Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
CA Technologies Top Secret r14 SP1 for z/OS
CCEVS-VR-VID-10415-2011
KOMSCO JK31 V1.1 on M7892
KECS-ISIS-1113-2021
name CA Technologies Top Secret r14 SP1 for z/OS KOMSCO JK31 V1.1 on M7892
category Access Control Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US KR
status archived active
not_valid_after 01.11.2014 29.07.2026
not_valid_before 04.04.2011 29.07.2021
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10415-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-1113-2021%20CR(KOMSCO%20JK31%20V1.1%20on%20M7892)(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10415-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK31-R2-TR-0001]%20Security%20Target-Lite-e-v1.0.pdf
manufacturer CA Technologies KOMSCO
manufacturer_web https://www.ca.com https://www.komsco.com
security_level ASE_TSS.2, ALC_FLR.1, EAL4+ ALC_DVS.2, EAL5+, AVA_VAN.5
dgst a4cba33549146a03 553b186b07c82912
heuristics/cert_id CCEVS-VR-VID-10415-2011 KECS-ISIS-1113-2021
heuristics/cert_lab US []
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_TSS.2, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 1.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, BSI-DSZ-CC-0782-V5-2020, BSI-DSZ-CC-0782-V2-2015
heuristics/scheme_data
  • category: Enterprise Security Management
  • certification_date: 04.04.2011
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 01.11.2014
  • id: CCEVS-VR-VID10415
  • product: CA Top Secret r14 SP1 for z/OS
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10415
  • vendor: CA Technologies
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/protection_profiles {} 17c3a7837f653cc7
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[KECS-PP-0097a-2008] (CC V3.1R3) Smart Card Open Platform PP V2.2.pdf
pdf_data/report_filename st_vid10415-vr.pdf KECS-ISIS-1113-2021 CR(KOMSCO JK31 V1.1 on M7892)(eng).pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10415-2011
    • cert_item: CA Top Secret® r14 SP1 for z/OS
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10415-2011: 1
  • DE:
    • BSI-DSZ-CC-0782-V5-2020: 3
  • KR:
    • KECS-ISIS-1113-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL4: 3
  • EAL:
    • EAL 6+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.1: 2
  • ASE:
    • ASE_TSS.2: 2
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 6
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 2
  • TTA:
    • TTA: 4
pdf_data/report_keywords/symmetric_crypto
  • constructions:
    • MAC:
      • CMAC: 1
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 1
  • miscellaneous:
    • ARIA:
      • ARIA: 1
    • SEED:
      • SEED: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA2:
      • SHA-2: 4
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 8
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 16
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/tee_name
  • AMD:
    • PSP: 1
pdf_data/report_keywords/standard_id
  • X509:
    • x.509: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 1
pdf_data/report_metadata
  • /CreationDate: D:20110614163258
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110614163258
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 445120
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
  • /Author: 이은경
  • /CreationDate: D:20210729160530+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210729160530+09'00'
  • /Producer: Microsoft® Word 2019
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 548890
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename st_vid10415-st.pdf [JK31-R2-TR-0001] Security Target-Lite-e-v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V5-2020: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL4: 6
    • EAL4 augmented: 2
  • EAL:
    • EAL 5+: 1
    • EAL4: 2
    • EAL5: 12
    • EAL5+: 7
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 10
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 14
    • ADV_FSP.4: 13
    • ADV_IMP.1: 9
    • ADV_TDS.3: 17
  • AGD:
    • AGD_OPE.1: 15
    • AGD_PRE.1: 11
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.4: 17
    • ALC_CMS.4: 8
    • ALC_DEL.1: 10
    • ALC_DVS: 2
    • ALC_DVS.1: 7
    • ALC_FLR.1: 12
    • ALC_LCD.1: 8
    • ALC_TAT: 1
    • ALC_TAT.1: 9
  • ASE:
    • ASE_CCL.1: 13
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.2: 12
    • ASE_REQ.2: 15
    • ASE_SPD.1: 9
    • ASE_TSS.2: 12
  • ATE:
    • ATE_COV.2: 7
    • ATE_DPT.2: 8
    • ATE_FUN.1: 10
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.3: 9
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 20
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 17
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 19
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN.1: 16
    • FAU_GEN.1.1: 2
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 10
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 1
    • FAU_SEL.1: 10
    • FAU_SEL.1.1: 1
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ACC.2: 18
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 20
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 1
  • FIA:
    • FIA_ACID.1: 1
    • FIA_ACID.2: 1
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 2
    • FIA_AFL.1.2: 2
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 19
    • FIA_SOS.1.1: 3
    • FIA_SOS.2: 8
    • FIA_SOS.2.1: 1
    • FIA_SOS.2.2: 1
    • FIA_UAU.1: 2
    • FIA_UAU.2: 12
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 12
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 12
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 3
    • FIA_UID.2: 11
    • FIA_UID.2.1: 1
    • FIA_USB.1: 9
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 39
    • FMT_MOF.1.1: 4
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 10
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 4
    • FMT_SMF.1: 14
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 15
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 3
  • FTA:
    • FTA_TSE.1: 8
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 38
    • FCS_COP.1.1: 7
    • FCS_RNG: 2
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 2
    • FPT_ITC.1: 1
    • FPT_PHP.3: 6
    • FPT_RCV.2: 1
    • FPT_RCV.3: 5
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 4
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN: 3
    • A.B: 1
    • A.LOCATE: 3
    • A.NOEVIL: 3
    • A.PATCHES: 3
  • O:
    • O.ACCESS: 6
    • O.AUDIT: 5
    • O.AUTH: 4
    • O.MANAGE: 4
    • O.ROBUST_ADMIN_GUIDA: 2
    • O.ROBUST_ADMIN_GUIDANC: 1
    • O.ROBUST_ADMIN_GUIDANCE: 1
    • O.ROBUST_TOE_ACCESS: 4
  • OE:
    • OE.ADMIN: 5
    • OE.EAVESDROPPING: 2
    • OE.LOCATE: 3
    • OE.NOEVIL: 3
    • OE.SYSTIME: 3
  • T:
    • T.ACCESS: 4
    • T.ADMIN_ERROR: 4
    • T.AUDIT_COMPROMISE: 3
    • T.MASK: 6
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 5
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 8
    • OP.INSTALL: 8
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 9
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
pdf_data/st_keywords/vendor
  • Infineon:
    • Infineon: 7
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 5
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 8
    • DES:
      • DES: 3
  • miscellaneous:
    • ARIA:
      • ARIA: 7
    • SEED:
      • SEED: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 2
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 43
  • KA:
    • Key Agreement: 2
    • Key agreement: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 1
  • TLS:
    • SSL:
      • SSL: 1
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/st_keywords/tee_name
  • AMD:
    • PSP: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2007-09-004: 1
  • PKCS:
    • PKCS #11: 2
    • PKCS #12: 1
  • X509:
    • X.509: 2
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 14888-3: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
    • PKCS#2: 1
  • RFC:
    • RFC 8017: 1
    • RFC8017: 1
  • SCP:
    • SCP 02: 1
    • SCP02: 18
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the FLASH of IC ChiP. That is out of scope in the ST. The delivery method of TOE related software uses a secure iShare/SecureX portal of: 1
pdf_data/st_metadata
  • /CreationDate: D:20110614163608
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20110614163608
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1192910
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 125
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different