Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701
CRP240
Cisco Aggregation Service Router (ASR) 900 Series (902, 903, and 920) running IOS-XE 3.13.(1)S
CCEVS-VR-VID-10599-2015
name Sony IC with Operating System for Mobile CXD3715GG/GU-x, version 0701 Cisco Aggregation Service Router (ASR) 900 Series (902, 903, and 920) running IOS-XE 3.13.(1)S
category ICs, Smart Cards and Smart Card-Related Devices and Systems Network and Network-Related Devices and Systems
scheme UK US
not_valid_after 30.04.2013 03.04.2017
not_valid_before 24.01.2006 03.04.2015
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP240.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10599-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ST%20Public%20v1.04.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10599-st.pdf
manufacturer Sony Corporation Cisco Systems, Inc.
manufacturer_web https://www.sony.com/ https://www.cisco.com
security_level EAL4 {}
dgst 794b142b57afbe13 3698215c0f641ff5
heuristics/cert_id CRP240 CCEVS-VR-VID-10599-2015
heuristics/cert_lab [] US
heuristics/extracted_sars ADV_LLD.1, AVA_MSU.2, ALC_LCD.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, ATE_IND.2, ATE_FUN.1, ADV_RCR.1, ATE_DPT.1, AVA_SOF.1, AVA_VLA.2, AGD_USR.1, ATE_COV.2, ADV_HLD.2, ADV_IMP.1, ADV_SPM.1, ALC_DVS.1 AGD_PRE.1, ALC_CMC.1, AGD_OPE.1, ATE_IND.1, ALC_CMS.1, AVA_VAN.1, ADV_FSP.1
heuristics/extracted_versions 0701 3.13
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10599/
  • categories: ['Network Device', ' Network Switch', ' Router']
  • category: Network Device
  • certification_date: 03.04.2015
  • evaluation_facility: Acumen Security
  • expiration_date: 03.04.2017
  • id: CCEVS-VR-VID10599
  • product: Cisco Aggregation Service Router (ASR) 900 Series (902, 903, and 920) running IOS-XE 3.13.(1)S
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10599
  • vendor: Cisco Systems, Inc.
heuristics/protection_profiles {} ac9abe3d5c5a31f0
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_nd_v1.1.pdf
pdf_data/report_filename CRP240.pdf st_vid10599-vr.pdf
pdf_data/report_frontpage
  • US:
  • US:
    • cert_id: CCEVS-VR-VID10599-2015
    • cert_item: Cisco Systems, Inc. 170 W. Tasman Dr., San Jose, CA 95134 Cisco Aggregation Services Router (ASR) 900 Series
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • UK:
    • CERTIFICATION REPORT No. P240: 1
  • US:
    • CCEVS-VR-VID10599-2015: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL1: 1
    • EAL4: 18
    • EAL7: 1
  • EAL:
    • EAL 1: 6
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 57
    • Cisco Systems: 2
    • Cisco Systems, Inc: 3
pdf_data/report_keywords/eval_facility
  • Acumen:
    • Acumen Security: 4
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 1
    • DES:
      • DES: 2
  • AES_competition:
    • AES:
      • AES: 3
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
pdf_data/report_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 2
  • IPsec:
    • IPsec: 13
  • SSH:
    • SSH: 9
    • SSHv2: 6
  • VPN:
    • VPN: 4
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 1
  • RNG:
    • RBG: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCIMB-2004-01-001: 1
    • CCIMB-2004-01-002: 1
    • CCIMB-2004-01-003: 1
    • CCIMB-2004-01-004: 1
  • FIPS:
    • FIPS 140-2: 1
  • NIST:
    • SP 800-90: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • by Common Criteria EAL4. However the configuration and personalisation of the TOE by the issuer is out of scope,as is the operation of the transport or payment scheme etc. 14. The contactless and contact: 1
    • interfaces. The reader/writer device, host device and any other supporting IT infrastructure are out of scope. The TOE comprises the operating system and IC hardware (Mask ROM, SRAM, EEPROM, Logic circuits and: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: CESG
  • /CreationDate: D:20060208162208Z
  • /Creator: cp240_cr_1.02 - Microsoft Word
  • /ModDate: D:20120106121536Z
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Subject: COMMON CRITERIA CERTIFICATION REPORT No. P240 SONY IC Chip with Operating System for Mobile CXD3715GG/GU-x Version 0701 has been evaluated under the terms of the Scheme and complies with the requirements for EAL4 COMMON CRITERIA (ISO 15408) ASSURANCE LEVEL
  • /Title: CRP240
  • pdf_file_size_bytes: 55971
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
  • /CreationDate: D:20150406151410-04'00'
  • /ModDate: D:20150406151410-04'00'
  • pdf_file_size_bytes: 731937
  • pdf_hyperlinks: http://www.cisco.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 29
pdf_data/st_filename ST Public v1.04.pdf st_vid10599-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 34
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 4
    • ACM_CAP.3: 1
    • ACM_CAP.4: 4
    • ACM_SCP.2: 6
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 4
  • ADV:
    • ADV_FSP.1: 7
    • ADV_FSP.2: 4
    • ADV_HLD.1: 2
    • ADV_HLD.2: 4
    • ADV_IMP.1: 5
    • ADV_LLD.1: 5
    • ADV_RCR.1: 6
    • ADV_SPM.1: 9
  • AGD:
    • AGD_ADM.1: 8
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 5
    • ALC_LCD.1: 4
    • ALC_TAT.1: 5
  • ATE:
    • ATE_COV.2: 4
    • ATE_DPT.1: 3
    • ATE_FUN.1: 6
    • ATE_IND.2: 4
  • AVA:
    • AVA_MSU.2: 4
    • AVA_SOF.1: 4
    • AVA_VLA.2: 6
