Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IBM i5/OS V5R3MO running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930
CCEVS-VR-0111-2005
KOMSCO JK41 V1.0 ADV on S3FT9PS
KECS-ISIS-0798-2017
name IBM i5/OS V5R3MO running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930 KOMSCO JK41 V1.0 ADV on S3FT9PS
category Operating Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US KR
not_valid_after 06.09.2012 21.06.2022
not_valid_before 10.08.2005 21.06.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4035-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-CR-17-34%20KOMSCO%20JK41%20V1.0%20ADV%20on%20S3FT9PS(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid4035-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK41-TR-0005]%20Security%20Target(ADV)-Lite-e-v1.0.pdf
manufacturer IBM Corporation KOMSCO
manufacturer_web https://www.ibm.com https://www.komsco.com
security_level EAL4+, ALC_FLR.2 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 7137e693dbc035de c8ccfdd85b7d0eef
heuristics/cert_id CCEVS-VR-0111-2005 KECS-ISIS-0798-2017
heuristics/cert_lab US []
heuristics/extracted_sars ADV_RCR.1, AVA_VLA.2, ADV_HLD.2, AGD_USR.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 570, 520, 1930, 550 1.0
heuristics/report_references/directly_referencing {} ANSSI-CC-2014/58
heuristics/report_references/indirectly_referencing {} ANSSI-CC-2014/37, ANSSI-CC-2014/58, ANSSI-CC-2013/23
heuristics/scheme_data
  • category: Operating System
  • certification_date: 10.08.2005
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date:
  • id: CCEVS-VR-VID4035
  • product: IBM i5/OS V5R3M0 running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930
  • scheme: US
  • url: https://www.niap-ccevs.org/product/4035
  • vendor: IBM Corporation
heuristics/st_references/directly_referencing {} ANSSI-CC-2014/59
heuristics/st_references/indirectly_referencing {} ANSSI-CC-2014/59
heuristics/protection_profiles {} 17c3a7837f653cc7
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[KECS-PP-0097a-2008] (CC V3.1R3) Smart Card Open Platform PP V2.2.pdf
pdf_data/report_filename st_vid4035-vr.pdf KECS-CR-17-34 KOMSCO JK41 V1.0 ADV on S3FT9PS(eng).pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-05-0111
    • cert_item: IBM Rochester, MN IBM i5/OS V5R3M0 running on IBM eServer models 520, 550, and 570 with Software Feature Code 1930
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-05-0111: 1
  • FR:
    • ANSSI-CC-2014/58: 4
    • ANSSI-CC-2014/58-S02: 1
  • KR:
    • KECS-ISIS-0798-2017: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 11
    • EAL 4 augmented: 3
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL 5+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • AVA:
    • AVA_VLA.2: 2
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/vendor
  • Samsung:
    • Samsung: 6
pdf_data/report_keywords/eval_facility
  • TTA:
    • TTA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 7
pdf_data/report_keywords/randomness
  • TRNG:
    • DTRNG: 1
    • TRNG: 3
pdf_data/report_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • RFC:
    • RFC1123: 1
    • RFC1579: 1
    • RFC1635: 1
    • RFC2228: 1
    • RFC2389: 1
    • RFC2577: 1
    • RFC854: 1
    • RFC959: 1
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 7816: 4
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/report_metadata
  • /Author: 이은경
  • /CreationDate: D:20170621105101+09'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20170621105101+09'00'
  • /Producer: Microsoft® Word 2013
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 451378
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 23
pdf_data/st_filename st_vid4035-st.pdf [JK41-TR-0005] Security Target(ADV)-Lite-e-v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • FR:
    • ANSSI-CC-2014/59: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 3: 2
    • EAL 4: 14
    • EAL 4 augmented: 13
  • EAL:
    • EAL 5+: 1
    • EAL4: 2
    • EAL5: 12
    • EAL5+: 14
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 9
    • ACM_CAP: 1
    • ACM_CAP.4: 19
    • ACM_SCP: 1
    • ACM_SCP.2: 6
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 8
    • ADO_IGS: 1
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP: 1
    • ADV_FSP.2: 10
    • ADV_HLD: 1
    • ADV_HLD.2: 14
    • ADV_IMP: 1
    • ADV_IMP.1: 7
    • ADV_LLD: 1
    • ADV_LLD.1: 15
    • ADV_RCR: 1
    • ADV_RCR.1: 5
    • ADV_SPM: 1
    • ADV_SPM.1: 9
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 12
    • AGD_USR: 1
    • AGD_USR.1: 10
  • ALC:
    • ALC_DVS: 1
