Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX320 Matrix Switch
SERTIT-076
Cybertrust UniCERT v5.2.1
Certificate Number: 2006/39
name Thinklogical TLX320 Matrix Switch Cybertrust UniCERT v5.2.1
category Other Devices and Systems Products for Digital Signatures
scheme NO AU
not_valid_after 22.09.2021 13.07.2017
not_valid_before 22.09.2016 25.10.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/EFAT028_Certification_Report_V1.0.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Cybertrust_UniCERT_5.2.1_ST.pdf
manufacturer Thinklogical Cybertrust
manufacturer_web https://www.thinklogical.com/ https://www.cybertrust.com/
security_level EAL4 EAL4+, ALC_FLR.2
dgst a67b05a18bbe6cfc 6780328fff5788c0
heuristics/cert_id SERTIT-076 Certificate Number: 2006/39
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_ENV.1, ADV_RCR.1, AVA_VLA.2, AGD_AGD.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_PPC.1, ASE_DES.1, ADV_FSP.2, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AVA_MSU.2, AGD_ADM.1, ALC_LCD.1, ATE_FUN.1, ATE_DPT.1, ALC_FLR.2, ALC_DVS.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, ADV_SPM.1
heuristics/extracted_versions - 5.2.1
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-076
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
  • product: Thinklogical TLX320 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
pdf_data/report_filename 20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf EFAT028_Certification_Report_V1.0.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-076: 16
  • AU:
    • Certificate Number: 2006/39: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL4: 2
    • EAL4+: 6
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ALC:
    • ALC_FLR: 1
    • ALC_FLR.2: 3
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Cisco:
    • Cisco: 1
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
pdf_data/report_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 3
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 3
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 3
  • SHA:
    • SHA1:
      • SHA-1: 4
pdf_data/report_keywords/crypto_protocol
  • VPN:
    • VPN: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • CC:
    • CCIMB-99-031: 1
    • CCIMB-99-032: 1
    • CCIMB-99-033: 1
  • PKCS:
    • PKCS#11: 3
    • PKCS#12: 2
    • PKCS#7: 1
  • X509:
    • X.509: 3
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162516Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162516Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 875983
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20061222014212+11'00'
  • /Creator: AdobePS5.dll Version 5.2
  • /ModDate: D:20061222014212+11'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - EFAT028 Certification Report V1.0.doc
  • pdf_file_size_bytes: 184977
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 25
pdf_data/st_filename ThinklogicalSecurityTarget_1_3_TLX320.pdf Cybertrust_UniCERT_5.2.1_ST.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 7
  • EAL:
    • EAL 4: 6
    • EAL 4 augmented: 1
    • EAL 4+: 1
    • EAL4: 8
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ACM:
    • ACM_AUT: 1
    • ACM_AUT.1: 10
    • ACM_CAP: 1
    • ACM_CAP.4: 18
    • ACM_SCP: 1
    • ACM_SCP.2: 6
  • ADO:
    • ADO_DEL: 1
    • ADO_DEL.2: 9
    • ADO_IGS.1: 8
  • ADV:
    • ADV_FSP.2: 9
    • ADV_HLD: 1
    • ADV_HLD.2: 12
    • ADV_IMP.1: 6
    • ADV_LLD: 1
    • ADV_LLD.1: 13
    • ADV_RCR: 1
    • ADV_RCR.1: 4
    • ADV_SPM: 1
    • ADV_SPM.1: 10
  • AGD:
    • AGD_ADM: 1
    • AGD_ADM.1: 15
    • AGD_AGD.1: 1
    • AGD_USR: 1
    • AGD_USR.1: 13
  • ALC:
    • ALC_DVS.1: 7
    • ALC_FLR: 2
    • ALC_FLR.2: 19
    • ALC_LCD.1: 8
    • ALC_TAT.1: 9
  • ASE:
    • ASE_DES.1: 2
    • ASE_ENV.1: 2
    • ASE_INT.1: 2
    • ASE_OBJ.1: 2
    • ASE_PPC.1: 2
    • ASE_REQ.1: 2
    • ASE_SRE.1: 2
    • ASE_TSS.1: 2
  • ATE:
    • ATE_COV.2: 7
    • ATE_DPT.1: 6
    • ATE_FUN.1: 11
    • ATE_IND.2: 7
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.2: 9
    • AVA_SOF.1: 6
    • AVA_VLA: 1
    • AVA_VLA.2: 10
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_GEN.1: 14
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 9
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 9
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 7
    • FAU_SAR.2.1: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
  • FCO:
    • FCO_NRO.2: 9
    • FCO_NRO.2.1: 1
    • FCO_NRO.2.2: 1
    • FCO_NRO.2.3: 1
  • FCS:
    • FCS_CKM: 7
    • FCS_CKM.1: 22
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 9
    • FCS_CKM.2.1: 2
