Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Thinklogical TLX320 Matrix Switch
SERTIT-076
TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
JISEC-CC-CRP-C0388
name Thinklogical TLX320 Matrix Switch TOSHIBA e-STUDIO2555C/3055C/3555C/4555C/5055C/2555CSE/3055CSE/3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS Version: SYS V1.0
category Other Devices and Systems Multi-Function Devices
scheme NO JP
not_valid_after 22.09.2021 01.05.2018
not_valid_before 22.09.2016 26.04.2013
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_erpt2.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ThinklogicalSecurityTarget_1_3_TLX320.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0388_est.pdf
manufacturer Thinklogical Toshiba TEC Corporation
manufacturer_web https://www.thinklogical.com/ https://www.toshibatec.co.jp/en/
security_level EAL4 EAL3+, ALC_FLR.2
dgst a67b05a18bbe6cfc a7263024c5c36e3f
heuristics/cert_id SERTIT-076 JISEC-CC-CRP-C0388
heuristics/extracted_sars ASE_INT.1, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, ATE_DPT.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ASE_REQ.2, ALC_DVS.1, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 ASE_INT.1, AVA_VAN.2, ALC_CMC.3, ALC_CMS.3, ASE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ADV_TDS.2, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ATE_DPT.1, ALC_FLR.2, ASE_REQ.2, ALC_DVS.1, ATE_IND.2, ADV_FSP.3, ASE_CCL.1
heuristics/extracted_versions - 1.0
heuristics/scheme_data
  • category: Other Devices and Systems
  • certification_date: 22.09.2016
  • developer: Thinklogical
  • enhanced:
    • category: Other Devices and Systems
    • cert_id: SERTIT-076
    • certification_date: 22.09.2016
    • description: The TOE provides remote connections from a set of shared computers to a set of shared peripherals. The switching capability of the TOE is used to connect ports on a particular computer to a particular peripheral set. The corresponding electronic signal from a computer port is transformed into an optical signal by the Velocity extender, transmitted through an optical fiber, switched by the TOE to another optical fiber, and then transformed back to an electronic form by the Velocity extender. The resulting signal is used by the shared peripherals. The TOE provides a capability to dynamically change the switching configuration to connect a particular computer to a particular peripheral set. The TOE enforces secure separation of information flows corresponding to different switched connections. The corresponding Data Separation Security Policy is the main security feature of the TOE.
    • developer: Thinklogical
    • documents: frozendict({'cert': [frozendict({'href': 'https://sertit.no/getfile.php/135040-1607952626/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20C%20v1.0.pdf'})], 'target': [frozendict({'href': 'https://sertit.no/getfile.php/135043-1607952629/SERTIT/Sertifikater/2016/76/ThinklogicalSecurityTarget_1_3_TLX320.pdf'})], 'report': [frozendict({'href': 'https://sertit.no/getfile.php/135046-1607952632/SERTIT/Sertifikater/2016/76/20160922%20Sertit-076%20CR%20v1.0%20Certification%20Report%20TLX320.pdf'})]})
    • evaluation_facility: Norconsult AS
    • level: EAL 4
    • mutual_recognition: CCRA, SOG-IS
    • product: TLX320 Matrix Switch Chassis (TLX-MSC-000320 Rev A), TLX48 / TLX320 Matrix Switch Data Input and Output Card, 16 Ports, SFP+, Multi-Mode (TLX-MSD-M00016 Rev A), Single Mode (TLX-MSDS00016 Rev A), Velocity Matrix Switch 320 Data Input Retimer Card, 16 Ports, SFP+, Multi-Mode (VXM-D00T16 Rev A), Single Mode (VXM-D0ST16 Rev A)
  • product: Thinklogical TLX320 Matrix Switch
  • url: https://sertit.no/certified-products/product-archive/thinklogical-tlx320-matrix-switch
  • cert_id: JISEC-CC-CRP-C0388
  • certification_date: 01.04.2013
  • claim: EAL3+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL3 Augmented with ALC_FLR.2
    • cc_version: 3.1
    • cert_link: https://www.ipa.go.jp/en/security/c0388_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is a Multifunction Peripheral (MFP) that has the functions, such as copy, print, scan, filing, and internet fax. In general office environment, it is assumed that MFPs are utilized from the control panel of the TOE or the user terminal connected to LAN or USB with the TOE. TOE Security functions The TOE provides the following security features: - User Authentication function Function that allows the use of the TOE to only users who succeeded in the identification and authentication. - User Access Control function Function to perform the control of permit/ deny for the operation of various functions and user data, based on the privileges granted to the users who are identified and authenticated. - Secure Erase function Function to erase and overwrite the area in the HDD, where the document data has been stored, upon completion of copy function, etc. - Secure Channel function Function to protect communication data using the SSL protocol when the TOE communicates with the various servers or client PC. - Data Encryption function Function to encrypt and decrypt the document data stored in the HDD of the TOE. - Audit Data Generation and Review function Function to generate security audit log when security events occurred to be audited, and to allow only specific administrators to view that log. - TSF Data Protection function Function that allows the change of TOE configuration information only to the TOE administrator. - TSF Self Protection function Function to verify the integrity of the executable code of the security features. If any abnormalities are detected TOE will be unusable.
