Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
IOGEAR Secure KVM Switch Series (CAC Models)
CCEVS-VR-VID-11223-2022
Apple iOS 13 and iPadOS 13: Safari
CCEVS-VR-VID-11060-2020
name IOGEAR Secure KVM Switch Series (CAC Models) Apple iOS 13 and iPadOS 13: Safari
status active archived
not_valid_after 10.03.2027 05.06.2022
not_valid_before 10.03.2022 05.06.2020
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11223-ci.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11060-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11223-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11060-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11223-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11060-st.pdf
manufacturer IOGEAR Apple Inc.
manufacturer_web https://www.iogear.com https://www.apple.com/
dgst 7a5bf24e33fc9978 de8d00912d90562c
heuristics/cert_id CCEVS-VR-VID-11223-2022 CCEVS-VR-VID-11060-2020
heuristics/extracted_sars AGD_PRE.1, ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_SPD.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_OBJ.2, ASE_CCL.1, ASE_ECD.1, ASE_REQ.2 ASE_TSS.1, ADV_FSP.1, ALC_CMC.1, ASE_INT.1, ASE_OBJ.1, AVA_VAN.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, ASE_REQ.1, ASE_CCL.1, ASE_ECD.1, ALC_TSU_EXT.1, AGD_PRE.1
heuristics/extracted_versions - 13
heuristics/scheme_data
  • category: Application Software
  • certification_date: 05.06.2020
  • evaluation_facility: Acumen Security
  • expiration_date: 05.06.2022
  • id: CCEVS-VR-VID11060
  • product: Apple iOS 13 and iPadOS 13: Safari
  • scheme: US
  • url: https://www.niap-ccevs.org/product/11060
  • vendor: Apple Inc.
heuristics/protection_profiles 76f8f05a35d87f59, 9d5c0dd877473e05, 42cf355b24450489, 814f66c77bc7f33b, 48f73a122587b992 a1cc4a4e079f4d1f, c5080f741829d2e9
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ao_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_ua_v1.0.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_vi_v1.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/PP_APP_v1.3.pdf, https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_app_webbrowser_ep_v2.0.pdf
pdf_data/cert_filename st_vid11223-ci.pdf st_vid11060-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11223-2022: 1
  • US:
    • CCEVS-VR-VID11060-2020: 1
pdf_data/cert_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
pdf_data/cert_keywords/eval_facility
  • Leidos:
    • Leidos: 1
  • Acumen:
    • Acumen Security: 1
pdf_data/cert_metadata
  • /CreationDate: D:20220315183845-04'00'
  • /ModDate: D:20220315183845-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
  • /CreationDate: D:20200615115354-04'00'
  • /ModDate: D:20200615115354-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 182661
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11223-vr.pdf st_vid11060-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11223-2022
    • cert_item: for IOGEAR Secure KVM Switch Series (CAC Models
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID11060-2020
    • cert_item: for the Apple iOS and iPadOS 13 Safari
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11223-2022: 1
  • US:
    • CCEVS-VR-VID11060-2020: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 1
  • FDP:
    • FDP_AFL_EXT.1: 2
    • FDP_APC_EXT.1: 3
    • FDP_CDS_EXT.1: 1
    • FDP_FIL_EXT: 1
    • FDP_IPC_EXT.1: 3
    • FDP_RIP: 1
    • FDP_RIP_EXT.2: 1
    • FDP_SPR_EXT: 3
    • FDP_SWI_EXT.2: 1
    • FDP_SWI_EXT.3: 1
    • FDP_TER_EXT.2: 1
    • FDP_TER_EXT.3: 1
  • FIA:
    • FIA_UAU.2: 1
    • FIA_UID.2: 1
  • FMT:
    • FMT_MOF.1: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 1
  • FPT:
    • FPT_PHP.3: 3
    • FPT_STM.1: 1
  • FTA:
    • FTA_CIN_EXT.1: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 2
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
    • T.SAME-: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Leidos:
    • Leidos: 7
  • Acumen:
    • Acumen Security: 5
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/report_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/report_metadata
  • /Author: ppatin
  • /CreationDate: D:20200615114252-04'00'
  • /Creator: Microsoft® Word 2013
  • /ModDate: D:20200615114252-04'00'
  • /Producer: Microsoft® Word 2013
  • pdf_file_size_bytes: 914536
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
pdf_data/st_filename st_vid11223-st.pdf st_vid11060-st.pdf
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.1: 1
    • ALC_CMS.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
    • ALC_TSU_EXT.1: 2
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 7
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
  • FDP:
    • FDP_AFL_EXT.1: 8
    • FDP_AFL_EXT.1.1: 1
    • FDP_APC_EXT: 8
    • FDP_APC_EXT.1: 23
    • FDP_CDS_EXT.1: 9
    • FDP_CDS_EXT.1.1: 2
    • FDP_FIL_EXT: 16
    • FDP_FIL_EXT.1: 6
    • FDP_IPC_EXT.1: 10
    • FDP_IPC_EXT.1.1: 1
    • FDP_IPC_EXT.1.2: 1
    • FDP_PDC_EXT: 53
    • FDP_PDC_EXT.1: 7
    • FDP_PDC_EXT.1.1: 1
    • FDP_PDC_EXT.1.2: 1
    • FDP_PDC_EXT.1.3: 1
    • FDP_PDC_EXT.1.4: 1
    • FDP_PDC_EXT.1.5: 1
    • FDP_PDC_EXT.2: 8
    • FDP_PDC_EXT.3: 8
    • FDP_PDC_EXT.4: 7
    • FDP_PDC_EXT.4.1: 1
    • FDP_PUD_EXT.1: 7
    • FDP_PUD_EXT.1.1: 1
    • FDP_PWR_EXT.1: 7
    • FDP_PWR_EXT.1.1: 1
    • FDP_RIP: 8
    • FDP_RIP.1: 1
    • FDP_RIP_EXT.1: 7
    • FDP_RIP_EXT.1.1: 1
    • FDP_RIP_EXT.2: 9
    • FDP_RIP_EXT.2.1: 1
    • FDP_SPR_EXT: 24
    • FDP_SPR_EXT.1: 3
    • FDP_SWI_EXT.1: 7
    • FDP_SWI_EXT.1.1: 1
    • FDP_SWI_EXT.2: 9
    • FDP_SWI_EXT.2.1: 1
    • FDP_SWI_EXT.2.2: 1
    • FDP_SWI_EXT.3: 8
    • FDP_SWI_EXT.3.1: 1
    • FDP_TER_EXT.1: 7
    • FDP_TER_EXT.1.1: 1
    • FDP_TER_EXT.2: 9
    • FDP_TER_EXT.2.1: 1
    • FDP_TER_EXT.3: 9
    • FDP_TER_EXT.3.1: 1
    • FDP_TER_EXT.3.2: 1
    • FDP_UAI_EXT.1: 7
    • FDP_UAI_EXT.1.1: 1
    • FDP_UDF_EXT: 21
    • FDP_UDF_EXT.1: 3
  • FIA:
    • FIA_UAU: 2
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UID.2: 8
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 7
    • FMT_MOF.1.1: 1
    • FMT_SMF.1: 8
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 8
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS_EXT.1: 7
    • FPT_FLS_EXT.1.1: 1
    • FPT_NTA_EXT.1: 7
    • FPT_NTA_EXT.1.1: 1
    • FPT_PHP: 1