    • FCS_CKM.3: 12
    • FCS_CKM.3.1: 1
    • FCS_CKM.4: 28
    • FCS_CKM.4.1: 1
    • FCS_COP: 90
    • FCS_COP.1: 10
    • FCS_COP.1.1: 2
  • FDP:
    • FDP_ACC.1: 30
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 23
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_DAU: 24
    • FDP_DAU.2: 16
    • FDP_DAU.2.1: 1
    • FDP_DAU.2.2: 1
    • FDP_IFC.1: 23
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 21
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 16
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
    • FDP_ITT.1: 12
    • FDP_ITT.1.1: 1
    • FDP_ITT.3: 12
    • FDP_ITT.3.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 9
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 13
    • FIA_SOS.1.1: 1
    • FIA_UAU: 45
    • FIA_UAU.1: 11
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.2: 2
    • FIA_UID: 47
    • FIA_UID.1: 32
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_UID.2: 2
    • FIA_USB.1: 11
    • FIA_USB.1.1: 1
  • FMT:
    • FMT_MOF.1: 19
    • FMT_MOF.1.1: 1
    • FMT_MSA: 1
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 1
    • FMT_MSA.2: 32
    • FMT_MSA.2.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 18
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV.1: 11
    • FMT_REV.1.1: 1
    • FMT_REV.1.2: 1
    • FMT_SAE: 1
    • FMT_SAE.1: 12
    • FMT_SAE.1.1: 1
    • FMT_SAE.1.2: 1
    • FMT_SMF.1: 12
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 27
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_ITC: 10
    • FPT_ITC.1: 1
    • FPT_ITI.1: 12
    • FPT_ITI.1.1: 1
    • FPT_ITI.1.2: 1
    • FPT_ITT: 10
    • FPT_ITT.1: 12
    • FPT_ITT.1.1: 1
    • FPT_PHP.1: 2
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_SAE: 1
    • FPT_SSP: 2
    • FPT_SSP.1: 5
    • FPT_SSP.1.1: 1
    • FPT_STM.1: 5
  • FTP:
    • FTP_ITC.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • A:
    • A.CPS: 3
  • O:
    • O.CPS: 3
  • OE:
    • OE.CPS: 3
pdf_data/st_keywords/vendor
  • Cisco:
    • Cisco: 3
  • Microsoft:
    • Microsoft: 1
  • Oberthur:
    • Oberthur Card Systems: 1
pdf_data/st_keywords/symmetric_crypto
  • DES:
    • 3DES:
      • 3DES: 5
    • DES:
      • DES: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
  • FF:
    • DSA:
      • DSA: 20
  • RSA:
    • RSA 1024: 8
pdf_data/st_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 14
  • SHA:
    • SHA1:
      • SHA-1: 35
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 2
  • VPN:
    • VPN: 4
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 4
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 180: 1
    • FIPS 186: 1
    • FIPS 46-3: 1
  • ISO:
    • ISO/IEC 15408: 4
  • PKCS:
    • PKCS #11: 1
    • PKCS #7: 1
    • PKCS 1: 1
    • PKCS#11: 4
    • PKCS#12: 5
    • PKCS#7: 3
    • PKCS11: 4
    • PKCS12: 3
    • PKCS7: 3
  • RFC:
    • RFC 13: 1
    • RFC1321: 6
    • RFC3280: 1
  • X509:
    • X.509: 52
pdf_data/st_keywords/javacard_packages
  • java:
    • java.dll: 1
    • java.exe: 1
    • java.js: 4
    • java.policy: 1
    • java.security: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority: 1
    • are cryptographic in nature and therefore the assessment of their algorithmic strength is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
    • out of scope: 4
    • protocol handlers: Web Handler, email Handler, SCEP Handler, and CMP Handler (the CMP Handler is out of scope of the evaluation.) · Web RA Operator (WebRAO) The relationship between these components is shown: 1
    • the CMP Handler is out of scope of the evaluation: 1
    • to cryptographic SFRs). The assessment of the algorithmic strength used by these functions is out of scope of the evaluation, being assessed by the National Authority. However one mechanism does require a: 1
    • users who have no role in the PKI, but have certificates issued by the PKI. Their activities are out of scope of the evaluation. 9.3 Information Flow Control Policy This ST contains one information flow: 1
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164335+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164335+00'00'
  • /Title:
  • pdf_file_size_bytes: 487151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /CreationDate: D:20061222014648+11'00'
  • /Creator: AdobePS5.dll Version 5.2
  • /ModDate: D:20061222014648+11'00'
  • /Producer: Acrobat Distiller 5.0.5 (Windows)
  • /Title: Microsoft Word - Baltimore UniCERT 5 Security Target v5.0ab2.doc
  • pdf_file_size_bytes: 1406278
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 266
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different