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 18
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 2
    • FCS_COP.1: 32
    • FCS_COP.1.1: 2
    • FCS_IFC.1: 2
    • FCS_RNG: 2
    • FCS_RNG.1: 10
    • FCS_RNG.1.1: 10
  • FDP:
    • FDP_ACC.1: 24
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 21
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.1: 9
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 1
    • FDP_IFC.1: 35
    • FDP_IFF.1: 16
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 13
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 13
    • FDP_ITT.1.1: 1
    • FDP_SDI.1: 13
    • FDP_SDI.1.1: 1
    • FDP_UCT.1: 9
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 9
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_MOF.1: 8
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 13
    • FMT_MSA.2: 15
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 13
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 10
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 9
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_MTD.3: 9
    • FMT_MTD.3.1: 1
    • FMT_PUT: 1
    • FMT_PUT.1: 18
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 30
    • FPT_FSL.1: 1
    • FPT_ITC.1: 9
    • FPT_ITC.1.1: 1
    • FPT_ITI.1: 11
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.3: 11
    • FPT_PHP.3.1: 1
    • FPT_RCV.4: 13
    • FPT_RCV.4.1: 1
    • FPT_RPL.1: 11
    • FPT_RPL.1.1: 1
    • FPT_RPL.1.2: 1
    • FPT_SEP.1: 11
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_TDC.1: 9
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
  • FRU:
    • FRU_FLT.1: 16
    • FRU_FLT.1.1: 1
  • FTP:
    • FTP_ITC: 3
    • FTP_ITC.1: 20
    • FTP_ITC.1.1: 2
    • FTP_ITC.1.2: 3
    • FTP_ITC.1.3: 2
    • FTP_TRP.1: 2
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 4
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM_EXT.4: 5
    • FCS_CKM_EXT.4.1: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSH_EXT.1: 3
    • FCS_SSH_EXT.1.1: 1
    • FCS_SSH_EXT.1.2: 1
    • FCS_SSH_EXT.1.3: 1
    • FCS_SSH_EXT.1.4: 1
    • FCS_SSH_EXT.1.5: 1
    • FCS_SSH_EXT.1.6: 1
    • FCS_SSH_EXT.1.7: 1
  • FDP:
    • FDP_RIP.2: 4
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_PSK_EXT: 1
    • FIA_PSK_EXT.1: 3
    • FIA_PSK_EXT.1.1: 1
    • FIA_PSK_EXT.1.2: 1
    • FIA_PSK_EXT.1.3: 1
    • FIA_UAU.7: 4
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 4
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_APW_EXT.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 4
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_GENERAL_PURPOSE: 1
    • A.PHYSICAL: 1
    • A.TRUSTED_ADMIN: 1
  • O:
    • O.DISPLAY_BANNER: 1
    • O.PROTECTED_COMMUNICATIONS: 1
    • O.RESIDUAL_INFORMATION_CLEARING: 1
    • O.SESSION_LOCK: 1
    • O.SYSTEM_MONITORING: 1
    • O.TOE_ADMINISTRATION: 1
    • O.TSF_SELF_TEST: 1
    • O.VERIFIABLE_UPDATES: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.ADMIN_ERROR: 1
    • T.TSF_FAILURE: 1
    • T.UNAUTHORIZED_ACCESS: 1
    • T.UNAUTHORIZED_UPDATE: 1
    • T.UNDETECTED_ACTIONS: 1
    • T.USER_DATA_REUSE: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 40
    • Cisco Systems, Inc: 2
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • Triple-DES: 5
    • DES:
      • DES: 44
  • AES_competition:
    • AES:
      • AES: 12
  • constructions:
    • MAC:
      • HMAC: 4
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DH:
      • DH: 7
      • Diffie-Hellman: 3
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
    • SHA2:
      • SHA-256: 4
      • SHA-384: 2
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 32
    • IKEv1: 7
  • IPsec:
    • IPsec: 49
  • SSH:
    • SSH: 29
    • SSHv2: 14
  • VPN:
    • VPN: 9
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 4
  • RNG:
    • RBG: 4
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
  • CBC:
    • CBC: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 7
    • malfunction: 18
  • SCA:
    • DPA: 4
    • Physical Probing: 11
    • SPA: 2
    • physical probing: 8
  • other:
    • JIL: 2
    • reverse engineering: 2
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS 20: 2
    • AIS20: 2
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 5
    • FIPS 180-3: 1
    • FIPS 186-2: 1
    • FIPS PUB 140-2: 1
    • FIPS PUB 180-3: 2
    • FIPS PUB 186-2: 2
    • FIPS PUB 186-3: 5
    • FIPS PUB 197: 1
    • FIPS PUB 198-1: 1
  • NIST:
    • NIST SP 800-38A: 2
    • NIST SP 800-38D: 1
    • NIST SP 800-56B: 1
    • SP 800-90: 2
    • SP 900-90A: 1
  • RFC:
    • RFC 3602: 2
    • RFC 4109: 1
    • RFC 4253: 1
    • RFC 4301: 1
    • RFC 4303: 1
    • RFC 6379: 1
pdf_data/st_metadata
  • /Author: katoh
  • /CreationDate: D:20130430143756+01'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130430143756+01'00'
  • /Producer: Microsoft® Office Word 2007
  • /Subject: 英文
  • /Title: CXD3715GG/GU-x Security Target
  • pdf_file_size_bytes: 861962
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 126
  • /Author: Cisco Systems, Inc.
  • /CreationDate: D:20150326171738-04'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150406150640-04'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 1363266
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 52
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different