Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
AquaLogic Interaction Collaboration 4.2
CCEVS-VR-10104-2009
Virtual Machine of ID Motion V1 G231 mask with AMD 122v1
ANSSI-CC-2013/11
name AquaLogic Interaction Collaboration 4.2 Virtual Machine of ID Motion V1 G231 mask with AMD 122v1
category Data Protection ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US FR
not_valid_after 20.07.2012 01.09.2019
not_valid_before 20.02.2009 29.03.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10104-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ANSSI-CC-2013_11_fr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10104-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/anssi-cc-cible-2013_11en.pdf
manufacturer BEA Systems, Inc. Gemalto / Trusted Labs
manufacturer_web https://www.bea.com https://www.gemalto.com
security_level EAL2+, ALC_FLR.2 EAL7
dgst 92f092e11a262a1b 32f420aa3f6ca59c
heuristics/cert_id CCEVS-VR-10104-2009 ANSSI-CC-2013/11
heuristics/cert_lab US []
heuristics/extracted_sars ALC_FLR.2, ATE_IND.2, ADV_FSP.1, ATE_FUN.1, ADV_HLD.1, AGD_USR.1, AVA_SOF.1, ADV_RCR.1, AGD_ADM.1, ATE_COV.1, AVA_VLA.1 ATE_DPT.4, ALC_LCD.2, ADV_IMP.2, ATE_COV.3, ALC_TAT.3, AVA_VAN.5, ADV_INT.3, ADV_SPM.1, ALC_CMC.5, ADV_FSP.6, ADV_TDS.6, ATE_FUN.2, ADV_COMP.1, ALC_DVS.2
heuristics/extracted_versions 4.2 -
heuristics/report_references/directly_referencing {} ANSSI-CC-2012/85
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0728-2011, BSI-DSZ-CC-0640-2010, ANSSI-CC-2012/85, BSI-DSZ-CC-0813-2012
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0606-2010
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0640-2010, BSI-DSZ-CC-0606-2010
pdf_data/report_filename st_vid10104-vr.pdf ANSSI-CC-2013_11_fr.pdf
pdf_data/report_frontpage
  • FR:
  • US:
    • cert_id: CCEVS-VR-10104-2009
    • cert_item: AquaLogic® Interaction Collaboration 4.2 MP1
    • cert_lab: US NIAP
  • FR:
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10104-2009: 1
  • FR:
    • ANSSI-CC-2012/85: 5
    • ANSSI-CC-2013/11: 18
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 2
  • EAL:
    • EAL 1: 1
    • EAL 3: 1
    • EAL 5: 1
    • EAL 7: 3
    • EAL4: 2
    • EAL7: 2
  • ITSEC:
    • ITSEC E6 Elevé: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 3
  • ATE:
    • ATE_FUN: 1
  • ADV:
    • ADV_ARC: 1
    • ADV_FSP: 1
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_PRE: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMS: 1
    • ALC_DEL: 1
    • ALC_DVS: 1
    • ALC_FLR: 2
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_ECD: 1
    • ASE_INT: 1
    • ASE_OBJ: 1
    • ASE_REQ: 1
    • ASE_SPD: 1
    • ASE_TSS: 1
  • ATE:
    • ATE_COV: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_IND: 1
  • AVA:
    • AVA_VAN: 2
pdf_data/report_keywords/cc_claims
  • A:
    • A.AUTH_USERS: 1
    • A.INSTALL: 1
    • A.NOEVIL: 1
    • A.OPE_ENV: 1
    • A.PHYSICAL: 1
    • A.USER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 17
  • Gemalto:
    • Gemalto: 9
  • Infineon:
    • Infineon: 1
pdf_data/report_keywords/eval_facility
  • TrustedLabs:
    • Trusted Labs: 3
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • DES:
      • DES: 2
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/report_metadata
  • /Author: Anthony Apted
