Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
JISEC-CC-CRP-C0475
AKIS GEZGIN_I v1.0.0.0 BAC Configuration with Active Authentication
21.0.03/TSE-CCCS-49
name Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8 AKIS GEZGIN_I v1.0.0.0 BAC Configuration with Active Authentication
category Databases ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme JP TR
not_valid_after 01.07.2020 20.02.2021
not_valid_before 16.06.2015 21.02.2018
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_erpt.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKIS_GEZGIN_I_v1.0.0.0_BAC_with_Active_Authentication_CR_20180220.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0475_est.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/AKiS%20GEZGiN_I%20BAC%20&%20AA%20Security%20Target%20Lite.pdf
manufacturer Microsoft Corporation TÜBİTAK BİLGEM UEKAE
manufacturer_web https://www.microsoft.com https://www.uekae.tubitak.gov.tr
security_level EAL2+, ALC_FLR.2 EAL4+, ALC_DVS.2
dgst c225189611bed8f2 51bab7ff97ad0fb4
heuristics/cert_id JISEC-CC-CRP-C0475 21.0.03/TSE-CCCS-49
heuristics/extracted_sars ALC_CMS.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, ADV_ARC.1, AVA_VAN.2, ADV_FSP.2, ALC_FLR.2, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ALC_FLR.1, ALC_TAT.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AVA_VAN.3, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions 12.0.2000.8 1.0.0.0
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0475
  • certification_date: 01.06.2015
  • claim: EAL2+ ALC_FLR.2 PP
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.2
    • cc_version: 3.1 Release4
    • cert_link: https://www.ipa.go.jp/en/security/c0475_eimg.pdf
    • description: PRODUCT DESCRIPTION Description of TOE The TOE is the database engine of SQL Server 2014. SQL Server is a Database Management System (DBMS). The TOE has been developed as the core module of the DBMS to store and manage data in a secure way. TOE security functionality This TOE provides the following security functionality: - The Access Control function of the TOE controls the access of users to user data and metadata stored in the TOE. - The Session Handling function of the TOE limits the possibilities of users to establish sessions with the TOE. - The Security Audit function of the TOE produces log files about all security relevant events. - The Security Management function allows authorized administrators to manage the behavior of the security functionality of the TOE. - The Identification and Authentication function of the TOE is able to identify and authenticate users. - The Residual Information Protection function of the TOE overwrites the residual information on the memory that will be used for user sessions.
    • evaluation_facility: TÜV Informationstechnik GmbH, Evaluation Body for IT-Security
    • product: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)
    • product_type: Database Management System (DBMS)
    • protection_profile: U.S. Government Protection Profile for Database Management Systems, Version 1.3
    • report_link: https://www.ipa.go.jp/en/security/c0475_erpt.pdf
    • target_link: https://www.ipa.go.jp/en/security/c0475_est.pdf
    • toe_version: 12.0.2000.8
    • vendor: Microsoft Corporation
  • expiration_date: 01.07.2020
  • supplier: Microsoft Corporation
  • toe_japan_name: -----
  • toe_overseas_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0475_it3480.html
  • toe_overseas_name: Microsoft SQL Server 2014 Database Engine Enterprise Edition x64 (English)12.0.2000.8
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V4-2018
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V4-2018
heuristics/protection_profiles 61018742063aaca9 60455fc9564e2545
maintenance_updates
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_dbms_v1.3.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp0055b.pdf