    • ALC_DVS.1: 7
    • ALC_FLR: 1
    • ALC_FLR.2: 26
    • ALC_LCD: 1
    • ALC_LCD.1: 7
    • ALC_TAT: 1
    • ALC_TAT.1: 8
  • ATE:
    • ATE_COV: 1
    • ATE_COV.2: 6
    • ATE_DPT: 1
    • ATE_DPT.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 10
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.2: 13
    • AVA_SOF: 1
    • AVA_SOF.1: 7
    • AVA_VLA: 1
    • AVA_VLA.2: 13
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 20
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 18
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 20
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR: 3
    • FAU_SAR.1: 5
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 5
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 5
    • FAU_SAR.3.1: 1
    • FAU_SEL: 1
    • FAU_SEL.1: 5
    • FAU_SEL.1.1: 1
    • FAU_STG: 3
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.2: 1
    • FAU_STG.3: 5
    • FAU_STG.3.1: 1
    • FAU_STG.4: 5
    • FAU_STG.4.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 6
    • FDP_ACC.1.1: 2
    • FDP_ACF: 1
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_RIP: 14
  • FIA:
    • FIA_ATD: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 2
    • FIA_SOS: 1
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.1: 3
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA: 2
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 5
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 29
    • FMT_MTD.1: 1
    • FMT_REV: 16
    • FMT_SMF: 2
    • FMT_SMR: 1
    • FMT_SMR.1: 6
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT: 1
    • FPT_AMT.1: 5
    • FPT_AMT.1.1: 1
    • FPT_RVM: 1
    • FPT_RVM.1: 5
    • FPT_RVM.1.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 5
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1: 5
    • FPT_STM.1.1: 1
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 21
    • FCS_CKM.1.1: 2
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 18
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 32
    • FCS_COP.1.1: 6
    • FCS_RNG: 1
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC.1: 11
    • FDP_ITC.2: 11
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 15
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 3
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
    • FPT_RCV.2: 1
    • FPT_RCV.3: 5
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 4
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.CONNECT: 2
    • A.COOP: 1
    • A.LOCATE: 2
    • A.MANAGE: 1
    • A.NO_EVIL_ADM: 2
    • A.PEER: 1
    • A.PROTECT: 2
  • O:
    • O.AUDITING: 3
    • O.AUTHORIZATION: 2
    • O.CREDEN: 2
    • O.DISCRETIONARY_ACCESS: 3
    • O.ENFORCEMENT: 2
    • O.INSTALL: 2
    • O.MANAGE: 3
    • O.PHYSICAL: 2
    • O.RESIDUAL_INFORMATION: 2
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 5
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 8
    • OP.INSTALL: 8
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 9
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
pdf_data/st_keywords/vendor
  • Samsung:
    • Samsung: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 10
  • DES:
    • 3DES:
      • TDES: 17
    • DES:
      • DES: 3
  • constructions:
    • MAC:
      • HMAC: 1
  • miscellaneous:
    • ARIA:
      • ARIA: 8
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 16
    • ECDH:
      • ECDH: 3
    • ECDSA:
      • ECDSA: 8
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 5
    • SHA2:
      • SHA-224: 3
      • SHA-256: 2
pdf_data/st_keywords/crypto_scheme
  • KA:
    • Key Agreement: 3
    • Key agreement: 1
  • MAC:
    • MAC: 9
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 1
  • TRNG:
    • DTRNG: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 2
  • GCM:
    • GCM: 2
pdf_data/st_keywords/crypto_engine
  • TORNADO:
    • TORNADO: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • ISO:
    • ISO/IEC 15408: 2
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
  • BSI:
    • AIS 31: 1
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
  • FIPS:
    • FIPS 180-3: 1
    • FIPS 197: 2
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 15946-: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS#1: 4
  • SCP:
    • SCP 02: 1
    • SCP02: 17
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 8
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the FLASH of IC Chip. That is out of scope in the ST. 1.4.3 Logical Scope of TOE The TOE is the Javacard Platform that supports the analysis: 1
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different