Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM i5/OS V5R3MO running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930
CCEVS-VR-0111-2005
Smart card reader SPR332 firmware version 6.01
BSI-DSZ-CC-0592-2010
name IBM i5/OS V5R3MO running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930 Smart card reader SPR332 firmware version 6.01
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US DE
not_valid_after 06.09.2012 01.09.2019
not_valid_before 10.08.2005 19.02.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4035-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4035-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0592b_pdf.pdf
manufacturer IBM Corporation SCM Microsystems GmbH
manufacturer_web https://www.ibm.com https://www.scmmicro.com/
security_level EAL4+, ALC_FLR.2 EAL3+
dgst 7137e693dbc035de 4dea0e662a7132d0
heuristics/cert_id CCEVS-VR-0111-2005 BSI-DSZ-CC-0592-2010
heuristics/cert_lab US BSI
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, ADV_FSP.1, AVA_VLA.4, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, AVA_VAN.4, ATE_DPT.1, AVA_SOF.1, AVA_MSU.3, ADV_IMP.1
heuristics/extracted_versions 570, 520, 1930, 550 6.01
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0394-2006
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0394-2006
heuristics/scheme_data
  • category: Operating System
  • certification_date: 10.08.2005
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID4035
  • product: IBM i5/OS V5R3M0 running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930
  • scheme: US
  • url: https://www.niap-ccevs.org/product/4035
  • vendor: IBM Corporation
pdf_data/report_filename st_vid4035-vr.pdf 0592a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-05-0111
    • cert_item: IBM Rochester, MN IBM i5/OS V5R3M0 running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930
    • cert_lab: US NIAP
  • DE:
    • cert_id: BSI-DSZ-CC-0592-2010
    • cert_item: Smart card reader SPR332 firmware version 6.01
    • cert_lab: BSI
    • developer: SCM Microsystems GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-05-0111: 1
  • DE:
    • BSI-DSZ-CC-0394-2006: 2
    • BSI-DSZ-CC-0592: 1
    • BSI-DSZ-CC-0592-2010: 17
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 11
    • EAL 4 augmented: 3
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL 1: 1
    • EAL 3: 2
    • EAL 3 augmented: 2
    • EAL 4: 4
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 6
    • EAL3 augmented: 1
    • EAL3+: 1
    • EAL4: 7
    • EAL5: 6
    • EAL5+: 1
    • EAL6: 3
    • EAL7: 4
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VLA.2: 2
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_SCP: 2
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 4
    • ADO_IGS: 2
  • ADV:
    • ADV_FSP: 2
    • ADV_HLD: 2
    • ADV_IMP: 2
    • ADV_IMP.1: 4
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 4
    • ADV_RCR: 2
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_USR: 2
  • ALC:
    • ALC_DVS: 2
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 4
  • APE:
    • APE_DES: 1
    • APE_ENV: 1
    • APE_INT: 1
    • APE_OBJ: 1
    • APE_REQ: 1
    • APE_SRE: 1
  • ASE:
    • ASE_DES: 1
    • ASE_ENV: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_PPC: 1
    • ASE_REQ: 1
    • ASE_SRE: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 2
    • ATE_DPT: 2
    • ATE_FUN: 2
    • ATE_IND: 2
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 5
    • AVA_SOF: 3
    • AVA_VAN.4: 1
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 5
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 3
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1123: 1
    • RFC1579: 1
    • RFC1635: 1
    • RFC2228: 1
    • RFC2389: 1
    • RFC2577: 1
    • RFC854: 1
    • RFC959: 1
  • BSI:
    • AIS 34: 4
    • AIS 38: 1
  • ISO:
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 1
    • ISO/IEC 7816-8: 4
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 5, 2009-12-15, EVALUATION TECHNICAL REPORT (ETR), TÜV Informationstechnik GmbH (confidential document) [8] Configuration list for the TOE, Version 3.10, 2009-08-28, Configuration Item Record: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /CreationDate: D:20100308113143+01'00'
  • /Creator: Writer
  • /Keywords: "SCM Microsystems GmbH, smart card reader SPR332 firmware version 6.01, class 2 smart card reader"