  • /Company: FIREBURST
  • /CreationDate: D:20090303111953-05'00'
  • /Creator: Acrobat PDFMaker 8.1 for Word
  • /ModDate: D:20090303112005-05'00'
  • /Producer: Acrobat Distiller 8.1.0 (Windows)
  • /SourceModified: D:20090226182838
  • /Title: Validation Report
  • pdf_file_size_bytes: 115519
  • pdf_hyperlinks: http://edocs.bea.com/alui/collaboration/docs42/index.html
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: torno
  • /CreationDate: D:20130304090501+02'00'
  • /Creator: PDFCreator Version 0.9.0
  • /Keywords:
  • /ModDate: D:20130304090501+02'00'
  • /Producer: AFPL Ghostscript 8.53
  • /Subject:
  • /Title: ANSSI-CC-2013_11_fr
  • pdf_file_size_bytes: 166636
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
pdf_data/st_filename st_vid10104-st.pdf anssi-cc-cible-2013_11en.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0606-2010: 8
    • BSI-DSZ-CC-0640-2010: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 14
    • EAL 2 augmented: 14
  • EAL:
    • EAL5+: 1
    • EAL7: 4
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP: 1
    • ACM_CAP.2: 13
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.1: 6
    • ADO_IGS: 1
    • ADO_IGS.1: 6
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 9
    • ADV_HLD: 2
    • ADV_HLD.1: 12
    • ADV_RCR: 2
    • ADV_RCR.1: 5
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 12
    • AGD_USR: 1
    • AGD_USR.1: 10
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 28
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 5
    • ATE_FUN: 1
    • ATE_FUN.1: 10
    • ATE_IND: 1
    • ATE_IND.2: 8
  • AVA:
    • AVA_SOF: 1
    • AVA_SOF.1: 7
    • AVA_VLA: 1
    • AVA_VLA.1: 9
  • ADV:
    • ADV_COMP.1: 1
    • ADV_FSP.6: 2
    • ADV_IMP.2: 2
    • ADV_INT.3: 2
    • ADV_SPM.1: 2
    • ADV_TDS.6: 2
  • ALC:
    • ALC_CMC.5: 2
    • ALC_DVS.2: 2
    • ALC_LCD.2: 2
    • ALC_TAT.3: 2
  • ATE:
    • ATE_COV.3: 2
    • ATE_DPT.4: 2
    • ATE_FUN.2: 2
  • AVA:
    • AVA_VAN.5: 3
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ACC: 20
    • FDP_ACC.1: 7
    • FDP_ACF: 19
    • FDP_ACF.1: 3
    • FDP_IFC.1: 3
  • FIA:
    • FIA_ATD: 2
    • FIA_ATD.1: 3
    • FIA_ATD.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.2: 3
    • FIA_UAU.2.1: 1
    • FIA_UID: 2
    • FIA_UID.1: 2
    • FIA_UID.2: 3
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA: 47
    • FMT_MSA.1: 2
    • FMT_MSA.3: 2
    • FMT_MTD: 18
    • FMT_SMF: 19
    • FMT_SMF.1: 5
    • FMT_SMR: 23
    • FMT_SMR.1: 7
  • FPT:
    • FPT_RVM: 15
    • FPT_SEP: 2
    • FPT_SEP.1: 3
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
  • FAU:
    • FAU_ACC.2: 1
    • FAU_ARP: 3
    • FAU_ARP.1: 4
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 4
    • FAU_SAA: 3
    • FAU_SAA.1: 5
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAS.1: 1
  • FCS:
    • FCS_CKM.1: 1
    • FCS_COP.1: 2
    • FCS_RND.1: 1
  • FDP:
    • FDP_ACC: 3
    • FDP_ACC.1: 4
    • FDP_ACC.2: 6
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 1
    • FDP_ACF: 3
    • FDP_ACF.1: 9
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
    • FDP_ITT.1: 1
    • FDP_ROL: 3
    • FDP_ROL.1: 3
    • FDP_ROL.1.1: 1
    • FDP_ROL.1.2: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 1
  • FMT:
    • FMT_LIM.1: 1
    • FMT_LIM.2: 1
    • FMT_MSA.1: 1
    • FMT_MSA.3: 3
    • FMT_SMF.1: 1
  • FPT:
    • FPT_FLS: 3
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 1
    • FPT_PHP.3: 1
    • FPT_RCV: 3
    • FPT_RCV.4: 5
    • FPT_RCV.4.1: 1
    • FPT_TST.2: 1
  • FRU:
    • FRU_FLT.2: 1
    • FRU_RSA: 3
    • FRU_RSA.1: 4
    • FRU_RSA.1.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.AUTH_USERS: 3
    • A.INSTALL: 3
    • A.NOEVIL: 4
    • A.OPE_ENV: 3
    • A.PHYSICAL: 2
    • A.TRANSMIT: 2
    • A.USER: 4
  • O:
    • O.ACCESS: 5
    • O.MANAGE: 4
  • OE:
    • OE.ACCESS: 5
    • OE.ADMIN: 3
    • OE.AUTH: 4
    • OE.INSTALL: 3
    • OE.MANAGE: 4
    • OE.OPE_ENV: 4
    • OE.PHYSICAL: 2
    • OE.TRANSMIT: 2
    • OE.USER: 3
  • A:
    • A.APPLI_CONT: 1
    • A.CIPHER: 1
    • A.CLON: 1
    • A.DECIPHER: 1
    • A.DIS_MEMORY: 1
    • A.LOAD: 2
    • A.MOD_MEMORY: 1
    • A.OPERATE: 1
    • A.REMOVE: 1
    • A.SECURITY: 2
    • A.SIDE: 1
    • A.TAMPER_ES: 2
  • O:
    • O.APPLI_DEV: 3
    • O.CIPHER: 1
    • O.DECIPHER: 1
    • O.DEV_DIS_ES: 4
    • O.DLV_DATA: 4
    • O.EFECT_REMOVE: 1
    • O.EFFECT_LOAD: 3
    • O.EFFECT_REMOVE: 3
    • O.FLAW: 1
    • O.INIT_ACS: 3
    • O.LOAD: 2
    • O.REMOVE: 1
    • O.RESOURCE: 3
    • O.RND: 1
    • O.ROLLBACK: 2
    • O.SAMPLE_ACS: 1
    • O.SECURITY: 1
    • O.SEGREGATE: 3
    • O.SIDE: 3
    • O.TAMPER_ES: 5
  • OSP:
    • OSP.CIPHER: 1
    • OSP.CONF-ALU: 1
  • T:
    • T.APP_CORR: 3
    • T.APP_DISC: 3
    • T.APP_MOD: 4
    • T.APP_READ: 3
    • T.APP_REMOVE: 4
    • T.DEL_REMOVE: 4
    • T.DIS_DATA: 6
    • T.DIS_TEST_ES: 2
    • T.ERR_REMOVE: 3
    • T.LOAD_APP: 4
    • T.LOAD_MAN: 2
    • T.LOAD_MOD: 2
    • T.LOAD_OTHER: 2
    • T.MOD: 2
    • T.MOD_DATA: 4
    • T.MOD_EXE: 4
    • T.MOD_LOAD: 2
    • T.MOD_SHARE: 2
    • T.MOD_TSF: 3
    • T.RESOURCES: 2
    • T.RND: 1
    • T.T_CMD: 4
    • T.T_ES: 2
    • T.T_TOOLS: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 13
  • Gemalto:
    • Gemalto: 318
  • Infineon:
    • Infineon: 2
    • Infineon Technologies: 5
  • Thales:
    • Thales: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 2
    • DES:
      • DES: 4
pdf_data/st_keywords/randomness
  • RNG:
    • RND: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • Malfunction: 3
    • malfunction: 1
  • SCA:
    • Leak-Inherent: 3
    • Physical Probing: 2
    • physical probing: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • for secure loading and execution of smartcard applications. Note that cryptographic primitives are out of scope. 1.5.4 Smartcard Product Life Cycle The Smartcard product life-cycle is decomposed into seven: 1
    • out of scope: 3
    • the other subsystems of the MULTOS OS and some following ROMed applications (these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA) v1.0: 1
    • these elements are out of scope of the TOE): Mel applications and modules ROMed: - MPCOS V3.7 - Pin Server Application (PSA: 1
    • to the context in which the security functions take place. Note that cryptographic primitives are out of scope. Table 12 shows how these security functions satisfy the TOE security functional requirements. 7.1: 1
pdf_data/st_metadata
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different