    • evaluation_facility: Information Technology Security Center Evaluation Department
    • product: TOSHIBA e-STUDIO2555C/3055C/ 3555C/4555C/5055C/2555CSE/3055CSE/ 3555CSE/4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS
    • product_type: Multifunction Peripheral
    • protection_profile: IEEE Std 2600.1-2009
    • report_link: https://www.ipa.go.jp/en/security/c0388_erpt2.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0388_est.pdf
    • toe_version: SYS V1.0
    • vendor: Toshiba Tec Corporation
  • expiration_date: 01.05.2018
  • supplier: Toshiba Tec Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0388_it2432.html
  • toe_overseas_name: TOSHIBA e-STUDIO 2555C/3055C/3555C/ 4555C/5055C/2555CSE/3055CSE/3555CSE/ 4555CSE/5055CSE MULTIFUNCTIONAL DIGITAL SYSTEMS SYS V1.0
heuristics/protection_profiles {} 32475ccb695b1644
protection_profile_links {} https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_hcd_br_v1.0.pdf
pdf_data/report_filename 20160922 Sertit-076 CR v1.0 Certification Report TLX320.pdf c0388_erpt2.pdf
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-076: 16
  • JP:
    • CRP-C0388-02: 1
    • Certification No. C0388: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 1
    • EAL 4: 19
    • EAL1: 1
    • EAL7: 1
  • EAL:
    • EAL3: 4
    • EAL3 augmented: 2
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR: 1
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ALC:
    • ALC_FLR.2: 4
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 1
    • FDP_IFC.1: 1
    • FDP_IFF.1: 1
    • FDP_ITC.1: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.EMISSIO: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
    • A.SCENARIO: 1
  • O:
    • O.CONF: 1
    • O.CONNECT: 1
  • OE:
    • OE.EMISSIO: 1
    • OE.MANAGE: 1
    • OE.NOEVIL: 1
    • OE.PHYSICAL: 1
    • OE.SCENARIO: 1
  • T:
    • T.ATTACK: 1
    • T.INSTALL: 1
    • T.RESIDUAL: 1
    • T.STATE: 1
  • A:
    • A.ACCESS: 1
    • A.ADMIN: 2
    • A.USER: 1
  • D:
    • D.CONF: 1
    • D.DOC: 2
    • D.FUNC: 1
    • D.PROT: 2
  • T:
    • T.CONF: 4
    • T.DOC: 4
    • T.FUNC: 2
    • T.PROT: 2
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Microsoft:
    • Microsoft: 1
pdf_data/report_keywords/eval_facility
  • Norconsult:
    • Norconsult AS: 1
  • ITSC:
    • Information Technology Security Center: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
pdf_data/report_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 8
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • malfunction: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ISO:
    • ISO/IEC 15408: 4
  • CC:
    • CCMB-2009-07-001: 2
    • CCMB-2009-07-002: 2
    • CCMB-2009-07-003: 2
    • CCMB-2009-07-004: 2
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • a user to create an e-Filing Box. Specific users or TOE administrators can save, print and edit confidential documents. Internet Fax function A function that allows scanned document data to be sent as a TIFF-FX: 1
  • OutOfScope:
    • out of scope: 1
    • that the reliability of the hardware and the cooperating software shown in this configuration is out of scope in the evaluation. Those are assumed to be trustworthy. CRP-C0388-02 12 4.3 Clarification of Scope: 1
pdf_data/report_metadata
  • /AAPL:Keywords: ['ugradert']
  • /Author: Rage, Arne Høye
  • /CreationDate: D:20160922162516Z00'00'
  • /Creator: Microsoft Word
  • /Keywords: ugradert
  • /ModDate: D:20160922162516Z00'00'
  • /Producer: Mac OS X 10.11.6 Quartz PDFContext
  • /Title: tittel
  • pdf_file_size_bytes: 875983
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 17
  • /CreationDate: D:20130619094434+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20130619094506+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 367918
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 37
pdf_data/st_filename ThinklogicalSecurityTarget_1_3_TLX320.pdf c0388_est.pdf
pdf_data/st_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10340-2009: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 4: 1
    • EAL4: 7
  • EAL:
    • EAL 3: 1
    • EAL 3 augmented: 1
    • EAL3: 2
    • EAL3 augmented: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.4: 2
    • ADV_IMP.1: 2
    • ADV_TDS.3: 2
