Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CCEVS-VR-VID-10380-2012
Mobile Armor PolicyServer 3.1 and FileArmor 3.0
CCEVS-VR-VID-10298-2010
name RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9 Mobile Armor PolicyServer 3.1 and FileArmor 3.0
category Other Devices and Systems Data Protection
not_valid_after 31.12.2014 01.11.2014
not_valid_before 21.12.2012 29.11.2010
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10298-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10298-st.pdf
manufacturer RIOREY Incorporated Mobile Armor, Inc.
manufacturer_web https://www.riorey.com/ https://www.mobilearmor.com
security_level EAL4+, ALC_FLR.1 EAL4+, ALC_FLR.3
dgst 7f09c099abfb5dbf f1eb062594f4e1f0
heuristics/cert_id CCEVS-VR-VID-10380-2012 CCEVS-VR-VID-10298-2010
heuristics/extracted_sars ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, AGD_PRE.1, ATE_FUN.1, ATE_IND.2, ATE_DPT.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ALC_FLR.1, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1 ALC_LCD.1, ADV_TDS.3, ALC_TAT.1, AVA_VAN.3, ALC_FLR.3, ATE_DPT.2, AGD_PRE.1, ATE_IND.2, ATE_FUN.1, AGD_OPE.1, ATE_COV.2, ALC_CMS.4, ALC_CMC.4, ADV_IMP.1, ALC_DEL.1, ADV_FSP.4, ADV_ARC.1, ALC_DVS.1
heuristics/extracted_versions 5.0.12 3.0, 3.1
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10380/
  • categories: ['Miscellaneous']
  • category: Miscellaneous
  • certification_date: 21.12.2012
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 21.12.2014
  • id: CCEVS-VR-VID10380
  • product: RioRey™ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10380
  • vendor: RioRey, Inc.
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/10298/
  • categories: ['Sensitive Data Protection']
  • category: Sensitive Data Protection
  • certification_date: 29.11.2010
  • evaluation_facility: Leidos Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10298
  • product: Mobile Armor PolicyServer 3.1 and FileArmor 3.0
  • scheme: US
  • url: https://www.niap-ccevs.org/products/10298
  • vendor: Mobile Armor, Inc.
pdf_data/report_filename st_vid10380-vr.pdf st_vid10298-vr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10380-2012
    • cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
    • cert_lab: US NIAP
  • US:
    • cert_id: CCEVS-VR-VID10298-2010
    • cert_item: Mobile Armor FileArmor v3.0 & PolicyServer v3.1
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10380-2012: 1
  • US:
    • CCEVS-VR-VID10298-2010: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 1
  • EAL:
    • EAL 1: 1
    • EAL 4: 3
    • EAL4+: 4
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
  • ALC:
    • ALC_FLR.3: 3
pdf_data/report_keywords/cc_claims
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • A:
    • A.DEVICE_USE: 1
    • A.LOCATE: 1
    • A.NO_EVIL: 1
    • A.NO_EVIL_USER: 1
  • T:
    • T.ACCOUNTABILITY: 1
    • T.ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.SUBVERT: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTH_ACCESS: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 14
pdf_data/report_keywords/standard_id
  • RFC:
    • RFC 1858: 1
  • FIPS:
    • FIPS 140: 2
pdf_data/report_metadata
  • /CreationDate: D:20110110182507
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110110182507
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 364582
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid10380-st.pdf st_vid10298-st.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4+: 6
  • EAL:
    • EAL 4: 5
    • EAL 4 augmented: 1
    • EAL4: 3
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 15
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 3
    • ADV_FSP.4: 15
    • ADV_IMP: 1
    • ADV_IMP.1: 11
    • ADV_TDS: 1
    • ADV_TDS.1: 2
    • ADV_TDS.3: 22
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 15
    • AGD_PRE: 1
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 15
    • ALC_CMS: 1
    • ALC_CMS.4: 6
    • ALC_DEL: 1
    • ALC_DEL.1: 6
    • ALC_DVS: 1
    • ALC_DVS.1: 8
    • ALC_FLR: 1
    • ALC_FLR.3: 20
    • ALC_LCD: 1
    • ALC_LCD.1: 9
    • ALC_TAT: 1
    • ALC_TAT.1: 10
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT: 1
    • ATE_DPT.2: 6
    • ATE_FUN: 1
    • ATE_FUN.1: 14
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.3: 8
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 13
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
  • FAU:
    • FAU_ARP: 15
    • FAU_GEN: 6
    • FAU_GEN.1: 10
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAA: 20
    • FAU_SAA.1: 1
    • FAU_SAR: 9
    • FAU_SAR.1: 6
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 4
