Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers
CCEVS-VR-VID-10338-2009
Data Overwrite Security Unit Type C Software V0.04
JISEC-CC-CRP-C0047
name Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers Data Overwrite Security Unit Type C Software V0.04
category Operating Systems Other Devices and Systems
scheme US JP
not_valid_after 15.01.2015 07.10.2013
not_valid_before 23.12.2009 29.03.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10338-vr.pdf https://www.commoncriteriaportal.org/files/epfiles/c0047_ecvr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10338-st.pdf https://www.commoncriteriaportal.org/files/epfiles/
manufacturer Dell, Inc. Ricoh Company, Ltd.
manufacturer_web https://www.dell.com
security_level EAL4+, ALC_FLR.3 EAL2
dgst 7600914e4a2387a5 64aa4eaa32af4dba
heuristics/cert_id CCEVS-VR-VID-10338-2009 JISEC-CC-CRP-C0047
heuristics/cert_lab US []
heuristics/extracted_sars ADV_ARC.1, AGD_OPE.1, ALC_FLR.3 {}
heuristics/extracted_versions 5.3 0.04
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10338/
  • categories: ['Operating System']
  • category: Operating System
  • certification_date: 23.12.2009
  • evaluation_facility: atsec information security corporation
  • expiration_date: 25.02.2015
  • id: CCEVS-VR-VID10338
  • product: Red Hat Enterprise Linux Ver. 5.3 on Dell 11G Family Servers
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10338
  • vendor: Dell Technologies Inc.
  • cert_id: JISEC-CC-CRP-C0047
  • certification_date: 01.03.2006
  • claim: EAL2
  • enhanced:
    • assurance_level: EAL2
    • cert_link: https://www.ipa.go.jp/en/security/c0047_eimg.pdf
    • description: PRODUCT DESCRIPTION This product, an optional kit of safer use for Multi Function Product, overwrites the specified area on HDD with random data by Multi Function Product.
    • evaluation_facility: Electronic Commerce Security Technology Laboratory Inc.Evaluation Center
    • product: DataOverwriteSecurity Unit Type C Software
    • product_type: IT Product ( software to overwrite data )
    • toe_version: V0.04
    • vendor: RICOH COMPANY, LTD.
  • expiration_date: 01.10.2013
  • supplier: Ricoh Company, Ltd.
  • toe_japan_name: DataOverwriteSecurity Unit Type D Software V0.04
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0047_it5061.html
  • toe_overseas_name: DataOverwriteSecurity Unit Type C Software V0.04
heuristics/protection_profiles 540269ad0d7bcfe0 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_OS_CA_V1.d.pdf {}
pdf_data/report_filename st_vid10338-vr.pdf c0047_ecvr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10338-2009
    • cert_item: Dell 11th Generation PowerEdge Servers running Red Hat Enterprise Linux 5.3
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10338-2009: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 2
    • EAL4: 2
    • EAL4 augmented: 1
  • EAL:
    • EAL2: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
  • ALC:
    • ALC_FLR.3: 3
  • ATE:
    • ATE_FUN: 1
pdf_data/report_keywords/cc_sfr
  • FPT:
    • FPT_RVM: 1
    • FPT_RVM.1: 1
    • FPT_SEP: 1
    • FPT_SEP.1: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 4
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 4
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 2
    • SSHv2: 2
  • TLS:
    • SSL:
      • SSL: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 2
pdf_data/report_metadata
  • /Author: Don Phillips
  • /CreationDate: D:20100129130318
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20100129130318
  • /Producer: Microsoft® Office Word 2007
  • /Title: Validators Report
  • pdf_file_size_bytes: 365994
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
  • /CreationDate: D:20060329200104+09'00'
  • /ModDate: D:20060329200104+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 12304
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/st_filename st_vid10338-st.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 1
    • EAL4: 6
    • EAL4 augmented: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 8
  • AGD:
    • AGD_OPE.1: 1
  • ALC:
    • ALC_FLR.3: 5
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 7
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 10
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 9
    • FAU_SAR.3.1: 1
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 1
    • FAU_STG.1: 9
