Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Smart card reader SPR532 Firmware version 5.09
BSI-DSZ-CC-0363-2006
RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
CCEVS-VR-VID-10380-2012
name Smart card reader SPR532 Firmware version 5.09 RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
category Products for Digital Signatures Other Devices and Systems
scheme DE US
not_valid_after 01.09.2019 31.12.2014
not_valid_before 22.12.2006 21.12.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0363a.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-vr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0363b.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10380-st.pdf
manufacturer SCM Microsystems GmbH RIOREY Incorporated
manufacturer_web https://www.scmmicro.com/ https://www.riorey.com/
security_level ADO_DEL.2, AVA_VLA.4, AVA_MSU.3, ADV_LLD.1, ALC_TAT.1, ADV_IMP.1, EAL3+ EAL4+, ALC_FLR.1
dgst b80b22f99b5aa61f 7f09c099abfb5dbf
heuristics/cert_id BSI-DSZ-CC-0363-2006 CCEVS-VR-VID-10380-2012
heuristics/cert_lab BSI US
heuristics/extracted_sars ASE_ENV.1, ADV_RCR.1, ASE_INT.1, ADV_HLD.2, AGD_USR.1, ASE_REQ.1, ASE_DES.1, AVA_SOF.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, AGD_ADM.1, ATE_FUN.1, ATE_DPT.1, ALC_DVS.1, AVA_VLA.4, ADV_FSP.1, ASE_SRE.1, ASE_OBJ.1, ATE_IND.2, ADV_LLD.1, AVA_MSU.3 AGD_PRE.1, ALC_DVS.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ALC_CMS.4, ALC_CMC.4, ATE_FUN.1, ALC_DEL.1, ADV_FSP.4, ATE_IND.2, ALC_LCD.1, AGD_OPE.1, ADV_ARC.1, ADV_TDS.3, ATE_DPT.1, AVA_VAN.3, ADV_IMP.1
heuristics/extracted_versions 5.09 5.0.12
heuristics/scheme_data
  • category: Miscellaneous
  • certification_date: 21.12.2012
  • evaluation_facility: CygnaCom Solutions, Inc
  • expiration_date: 21.12.2014
  • id: CCEVS-VR-VID10380
  • product: RioRey™ Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10380
  • vendor: RioRey, Inc.
pdf_data/report_filename 0363a.pdf st_vid10380-vr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0363-2006
    • cert_item: Smart card reader SPR532 Firmware version 5.09
    • cert_lab: BSI
    • developer: SCM Microsystems GmbH
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • US:
  • DE:
  • US:
    • cert_id: CCEVS-VR-VID10380-2012
    • cert_item: RioRey Perimeter Protection Platform (RE500, RE1500, RX1800, RX2300, RX4400 and RG) with RIOS Software version 5.0.12sp8) and rView Software version 5.0.12sp9
    • cert_lab: US NIAP
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0363: 1
    • BSI-DSZ-CC-0363-2006: 18
  • US:
    • CCEVS-VR-VID10380-2012: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 4: 1
    • EAL 7: 1
    • EAL1: 5
    • EAL2: 3
    • EAL3: 9
    • EAL3 augmented: 4
    • EAL3+: 2
    • EAL4: 8
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • EAL:
    • EAL 4: 8
    • EAL 4 augmented: 1
pdf_data/report_keywords/cc_sar
  • ACM:
    • ACM_AUT: 2
    • ACM_CAP: 2
    • ACM_CAP.3: 1
    • ACM_SCP: 2
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL: 2
    • ADO_DEL.2: 5
    • ADO_IGS: 2
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP: 2
    • ADV_FSP.1: 1
    • ADV_HLD: 2
    • ADV_HLD.2: 1
    • ADV_IMP: 2
    • ADV_IMP.1: 5
    • ADV_INT: 2
    • ADV_LLD: 2
    • ADV_LLD.1: 5
    • ADV_RCR: 2
    • ADV_RCR.1: 1
    • ADV_SPM: 2
  • AGD:
    • AGD_ADM: 2
    • AGD_ADM.1: 1
    • AGD_USR: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS: 2
    • ALC_DVS.1: 1
    • ALC_FLR: 2
    • ALC_LCD: 1
