    • OE.TSF: 6
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 10
    • OP.INSTALL: 10
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 10
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
  • T:
    • T.RND: 1
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 9
  • DES:
    • 3DES:
      • 3DES: 1
      • TDES: 14
    • DES:
      • DES: 2
  • miscellaneous:
    • ARIA:
      • ARIA: 7
    • SEED:
      • SEED: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 14
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 4
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA 1024: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-224: 2
      • SHA-256: 1
      • SHA-384: 1
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
    • RNG: 1
  • TRNG:
    • TRNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 10
    • Physical tampering: 2
    • malfunction: 9
    • physical tampering: 1
  • SCA:
    • DPA: 1
    • Leak-Inherent: 2
    • SPA: 1
    • physical probing: 3
    • timing attack: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 31: 1
    • AIS31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • PKCS:
    • PKCS#1: 1
    • PKCS#2: 2
  • SCP:
    • SCP 02: 1
    • SCP02: 19
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the EEPROM of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the JavaCard Platform that supports the analysis: 1
pdf_data/st_metadata
  • /Author: HoGeun Song
  • /CreationDate: D:20131111082538+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20131111082538+09'00'
  • /Producer: Microsoft® Word 2010
  • /Title: KOMSCO Document Template
  • pdf_file_size_bytes: 1422360
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 108
state/cert/convert_garbage True False
state/cert/download_ok True False
state/cert/pdf_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different