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 9
    • FAU_STG.3.1: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 20
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 22
    • FCS_CKM.2.1: 4
    • FCS_CKM.4: 4
    • FCS_COP.1: 19
    • FCS_COP.1.1: 3
  • FDP:
    • FDP_ACC.1: 29
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_ETC.2: 9
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 13
    • FDP_IFC.1.1: 1
    • FDP_IFC.2: 1
    • FDP_IFF.1: 4
    • FDP_IFF.2: 7
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 1
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_ITC.1: 10
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITC.2: 9
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_RIP.2: 12
    • FDP_RIP.2.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 9
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 1
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.7: 9
    • FIA_UAU.7.1: 1
    • FIA_UID: 1
    • FIA_UID.1: 5
    • FIA_UID.2: 13
    • FIA_UID.2.1: 1
    • FIA_USB.1: 20
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 36
    • FMT_MSA.1.1: 6
    • FMT_MSA.2: 13
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 30
    • FMT_MSA.3.1: 4
    • FMT_MSA.3.2: 3
    • FMT_MTD.1: 60
    • FMT_MTD.1.1: 6
    • FMT_MTD.3: 10
    • FMT_MTD.3.1: 1
    • FMT_REV.1: 21
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF: 1
    • FMT_SMF.1: 26
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.2: 19
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_RCV.1: 9
    • FPT_RCV.1.1: 1
    • FPT_RCV.4: 8
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 1
    • FPT_SEP.1: 1
    • FPT_STM.1: 9
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TEE.1: 10
    • FPT_TEE.1.1: 1
    • FPT_TEE.1.2: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_LSA.1: 8
    • FTA_LSA.1.1: 1
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_ITC.1: 14
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 2
    • A.ASSET: 2
    • A.CLEARANCE: 2
    • A.CONNECT: 6
    • A.COOP: 2
    • A.LOCATE: 2
    • A.MANAGE: 4
    • A.NET_COMP: 3
    • A.NO_EVIL_ADMIN: 3
    • A.OWNER: 2
    • A.PEER: 2
    • A.PROTECT: 4
    • A.SENSITIVITY: 2
    • A.UTRAIN: 2
    • A.UTRUST: 2
  • O:
    • O.AUDITING: 17
    • O.AUTHORIZATION: 15
    • O.COMPROT: 20
    • O.DISCRETIONARY_ACCESS: 12
    • O.DUTY: 5
    • O.ENFORCEMENT: 7
    • O.HIERARCHICAL: 5
    • O.MANAGE: 28
    • O.MANDATORY_ACCESS: 16
    • O.RESIDUAL_INFO: 7
    • O.ROLE: 16
  • OE:
    • OE.ADMIN: 5
    • OE.CREDEN: 3
    • OE.INFO_PROTECT: 11
    • OE.INSTALL: 7
    • OE.MAINTENANCE: 4
    • OE.PHYSICAL: 5
    • OE.PROTECT: 6
    • OE.RECOVER: 5
    • OE.SERIAL_LOGIN: 3
    • OE.SOFTWARE_IN: 4
  • T:
    • T.ACCESS: 3
    • T.COMPROT: 2
    • T.OPERATE: 2
    • T.ROLEDEV: 4
    • T.UAUSER: 3
pdf_data/st_keywords/vendor
pdf_data/st_keywords/eval_facility
  • atsec:
    • atsec: 75
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
    • CAST:
      • CAST: 1
  • DES:
    • 3DES:
      • 3DES: 1
  • constructions:
    • MAC:
      • HMAC: 1
  • miscellaneous:
    • Blowfish:
      • Blowfish: 1
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 2
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 1
  • MAC:
    • MAC: 24
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 6
  • SSH:
    • SSH: 19
    • SSHv2: 5
  • TLS:
    • SSL:
      • SSL: 15
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 5
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_RSA_WITH_AES_128_CBC_SHA: 1
    • TLS_RSA_WITH_AES_256_CBC_SHA: 1
pdf_data/st_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 6
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 8
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCIMB-2006-09-001: 1
    • CCIMB-2006-09-003: 1
    • CCIMB-2006-09-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • PKCS:
    • PKCS #1: 2
    • PKCS#1: 1
  • RFC:
    • RFC 2246: 1
  • X509:
    • X.509: 3
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • outside of the TOE, such as the hypervisor’s enforcement of separation between guest VMs, is out of scope for this Security Target. 1.5.3.3 TOE Environment Several TOE systems may be interlinked in a: 1
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok True False
state/st/download_ok True False
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different