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_STM.1: 8
    • FPT_STM.1.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
    • FPT_TST_EXT.1: 7
    • FPT_TST_EXT.1.1: 1
  • FTA:
    • FTA_CIN_EXT.1: 11
    • FTA_CIN_EXT.1.1: 1
    • FTA_CIN_EXT.1.2: 1
    • FTA_CIN_EXT.1.3: 1
  • FCS:
    • FCS_CKM_EXT.1: 4
    • FCS_CKM_EXT.1.1: 1
    • FCS_RBG_EXT.1: 6
    • FCS_RBG_EXT.1.1: 1
    • FCS_STO_EXT.1: 4
    • FCS_STO_EXT.1.1: 1
  • FDP:
    • FDP_ACF_EXT.1: 4
    • FDP_ACF_EXT.1.1: 2
    • FDP_COO_EXT.1: 4
    • FDP_COO_EXT.1.1: 1
    • FDP_DAR_EXT.1: 5
    • FDP_DAR_EXT.1.1: 1
    • FDP_DEC_EXT.1: 4
    • FDP_DEC_EXT.1.1: 1
    • FDP_DEC_EXT.1.2: 1
    • FDP_NET_EXT.1: 4
    • FDP_NET_EXT.1.1: 1
    • FDP_PST_EXT.1: 1
    • FDP_SBX_EXT.1: 5
    • FDP_SBX_EXT.1.1: 1
    • FDP_SOP_EXT.1: 4
    • FDP_SOP_EXT.1.1: 1
    • FDP_SOP_EXT.1.2: 1
    • FDP_STR_EXT.1: 4
    • FDP_STR_EXT.1.1: 1
    • FDP_TRK_EXT.1: 4
    • FDP_TRK_EXT.1.1: 1
  • FMT:
    • FMT_CFG_EXT.1: 4
    • FMT_CFG_EXT.1.1: 1
    • FMT_CFG_EXT.1.2: 1
    • FMT_MEC_EXT.1: 4
    • FMT_MEC_EXT.1.1: 1
    • FMT_MOF_EXT.1: 5
    • FMT_MOF_EXT.1.1: 1
    • FMT_SMF.1: 3
    • FMT_SMF.1.1: 1
  • FPR:
    • FPR_ANO_EXT.1: 5
  • FPT:
    • FPT_AEX_EXT.1: 4
    • FPT_AEX_EXT.1.1: 1
    • FPT_AEX_EXT.1.2: 1
    • FPT_AEX_EXT.1.3: 2
    • FPT_AEX_EXT.1.4: 1
    • FPT_AEX_EXT.1.5: 1
    • FPT_AON_EXT.1: 4
    • FPT_AON_EXT.1.1: 1
    • FPT_AON_EXT.2: 1
    • FPT_API_EXT.1: 4
    • FPT_API_EXT.1.1: 1
    • FPT_DNL_EXT.1: 4
    • FPT_DNL_EXT.1.1: 1
    • FPT_DNL_EXT.1.2: 1
    • FPT_IDV_EXT.1: 4
    • FPT_IDV_EXT.1.1: 1
    • FPT_LIB_EXT.1: 4
    • FPT_LIB_EXT.1.1: 1
    • FPT_MCD_EXT.1: 4
    • FPT_MCD_EXT.1.1: 1
    • FPT_MCD_EXT.1.2: 2
    • FPT_TUD_EXT.1: 5
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
    • FPT_TUD_EXT.1.4: 1
    • FPT_TUD_EXT.1.5: 1
  • FTP:
    • FTP_DIT_EXT.1: 4
    • FTP_DIT_EXT.1.1: 1
pdf_data/st_keywords/cc_claims
  • OE:
    • OE.NO_MICROPHONES: 1
    • OE.NO_SPECIAL_ANALOG_CAPABILITIES: 1
    • OE.NO_WIRELESS_DEVICES: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.TRUSTED_CONFIG: 1
  • A:
    • A.PLATFORM: 1
    • A.PROPER_ADMIN: 1
    • A.PROPER_USER: 1
  • O:
    • O.ADDON_INTEGRITY: 1
    • O.DOMAIN_ISOLATION: 1
    • O.INTEGRITY: 1
    • O.MANAGEMENT: 1
    • O.PROTECTED_COMMS: 1
    • O.PROTECTED_STORAGE: 1
    • O.QUALITY: 1
  • OE:
    • OE.PLATFORM: 1
    • OE.PROPER_ADMIN: 1
    • OE.PROPER_USER: 1
  • T:
    • T.FLAWED_ADDON: 1
    • T.LOCAL_ATTACK: 1
    • T.NETWORK_ATTACK: 2
    • T.NETWORK_EAVESDROP: 1
    • T.PHYSICAL_ACCESS: 1
    • T.SAME-: 1
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/st_keywords/eval_facility
  • Leidos:
    • Leidos: 5
  • Acumen:
    • Acumen Security: 2
pdf_data/st_keywords/crypto_protocol
  • IPsec:
    • IPsec: 1
  • PGP:
    • PGP: 1
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/device_model
  • ATMEL:
    • ATMEL AT24C512: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 2
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 6265: 1
    • RFC 6454: 1
    • RFC6066: 1
  • X509:
    • X.509: 3
pdf_data/st_metadata
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different