Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2(4)E
CCEVS-VR-10692-2015
Data Security Kit(D) Software V1.00J
JISEC-CC-CRP-C0056
name Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2(4)E Data Security Kit(D) Software V1.00J
category Network and Network-Related Devices and Systems Other Devices and Systems
scheme US JP
not_valid_after 11.03.2018 31.01.2013
not_valid_before 11.03.2016 31.10.2006
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10692-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10692-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0056_ecvr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10692-st.pdf
manufacturer Cisco Systems, Inc. KYOCERA MITA Corporation
manufacturer_web https://www.cisco.com https://www.kyoceramita.com/
security_level {} EAL3
dgst 9756cd53cb235b4e 9262d09036bb0e7c
heuristics/cert_id CCEVS-VR-10692-2015 JISEC-CC-CRP-C0056
heuristics/cert_lab US []
heuristics/extracted_sars ADV_FSP.1, ALC_CMC.1, AVA_VAN.1, ALC_OPE.1, ATE_IND.1, ALC_CMS.1, AGD_OPE.1, AGD_PRE.1 {}
heuristics/extracted_versions 15.2 1.00
heuristics/scheme_data
  • category: Network Device
  • certification_date: 11.03.2016
  • evaluation_facility: Gossamer Security Solutions
  • expiration_date: 11.03.2018
  • id: CCEVS-VR-VID10692
  • product: Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS 15.2(4)E
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10692
  • vendor: Cisco Systems, Inc.
  • cert_id: JISEC-CC-CRP-C0151
  • certification_date: 01.03.2008
  • claim: EAL3
  • enhanced:
    • assurance_level: EAL3
    • cc_version: 2.3
    • cert_link: https://www.ipa.go.jp/en/security/c0151_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is installed as an option to the MFPs "KM-2560, KM-3060, KM-2560i, KM-3060i, CS-2560, CS-3060" of KYOCERA MITA Corporation. It is used to protect the image data that exists on HDD during or after each processing the copy function, the print function, the network scanning function, and the fax (sending and receiving) function from an illegal exposure. TOE security functions To defend assets to be protected in relation to the use of the above-mentioned basic functions, the TOE has the following security functions: - Hard disk accumulation data overwrite deletion function - Hard disk accumulation data encryption function
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: Data Security Kit(C) Type II Software
    • product_type: IT Product (data protection function in digital MFP)
    • toe_version: V2.40
    • vendor: KYOCERA MITA Corporation
  • expiration_date: 01.10.2013
  • supplier: KYOCERA MITA Corporation
  • toe_japan_name: Data Security Kit (C) Type II Software V2.40
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0151_it7182.html
  • toe_overseas_name: Data Security Kit (C) Type II Software V2.40
heuristics/protection_profiles c7cf611c6bb1e4b0 {}
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V1.0.pdf {}
pdf_data/cert_filename st_vid10692-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10692-2016: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
  • Cisco:
    • Cisco: 1
    • Cisco Systems, Inc: 1
pdf_data/cert_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20160317161152-04'00'
  • /ModDate: D:20160317161152-04'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 176973
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid10692-vr.pdf c0056_ecvr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-10692-2015
    • cert_item: Cisco Systems, Inc. 170 West Tasman Drive, San Jose, CA 95134-1706 Cisco IoT Industrial Ethernet and Connected Grid Switches running IOS
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-10692-2015: 1
  • JP:
    • Certification No. C0056: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 2
    • EAL1: 1
  • EAL:
    • EAL3: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 1
  • ALC:
    • ALC_CMS.1: 1
    • ALC_OPE.1: 1
  • ATE:
    • ATE_IND.1: 1
  • AVA:
    • AVA_VAN.1: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 31
    • Cisco Systems, Inc: 4
pdf_data/report_keywords/eval_facility
  • Gossamer:
    • Gossamer Security: 4
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/report_keywords/crypto_protocol
  • IKE:
    • IKE: 1
  • IPsec:
    • IPsec: 11
  • SSH:
    • SSH: 2
    • SSHv2: 4
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • FIPS:
    • FIPS 140-2: 1
pdf_data/report_metadata
  • /CreationDate: D:20160317155653-04'00'
  • /ModDate: D:20160317155653-04'00'
  • pdf_file_size_bytes: 362801
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 14
  • /CreationDate: D:20061102201015+09'00'
  • /ModDate: D:20061102201015+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 12181
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/st_filename st_vid10692-st.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.1: 2
    • ALC_CMS.1: 2
  • ATE:
    • ATE_IND.1: 2
  • AVA:
    • AVA_VAN.1: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 5
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 4
    • FAU_GEN.2.1: 1
    • FAU_STG.1: 1
    • FAU_STG_EXT.1: 4
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM.1: 5
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 5
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 16
    • FCS_COP.1.1: 4
    • FCS_RBG_EXT.1: 7
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
  • FIA:
    • FIA_PMG_EXT.1: 4
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT.2: 3
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT.1: 5
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF.1: 4
    • FMT_MOF.1.1: 1
    • FMT_MTD.1: 4
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR.2: 4
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 1
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT.1: 4
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM.1: 4
    • FPT_STM.1.1: 1
    • FPT_TST_EXT: 1
    • FPT_TST_EXT.1: 3
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT.1: 4
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL.3: 4
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 4
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT.1: 4
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB.1: 5
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC.1: 6
    • FTP_ITC.1.2: 1
    • FTP_TRP.1: 4
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_SECURE: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_PROTECTION: 1
    • A.PHYSICAL_PROTECTION: 2
    • A.REGULAR_UPDATES: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 1
    • OE.TRUSTED_ADMIN: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 44
    • Cisco Systems: 1
    • Cisco Systems, Inc: 3
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 18
      • AES-: 1
      • AES128: 2
      • AES256: 2
  • constructions:
    • MAC:
      • HMAC: 7
      • HMAC-SHA-256: 3
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • DH: 11
      • Diffie-Hellman: 3
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • PBKDF:
    • PBKDF2: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
    • SHA2:
      • SHA-256: 5
      • SHA-512: 3
pdf_data/st_keywords/crypto_scheme
  • KEX:
    • Key Exchange: 2
  • MAC:
    • MAC: 6
pdf_data/st_keywords/crypto_protocol
  • IKE:
    • IKE: 38
    • IKEv1: 11
  • IPsec:
    • IPsec: 72
  • SSH:
    • SSH: 8
    • SSHv2: 12
  • TLS:
    • TLS:
      • TLS: 2
  • VPN:
    • VPN: 20
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 10
    • PRNG: 1
  • RNG:
    • RBG: 3
    • RNG: 12
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 3
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2012-009-001: 1
    • CCMB-2012-009-004: 1
  • FIPS:
    • FIPS 140-2: 4
    • FIPS 186-2: 1
    • FIPS PUB 186-3: 2
    • FIPS PUB 186-4: 2
  • ISO:
    • ISO/IEC 18031:2011: 2
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-56B: 1
    • SP 800-90: 3
    • SP 900-90A: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS12: 1
  • RFC:
    • RFC 2986: 1
    • RFC 3602: 1
    • RFC 4109: 1
    • RFC 4301: 1
    • RFC 4303: 1
    • RFC 4945: 1
    • RFC 5280: 3
    • RFC 5759: 1
    • RFC 6379: 1
  • X509:
    • X.509: 6
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
state/cert/convert_garbage True False
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok True False
state/st/download_ok True False
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different