    • ALC_TAT: 2
    • ALC_TAT.1: 5
  • ASE:
    • ASE_DES.1: 1
    • ASE_ENV.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.1: 1
    • ASE_REQ.1: 1
    • ASE_SRE.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 2
    • ATE_COV.2: 1
    • ATE_DPT: 2
    • ATE_DPT.1: 1
    • ATE_FUN: 2
    • ATE_FUN.1: 1
    • ATE_IND: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_CCA: 2
    • AVA_MSU: 2
    • AVA_MSU.3: 6
    • AVA_SOF: 3
    • AVA_SOF.1: 1
    • AVA_VLA: 3
    • AVA_VLA.2: 1
    • AVA_VLA.3: 1
    • AVA_VLA.4: 7
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 2
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.4: 2
    • ALC_DEL.1: 2
    • ALC_DVS.1: 2
    • ALC_FLR.1: 4
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 3
  • AVA:
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_COP.1: 1
  • FDP:
    • FDP_ACC.1: 1
    • FDP_ACF.1: 1
    • FDP_RIP.2: 1
  • FPT:
    • FPT_PHP.1: 1
  • FTA:
    • FTA_TAB.1: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.DOWNLOAD: 1
    • T.REVEAL: 1
    • T.SEAL: 1
    • T.STORE: 1
  • A:
    • A.BACKUP: 1
    • A.CONNECT: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA-1024: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 3
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
    • BSI 7149: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 34: 3
  • ISO:
    • ISO/IEC 15408:2005: 2
    • ISO/IEC 7816-4: 5
  • RFC:
    • RFC 1858: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • 7] Evaluation Technical Report, 1.4, 10/20/2006, CC Evaluation of SmartCardReader SPR532 (confidential document) [8] Gesetz über Rahmenbedingungen für elektronische Signaturen (Signaturgesetz – SigG) in der: 1
pdf_data/report_metadata
  • /Author: Bundesamt für Sicherheit in der Informationstechnik
  • /Company: BSI, Postfach 200363, 53133 Bonn
  • /CreationDate: D:20070103150534+01'00'
  • /Creator: Acrobat PDFMaker 7.0.7 für Word
  • /Keywords: Common Criteria, Certification, Zertifizierung, Smart card reader SPR532, SMC Microsystems GmbH
  • /ModDate: D:20070111140929+01'00'
  • /Producer: Acrobat Distiller 7.0.5 (Windows)
  • /SourceModified: D:20070103140515
  • /Title: Certification Report BSI-DSZ-CC-0363-2006
  • pdf_file_size_bytes: 323408
  • pdf_hyperlinks: http://scmmicro.com/security/pcs_product_drivers.html, http://www.bundesnetzagentur.de/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 38
pdf_data/st_filename 0363b.pdf st_vid10380-st.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0363: 45
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL3: 3
    • EAL3+: 2
  • EAL:
    • EAL4+: 6
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_CAP.3: 2
    • ACM_SCP.1: 1
  • ADO:
    • ADO_DEL.2: 4
    • ADO_IGS.1: 1
  • ADV:
    • ADV_FSP.1: 2
    • ADV_HLD.2: 2
    • ADV_IMP: 1
    • ADV_IMP.1: 3
    • ADV_LLD.1: 4
    • ADV_RCR.1: 2
  • AGD:
    • AGD_ADM.1: 2
    • AGD_USR.1: 1
  • ALC:
    • ALC_DVS.1: 2
    • ALC_TAT: 1
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 1
    • ATE_FUN.1: 2
    • ATE_IND.2: 1
  • AVA:
    • AVA_MSU: 1
    • AVA_MSU.3: 3
    • AVA_SOF.1: 1
    • AVA_VLA.4: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.1: 3
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 2
pdf_data/st_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 4
    • FCS_CKM.4: 4
    • FCS_COP: 16
  • FDP:
    • FDP_ACC: 1
    • FDP_ACC.1: 7
    • FDP_ACF: 1
    • FDP_ACF.1: 13