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 1
    • FAU_STG: 18
    • FAU_STG.1: 1
  • FCS:
    • FCS_CKM: 8
    • FCS_CKM.1: 17
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.3: 5
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 16
    • FCS_CKM.4.1: 1
    • FCS_COP: 24
    • FCS_COP.1: 2
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACC.2: 3
    • FDP_ACF: 3
    • FDP_ACF.1: 5
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_IFC.1: 2
    • FDP_ITC.1: 5
    • FDP_ITC.2: 5
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD: 3
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU: 23
    • FIA_UAU.2: 4
    • FIA_UAU.5: 5
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UAU.7: 5
    • FIA_UAU.7.1: 1
    • FIA_UID: 18
    • FIA_UID.1: 3
    • FIA_UID.2: 1
  • FMT:
    • FMT_MSA: 8
    • FMT_MSA.1: 5
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 18
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 7
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD: 58
    • FMT_MTD.1: 1
    • FMT_MTD.2: 4
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_MTF: 1
    • FMT_REV: 2
    • FMT_REV.1: 4
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SAE: 3
    • FMT_SAE.1: 5
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF: 3
    • FMT_SMF.1: 23
    • FMT_SMF.1.1: 1
    • FMT_SMR: 4
    • FMT_SMR.1: 20
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS: 16
    • FPT_FLS.1: 2
    • FPT_ITT: 4
    • FPT_ITT.1: 6
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 3
    • FPT_TST: 3
    • FPT_TST.1: 5
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FRU:
    • FRU_FLT: 3
    • FRU_FLT.1: 5
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_TAB: 3
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 5
    • O.TRANSMISSION: 1
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
  • A:
    • A.DEVICE_USE: 2
    • A.LOCATE: 3
    • A.NO_EVIL: 2
    • A.NO_EVIL_USER: 2
  • O:
    • O.ACCESS: 5
    • O.ADMIN_ROLE: 2
    • O.ALERT: 5
    • O.AUDIT_GENERATION: 2
    • O.AUDIT_REVIEW: 5
    • O.CRYPTO_OPS: 2
    • O.DATA_TRANSFER: 5
    • O.FAULT_TOLERANCE: 2
    • O.MANAGE: 5
    • O.TOE_PROTECTION: 2
    • O.USER_AUTHENTICATION: 5
  • OE:
    • OE.AUDIT_PROTECTION: 2
    • OE.CONFIG: 1
    • OE.PHYCAL: 2
    • OE.TIME: 1
    • OE.TOE_PROTECTION: 2
    • OE.USER_GUIDANCE: 1
  • T:
    • T.ACCOUNTABILITY: 3
    • T.ADMIN_ERROR: 3
    • T.MASQERADE: 1
    • T.MASQUERADE: 2
    • T.SUBVERT: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTH_ACCESS: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 9
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • AES_competition:
    • AES:
      • AES: 16
  • DES:
    • 3DES:
      • 3DES: 4
      • Triple-DES: 2
  • constructions:
    • MAC:
      • HMAC: 13
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-224: 1
      • SHA-256: 1
      • SHA-384: 1
      • SHA-512: 1
      • SHA384: 1
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 2
  • RNG:
    • RNG: 5
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
  • CBC:
    • CBC: 1
  • ECB:
    • ECB: 1
  • OFB:
    • OFB: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/standard_id
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
  • FIPS:
    • FIPS 140-2: 8
    • FIPS 180-2: 3
    • FIPS 197: 3
    • FIPS 198: 3
    • FIPS 46-3: 2
    • FIPS PUB 140-2: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
  • OutOfScope:
    • TOE. Install: This pertains to the installation of a managed client. Stand Alone installations are out of scope of the evaluation. File Armor client software cannot be updated from the Policy Server. Policy: 1
    • The File Armor client must be installed in a Managed configuration. Stand Alone installations are out of scope of this evaluation. The remainder of this section summarizes the TOE architecture. 2.1 TOE Overview: 1
    • out of scope: 2
pdf_data/st_metadata
  • /CreationDate: D:20130115104027
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130115104027
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1295508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
  • /Author: Steve Hardwick
  • /CreationDate: D:20110110182227
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110110182227
  • /Producer: Microsoft® Office Word 2007
  • /Subject: Security Target
  • /Title: Mobile Armor, Inc. PolicyServer and FileArmor Security Target
  • pdf_file_size_bytes: 1184365
  • pdf_hyperlinks: mailto:[email protected]?subject=Common%20Criteria, http://www.mobilearmor.com/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 62
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different