Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CCEVS-VR-VID-10380-2012
DIGITTRADE High Security HS256 S3, Version 1.0
BSI-DSZ-CC-0825-2017
name RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 DIGITTRADE High Security HS256 S3, Version 1.0
scheme US DE
not_valid_after 31.12.2014 06.10.2022
not_valid_before 21.12.2012 06.10.2017
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0825a_pdf.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0825b_pdf.pdf
manufacturer RIOREY Incorporated DIGITTRADE GmbH
manufacturer_web https://www.riorey.com/ https://www.digittrade.de
security_level EAL4+, ALC_FLR.1 EAL2
dgst 7f09c099abfb5dbf c6776bce1df97cdd
heuristics/cert_id CCEVS-VR-VID-10380-2012 BSI-DSZ-CC-0825-2017
heuristics/cert_lab US BSI
heuristics/extracted_sars ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ALC_FLR.1, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1 ALC_FLR.3, ASE_CCL.1, ASE_OBJ.2, ALC_CMC.5, AVA_VAN.5, ASE_INT.1, APE_ECD.1, ASE_REQ.2, ATE_DPT.4, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_IMP.2, AGD_PRE.1, ATE_IND.3, ASE_ECD.1, APE_OBJ.2, ALC_TAT.3, ALC_DVS.2, ASE_SPD.1, APE_INT.1, ATE_COV.3, ADV_INT.3, ALC_LCD.2, ASE_TSS.2, ALC_CMS.5, APE_CCL.1, AGD_OPE.1, APE_SPD.1, ALC_DEL.1, ADV_ARC.1, ADV_SPM.1, APE_REQ.2
heuristics/extracted_versions 5.0.12 1.0
heuristics/report_references/directly_referencing {} NSCIB-CC-13-37761-CR2
heuristics/report_references/indirectly_referencing {} NSCIB-CC-13-37762-CR, NSCIB-CC-13-37761-CR2, BSI-DSZ-CC-0857-2013, BSI-DSZ-CC-0707-2012, BSI-DSZ-CC-0633-V2-2014, BSI-DSZ-CC-0555-2009
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10380/
  • categories: ['Miscellaneous']
  • category: Miscellaneous
  • certification_date: 21.12.2012
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 21.12.2014
  • id: CCEVS-VR-VID10380
  • product: RioRey™ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10380
  • vendor: RioRey, Inc.
heuristics/st_references/directly_referencing {} NSCIB-CC-13-37761-CR2
heuristics/st_references/indirectly_referencing {} NSCIB-CC-13-37761-CR2, BSI-DSZ-CC-0857-2013
heuristics/protection_profiles {} 3caa75d31b99cd9a
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0081b_pdf.pdf
pdf_data/report_filename st_vid10380-vr.pdf 0825a_pdf.pdf
pdf_data/report_frontpage
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10380-2012
    • cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
    • cert_lab: US NIAP
  • DE:
    • cc_security_level: Common Criteria Part 3 conformant EAL 2
    • cc_version: PP conformant Common Criteria Part 2 extended
    • cert_id: BSI-DSZ-CC-0825-2017
    • cert_item: DIGITTRADE High Security HS256 S3, Version 1.0
    • cert_lab: BSI
    • developer: DIGITTRADE GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
    • ref_protection_profiles: Protection Profile for Portable Storage Media (PSMPP), Version 1.0, 31 July 2012, BSI-CC-PP- 0081-2012
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10380-2012: 1
  • DE:
    • BSI-DSZ-CC-0825-2017: 17
  • NL:
    • CC-13-37761-CR2: 2
    • NSCIB-CC-13-37761-CR2: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0081-2012: 1
    • BSI-CC-PP-0081-2012: 2
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 1
  • EAL:
    • EAL 1: 7
    • EAL 2: 8
    • EAL 3: 4
    • EAL 4: 6
    • EAL 5: 6
    • EAL 6: 3
    • EAL 7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 2
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 3
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 1
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • NXP:
    • NXP: 6
  • Samsung:
    • Samsung: 1
pdf_data/report_keywords/eval_facility
  • DFKI:
    • DFKI: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 5
      • AES-256: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-256: 1
      • SHA-512: 2
pdf_data/report_keywords/cipher_mode
  • XTS:
    • XTS: 2
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7148: 1
    • BSI TR-02102: 1
pdf_data/report_keywords/os_name
  • JCOP:
    • JCOP 2: 1
pdf_data/report_keywords/standard_id
  • RFC:
    • RFC 1858: 1
  • BSI:
    • AIS 32: 1
  • FIPS:
    • FIPS PUB 197: 1
  • ISO:
    • ISO/IEC 15408: 4
    • ISO/IEC 17065: 2
    • ISO/IEC 18045: 4
  • NIST:
    • NIST SP 800-38E: 1
    • SP 800-38E: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 9] Configuration list for the TOE, Version 1.4, 2017-04-03, CM scope (ALC_CMS.2), (confidential document) [10] Guidance documentation for the TOE, Version 1.07, 2017-04-03, Benutzerhandbuch / User Manual: 1
    • Technical Report, Version 1.1, 2017-09-19, Evaluation DIGITTRADE HS256 S3 V1.0, DFKI GmbH, (confidential document) [8] Protection Profile for Portable Storage Media (PSMPP), Version 1.0, 31 July 2012: 1
    • being maintained, is not given any longer. In particular, prior to the dissemination of confidential documentation and information related to the TOE or resulting from the evaluation and certification: 1
pdf_data/report_metadata
pdf_data/st_filename st_vid10380-st.pdf 0825b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
  • NL:
    • NSCIB-CC-13-37761-CR2: 4
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP- 0081-2012: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL2: 5
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 13
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_GEN: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 2
    • FCS_CKM.4: 13
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ITC.1: 4
    • FDP_ITC.2: 4
    • FDP_RIP.1: 11
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_SOS.1: 11
    • FIA_SOS.1.1: 1
    • FIA_UAU: 9
    • FIA_UAU.1: 2
    • FIA_UAU.2: 11
    • FIA_UAU.2.1: 1
    • FIA_UAU.5.1: 2
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 9
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 1
  • FMT:
    • FMT_SMF.1: 9
    • FMT_SMF.1.1: 2
  • FPT:
    • FPT_FLS.1: 9
    • FPT_FLS.1.1: 1
    • FPT_SDC: 5
    • FPT_SDC.1: 20
    • FPT_SDC.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 5
    • O.TRANSMISSION: 1
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 5
  • Samsung:
    • Samsung: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 13
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 6
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • XTS:
    • XTS: 6
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI TR-02102: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /CreationDate: D:20130115104027
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130115104027
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1295508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Author: André Gimbut
  • /CreationDate: D:20170918133036+02'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: hardware encrypted hard drive; hdd; ssd; eal 2; common criteria; BSI; DIGITTRADE; 2 factor authentication; smart card; PIN; USB 3.0; USB 2.0; encryption; AES-XTS; 256 bit; full disk encryption
  • /ModDate: D:20170918133408+02'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: hardware encrypted hard drive; hdd; ssd; eal 2; common criteria; BSI; DIGITTRADE; 2 factor authentication; smart card; PIN; USB 3.0; USB 2.0; encryption; AES-XTS; 256 bit; full disk encryption
  • /Title: DIGITTRADE High Security HS256 S3 (external encrypted HDD/SSD) v1.0, Security Target (ST) v1.10
  • pdf_file_size_bytes: 604887
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 43
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different