  • /ModDate: D:20100309113000+01'00'
  • /Producer: OpenOffice.org 3.1
  • /Subject: Common Criteria Certification
  • /Title: Certification Report BSI-DSZ-CC-0592-2010
  • pdf_file_size_bytes: 756117
  • pdf_hyperlinks: https://www.bsi.bund.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 34
pdf_data/st_filename st_vid4035-st.pdf 0592b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0592: 46
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 2
    • EAL 4: 14
    • EAL 4 augmented: 13
  • EAL:
    • EAL3: 3
    • EAL3+: 2
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 9
    • ACM_CAP: 1
    • ACM_CAP.4: 19
    • ACM_SCP: 1
    • ACM_SCP.2: 6
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 8
    • ADO_IGS: 1
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 10
    • ADV_HLD: 1
    • ADV_HLD.2: 14
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_LLD: 1
    • ADV_LLD.1: 15
    • ADV_RCR: 1
    • ADV_RCR.1: 5
    • ADV_SPM: 1
    • ADV_SPM.1: 9
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 12
    • AGD_USR: 1
    • AGD_USR.1: 10
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.1: 7
    • ALC_FLR: 1
    • ALC_FLR.2: 26
    • ALC_LCD: 1
    • ALC_LCD.1: 7
    • ALC_TAT: 1
    • ALC_TAT.1: 8
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 6
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 10
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.2: 13
    • AVA_SOF: 1
    • AVA_SOF.1: 7
    • AVA_VLA: 1
    • AVA_VLA.2: 13
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 2
    • ALC_TAT: 1
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 3
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
    • FAU_SEL: 1
    • FAU_SEL.1: 5
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.2: 1
    • FAU_STG.3: 5
    • FAU_STG.3.1: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 6
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP: 14
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 29
    • FMT_MTD.1: 1
    • FMT_REV: 16
    • FMT_SMF: 2
    • FMT_SMR: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 5
    • FPT_AMT.1.1: 1
    • FPT_RVM: 1
    • FPT_RVM.1: 5
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.4: 4
    • FCS_COP: 16
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 7
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ITC.1: 4
    • FDP_RIP: 1
    • FDP_RIP.2: 6
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MSA.2: 4
    • FMT_MSA.3: 2
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 6
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 6
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 2
    • A.COOP: 1
    • A.LOCATE: 2
    • A.MANAGE: 1
    • A.NO_EVIL_ADM: 2
    • A.PEER: 1
    • A.PROTECT: 2
  • O:
    • O.AUDITING: 3
    • O.AUTHORIZATION: 2
    • O.CREDEN: 2
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENFORCEMENT: 2
    • O.INSTALL: 2
    • O.MANAGE: 3
    • O.PHYSICAL: 2
    • O.RESIDUAL_INFORMATION: 2
  • O:
    • O.DOWNLOAD: 3
    • O.INS_BYTE: 4
    • O.REVEAL: 5
    • O.SEAL: 5
    • O.SIGNAL: 4
    • O.STORE: 3
    • O.TRANSFER: 2
  • OE:
    • OE.FWLOAD: 3
    • OE.ISO_EMV: 1
    • OE.KEYPAD: 1
    • OE.LED: 2
    • OE.SEAL: 3
    • OE.SIG_APP: 1
    • OE.STORE: 2
    • OE.UNOBSERV: 1
    • OE.USAGE: 2
    • OE.VERSION: 1
  • OP:
    • OP.F_DOWNLD: 2
    • OP.L_CONTROL: 2
    • OP.P_ENTRY: 2
    • OP.P_VERIFY: 1
  • T:
    • T.DOWNLOAD: 3
    • T.REVEAL: 3
    • T.SEAL: 2
    • T.STORE: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 7
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 7500: 1
    • BSI 7586: 2
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • CC:
    • CCMB-2005-08-004: 1
  • FIPS:
    • FIPS180-2: 2
  • ISO:
    • ISO/IEC 10118-3: 1
    • ISO/IEC 14888-: 1
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 15
  • PKCS:
    • PKCS #1: 2
pdf_data/st_metadata
  • /Author: SCM Microsystems GmbH
  • /CreationDate: D:20090903094043Z
  • /Creator: FreePDF XP 3.24 - http://shbox.de
  • /Keywords: smart card reader, evaluation, SPR332, Common Criteria, Security Target
  • /ModDate: D:20100308145215+01'00'
  • /Producer: AFPL Ghostscript 8.54
  • /Subject: Security Target for the smart card reader SPR 332
  • /Title: Security_Target_SPR332_135
  • pdf_file_size_bytes: 315728
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 46
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different