    • FDP_ITC.1: 4
    • FDP_RIP: 1
    • FDP_RIP.2: 6
  • FMT:
    • FMT_MOF.1: 2
    • FMT_MSA.2: 4
    • FMT_MSA.3: 2
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 6
  • FTA:
    • FTA_TAB: 1
    • FTA_TAB.1: 6
  • FAU:
    • FAU_GEN: 2
    • FAU_GEN.1: 17
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 11
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 8
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 7
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_UAU_EXT.2: 1
  • FIA:
    • FIA_ATD.1: 8
    • FIA_ATD.1.1: 1
    • FIA_UAU: 3
    • FIA_UAU.1: 2
    • FIA_UAU.5: 7
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU_EXT.2: 14
    • FIA_UAU_EXT.2.1: 3
    • FIA_UID: 1
    • FIA_UID.1: 8
    • FIA_UID.2: 7
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MTD.1: 14
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 8
    • FPT_ITT.1.1: 1
    • FPT_STM.1: 2
  • FRU:
    • FRU_DDOS: 2
    • FRU_DDOS_EXT.1: 13
    • FRU_DDOS_EXT.1.1: 3
    • FRU_DDOS_EXT.1.2: 3
    • FRU_DDOS_EXT.1.3: 3
pdf_data/st_keywords/cc_claims
  • O:
    • O.DOWNLOAD: 3
    • O.INS_BYTE: 3
    • O.REVEAL: 5
    • O.SEAL: 5
    • O.SIGNAL: 3
    • O.STORE: 2
    • O.TRANSFER: 2
  • OE:
    • OE.FWLOAD: 3
    • OE.ISO_EMV: 1
    • OE.KEYPAD: 1
    • OE.LED: 2
    • OE.SEAL: 3
    • OE.SIG_APP: 1
    • OE.STORE: 2
    • OE.UNOBSERV: 1
    • OE.USAGE: 2
    • OE.VERSION: 1
  • OP:
    • OP.F_DOWNLD: 2
    • OP.L_CONTROL: 2
    • OP.P_ENTRY: 2
    • OP.P_VERIFY: 1
  • T:
    • T.DOWNLOAD: 3
    • T.REVEAL: 3
    • T.SEAL: 1
    • T.STORE: 1
  • A:
    • A.BACKUP: 3
    • A.CONNECT: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 3
  • O:
    • O.AUDIT: 10
    • O.DDOSALERT: 5
    • O.DDOSMITIGATE: 6
    • O.FAILSAFE: 6
    • O.IDAUTH: 9
    • O.MANAGE: 8
    • O.PROCOM: 5
    • O.TRANSMISSION: 1
  • OE:
    • OE.AUDIT: 4
    • OE.BACKUP: 3
    • OE.CONNECT: 3
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 3
    • OE.TIME: 5
  • T:
    • T.AUDIT: 4
    • T.DDOSATTACK: 3
    • T.FAILURE: 3
    • T.MANAGE: 3
    • T.NOAUTH: 3
    • T.PROCOM: 3
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 2
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
  • CTR:
    • CTR: 1
pdf_data/st_keywords/vulnerability
  • CVE:
    • CVE-2008-5161: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 2
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS180-1: 1
  • ISO:
    • ISO/IEC 10118-3: 1
    • ISO/IEC 14888-3: 1
    • ISO/IEC 7816: 2
    • ISO/IEC 7816-4: 15
  • RFC:
    • RFC 1858: 2
    • RFC 1918: 1
    • RFC1858: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • software which controls the serial port, such as HyperTerminal, must be used. This interface is out of scope as it should only be used for setup or recovery of the TOE. RioRey Security Target 18 WebUI: 1
pdf_data/st_metadata
  • /Author: TMaykranz
  • /CreationDate: D:20060607160755Z
  • /Creator: FreePDF XP Beta 20 - http://shbox.de
  • /ModDate: D:20070123102904+01'00'
  • /Producer: AFPL Ghostscript 8.0
  • /Title: Security_Target_SPR532_121
  • pdf_file_size_bytes: 288292
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 45
  • /CreationDate: D:20130115104027
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20130115104027
  • /Producer: Microsoft® Office Word 2007
  • pdf_file_size_bytes: 1295508
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 61
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different