Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA Access Control for Windows r8
CCEVS-VR-0041-2007
Secure DVI KVM Switch, Secure KM Switch and Secure KVM Combiner
383-4-195
name CA Access Control for Windows r8 Secure DVI KVM Switch, Secure KM Switch and Secure KVM Combiner
category Access Control Devices and Systems Other Devices and Systems
scheme US CA
not_valid_after 06.09.2012 19.04.2018
not_valid_before 20.06.2007 16.07.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3036-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-195%20CR%20v1.0e.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid3036-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-195%20ST%20v1.14.pdf
manufacturer CA Technologies High Security Labs Ltd.
manufacturer_web https://www.ca.com https://www.highseclabs.com/
security_level EAL3 EAL4+, ALC_FLR.3
dgst 6dabe13f26dc9845 9cb39cdf240916af
heuristics/cert_id CCEVS-VR-0041-2007 383-4-195
heuristics/cert_lab US CANADA
heuristics/extracted_sars ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ADV_FSP.1, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_VLA.1, AVA_MSU.1, AGD_ADM.1, ATE_IND.2, ATE_DPT.1, AVA_SOF.1 ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, ALC_FLR.3, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/scheme_data
  • category: System Access Control
  • certification_date: 20.06.2007
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date:
  • id: CCEVS-VR-VID3036
  • product: CA Access Control for Windows r8
  • scheme: US
  • url: https://www.niap-ccevs.org/product/3036
  • vendor: CA Technologies
heuristics/protection_profiles {} fd5d86dc01df0437
maintenance_updates
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf
pdf_data/report_filename st_vid3036-vr.pdf 383-4-195 CR v1.0e.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-07-0041
    • cert_item: CA CA Access Control for Windows r8
    • cert_lab: US NIAP
  • CA:
  • US:
  • CA:
    • cert_id: 383-4-195 CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-07-0041: 1
  • CA:
    • 383-4-195: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 3: 3
    • EAL3: 7
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.2: 1
    • FAU_SAR.1: 1
    • FAU_SAR.2: 1
    • FAU_SAR.3: 1
    • FAU_STG.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
  • FIA:
    • FIA_ATD.1: 1
    • FIA_UAU.2: 2
    • FIA_UID.2: 2
    • FIA_USB: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_MSA: 2
    • FMT_MSA.1: 1
    • FMT_MTD.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_RVM_ENV.1: 1
    • FPT_RVM_EXP.1: 1
    • FPT_SEP_ENV.1: 1
    • FPT_SEP_EXP.1: 1
    • FPT_STM.1: 1
  • FTA:
    • FTA_TSE.1: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
pdf_data/report_keywords/eval_facility
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/vulnerability
  • CVE:
    • CVE-2000-0762: 1
pdf_data/report_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /Author: krshann
  • /CreationDate: D:20120718095405-04'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20120718095405-04'00'
  • /Producer: Acrobat Distiller 9.0.0 (Windows)
  • /Title: Microsoft Word - 383-4-195 CR v1.0e.doc
  • pdf_file_size_bytes: 56166
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename st_vid3036-st.pdf 383-4-195 ST v1.14.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 19
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 3
    • ACM_SCP.1: 3
  • ADO:
    • ADO_DEL.1: 3
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 3
    • ADV_HLD.2: 3
    • ADV_RCR.1: 3
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 3
    • AGD_USR.1: 4
  • ALC:
    • ALC_DVS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.1: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 3
  • AVA:
    • AVA_MSU.1: 3
    • AVA_SOF: 1
    • AVA_SOF.1: 3
    • AVA_VLA.1: 3
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 15
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 13
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 8
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 7
    • FAU_SAR.3.1: 1
    • FAU_SEL: 1
    • FAU_SEL.1: 8
    • FAU_SEL.1.1: 1
    • FAU_STG: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_UAU: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 4
    • FIA_UID: 1
    • FIA_UID.1: 7
    • FIA_UID.2: 3
  • FMT:
    • FMT_MOF: 1
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA: 15
    • FMT_MSA.1: 14
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 1
    • FMT_MSA.3: 6
    • FMT_MTD: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_SMF: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_RVM: 2
    • FPT_RVM.1: 1
    • FPT_RVM_ENV: 1
    • FPT_RVM_ENV.1: 6
    • FPT_RVM_ENV.1.1: 1
    • FPT_RVM_EXP: 2
    • FPT_RVM_EXP.1: 10
    • FPT_RVM_EXP.1.1: 1
    • FPT_SEP: 2
    • FPT_SEP.1: 1
    • FPT_SEP_ENV: 1
    • FPT_SEP_ENV.1: 6
    • FPT_SEP_ENV.1.1: 1
    • FPT_SEP_ENV.1.2: 1
    • FPT_SEP_EXP: 2
    • FPT_SEP_EXP.1: 10
    • FPT_SEP_EXP.1.1: 1
    • FPT_SEP_EXP.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1: 6
    • FPT_STM.1.1: 1
  • FTA:
    • FTA_TSE: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 6
    • FDP_IFF: 27
    • FDP_IFF.1: 12
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 3
    • FMT_SMR.1: 5
  • FPT:
    • FPT_PHP: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 11
    • O.SELECT: 3
    • O.SWITCH: 7
    • O.TAMPER: 6
    • O.UNIDIR: 11
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 3
    • OE.MANAGE: 2
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 2
  • T:
    • T.INFECTED: 3
    • T.INVALIDUSB: 3
    • T.PERIP: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.TAMPER: 3
    • T.TRANSFER: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 4
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 4
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 10
  • other:
    • reverse engineering: 1
pdf_data/st_metadata
  • /Author: krogers
  • /Company: CygnaCom Solutions, Inc.
  • /CreationDate: D:20070713143933-04'00'
  • /Creator: Acrobat PDFMaker 7.0 for Word
  • /ModDate: D:20070713145128-04'00'
  • /Producer: Acrobat Distiller 7.0 (Windows)
  • /SourceModified: D:20070713183619
  • /Title: APPENDIX E (CERTIFICATE POLICY TAXONOMY)
  • /_AdHocReviewCycleID: -996863536
  • /_AuthorEmail: [email protected]
  • /_AuthorEmailDisplayName: Kris Rogers
  • /_EmailSubject: Saffire Systems CygnaCom TSA
  • /_PreviousAdHocReviewCycleID: -1060010886
  • pdf_file_size_bytes: 508860
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 65
  • /Author: aviv
  • /CreationDate: D:20120717213229+03'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20120717213229+03'00'
  • /Producer: GPL Ghostscript 8.64
  • /Title: Microsoft Word - ST HSL Secure DVI KVM Switch Rev 1_14.docx
  • pdf_file_size_bytes: 479365
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different