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.2: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_VAN.3: 2
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.3: 1
    • ADV_TDS.2: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.3: 1
    • ALC_CMS.3: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 4
    • ALC_LCD.1: 1
  • APE:
    • APE_REQ: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF.1: 7
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_ITC.1: 7
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA.3: 3
  • FAU:
    • FAU_GEN: 1
    • FAU_GEN.1: 18
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.2: 9
    • FAU_SAR.2.1: 1
    • FAU_STG.1: 11
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 1
    • FAU_STG.4: 9
    • FAU_STG.4.1: 1
  • FCS:
    • FCS_CKM.1: 2
    • FCS_CKM.4: 2
    • FCS_COP.1: 9
    • FCS_COP.1.1: 1
  • FDP:
    • FDP_ACC.1: 37
    • FDP_ACC.1.1: 2
    • FDP_ACF.1: 29
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC: 1
    • FDP_IFC.1: 2
    • FDP_IFF: 1
    • FDP_ITC.1: 2
    • FDP_ITC.2: 2
    • FDP_RIP.1: 8
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 1
    • FIA_SOS.1: 10
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 13
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.7: 10
    • FIA_UAU.7.1: 1
    • FIA_UID.1: 19
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 8
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 12
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 22
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 22
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 2
    • FMT_SMF.1: 22
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 26
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FDI_EXP: 2
    • FPT_FDI_EXP.1: 14
    • FPT_FDI_EXP.1.1: 2
    • FPT_STM.1: 10
    • FPT_STM.1.1: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 9
    • FTA_SSL.3.1: 1
  • FTP:
    • FTP_ITC.1: 9
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.EMISSION: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
    • A.SCENARIO: 2
  • O:
    • O.CONF: 7
    • O.CONNECT: 3
    • O.CRYPTOGRAPHY: 1
  • OE:
    • OE.EMISSION: 2
    • OE.INSTAL: 1
    • OE.MANAGE: 4
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
    • OE.SCENARIO: 2
  • T:
    • T.ATTACK: 3
    • T.COMINT: 1
    • T.INSTALL: 3
    • T.RESIDUAL: 3
    • T.STATE: 3
  • A:
    • A: 2
    • A.ACCESS: 3
    • A.ADMIN: 6
    • A.USER: 3
  • D:
    • D.CONF: 7
    • D.DOC: 48
    • D.FUNC: 12
    • D.PROT: 6
  • O:
    • O.AUDIT: 7
    • O.AUDIT_ACCESS: 5
    • O.AUDIT_ACCESS_AUTHORIZED: 1
    • O.AUDIT_STORAGE: 6
    • O.AUDIT_STORAGE_PROTECTED: 1
    • O.CONF: 14
    • O.CRYPTOGRAPHY: 7
    • O.DOC: 23
    • O.FUNC: 7
    • O.INTERFACE: 7
    • O.PROT: 7
    • O.SOFTWARE: 5
    • O.USER: 11
  • OE:
    • OE.ADMIN: 6
    • OE.AUDIT: 3
    • OE.AUDIT_ACCESS: 1
    • OE.AUDIT_STRAGE: 1
    • OE.INTERFACE: 3
    • OE.PHYISCAL: 1
    • OE.PHYSICAL: 2
    • OE.USER: 12
  • T:
    • T.CONF: 6
    • T.DOC: 6
    • T.FUNC: 3
    • T.PROT: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 4
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • SSL:
      • SSL: 15
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • malfunction: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS PUB 197: 1
pdf_data/st_keywords/certification_process
  • ConfidentialDocument:
    • e-Filing that each user can create. It is suitable for specific users or U.ADMINISTRATOR to store confidential documents. In addition user can operate various functions to the document such as print/edit/manage, etc. (5: 1
pdf_data/st_metadata
  • /Author: MICHELE ROBERTS
  • /CreationDate: D:20160922164335+00'00'
  • /Creator: Microsoft Word
  • /ModDate: D:20160922164335+00'00'
  • /Title:
  • pdf_file_size_bytes: 487151
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 22
  • /Author: TOSHIBA TEC CORPORATION
  • /CreationDate: D:20130417131602+09'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: IEEE 2600.1™-2009 EAL3+ALC_FLR.2
  • /ModDate: D:20130417135319+09'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Security Target
  • /Title: SecurityTarget
  • pdf_file_size_bytes: 1417924
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 65
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different