pdf_data/report_filename c0475_erpt.pdf AKIS_GEZGIN_I_v1.0.0.0_BAC_with_Active_Authentication_CR_20180220.pdf
pdf_data/report_keywords/cc_cert_id
  • JP:
    • CRP-C0475-01: 1
    • Certification No. C0475: 1
  • DE:
    • BSI-DSZ-CC-0782-V2-2015-RA-01: 1
  • TR:
    • 21.0.03/TSE-CCCS-49: 2
pdf_data/report_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0055: 1
    • BSI-PP-0035: 2
    • BSI-PP-0055: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL2: 4
    • EAL2 augmented: 3
    • EAL2+: 2
  • EAL:
    • EAL 4: 1
    • EAL 4+: 5
    • EAL 6+: 1
    • EAL2: 1
    • EAL4+: 1
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 1
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.2: 4
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.NO_EVIL: 1
    • A.NO_GENERAL_: 1
    • A.PHYSICAL: 1
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 1
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 1
    • T.TSF_COMPROMISE: 1
    • T.UNAUTHORIZED_: 1
    • T.UNIDENTIFIED_: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 20
    • Microsoft Corporation: 7
  • Infineon:
    • Infineon: 1
    • Infineon Technologies: 2
pdf_data/report_keywords/eval_facility
  • TUV:
    • TÜV Informationstechnik: 4
  • TUBITAK-BILGEM:
    • TÜBİTAK BİLGEM: 7
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
  • DES:
    • DES:
      • DES: 1
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 1
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 2
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • DFA: 1
    • Malfunction: 2
    • Physical Tampering: 1
    • malfunction: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
pdf_data/report_keywords/ic_data_group
  • EF:
    • EF.DG14: 1
    • EF.DG15: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 2
  • CC:
    • CCMB-2012-09-001: 1
    • CCMB-2012-09-002: 1
    • CCMB-2012-09-003: 1
    • CCMB-2012-09-004: 1
  • ICAO:
    • ICAO: 5
  • ISO:
    • ISO/IEC 17025: 2
pdf_data/report_keywords/javacard_packages
  • org:
    • org.tr: 1
pdf_data/report_metadata
  • /CreationDate: D:20150724094408+09'00'
  • /Creator: Microsoft® Word 2010
  • /ModDate: D:20150724094442+09'00'
  • /Producer: Microsoft® Word 2010
  • pdf_file_size_bytes: 233021
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: True
  • pdf_number_of_pages: 31
  • /Author: Cengiz GÖREN
  • /CreationDate: D:20191213133215+03'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20191213133215+03'00'
  • /Producer: Microsoft® Word 2019
  • pdf_file_size_bytes: 490817
  • pdf_hyperlinks: http://www.commoncriteriaportal.org/
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 21
pdf_data/st_filename c0475_est.pdf AKiS GEZGiN_I BAC & AA Security Target Lite.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V4-2018: 1
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-CC-PP-0035-2007: 1
    • BSI-CC-PP-0055: 6
    • BSI-CC-PP-0068-V2-2011: 1
    • BSI-PP-0035: 1
    • BSI-PP-0055: 1
    • BSI-PP-0056: 1
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 2
    • EAL2 augmented: 2
    • EAL2+: 51
  • EAL:
    • EAL 6+: 1
    • EAL4: 8
    • EAL4 augmented: 2
    • EAL6: 3
    • EAL6+: 2
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 2
    • ADV_FSP.2: 1
  • AGD:
    • AGD_ADD: 3
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR: 1
    • ALC_FLR.2: 4
  • ATE:
    • ATE_COV.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ALC:
    • ALC_DVS.2: 6
    • ALC_FLR.1: 1
  • APE:
    • APE_SRE: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 10
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_SEL: 8
    • FAU_SEL.1: 2
    • FAU_STG: 3
    • FAU_STG.1: 2
    • FAU_STG.3: 1
    • FAU_STG.4: 1
    • FAU_STG_EXP: 2
    • FAU_STG_EXP.5: 15
    • FAU_STG_EXP.5.1: 2
  • FDP:
    • FDP_ACC.1: 10
    • FDP_ACC.1.1: 1
    • FDP_ACF: 8
    • FDP_ACF.1: 6
    • FDP_IFC.1: 1
    • FDP_RIP.1: 6
    • FDP_RIP.1.1: 1
  • FIA:
    • FIA_ATD.1: 10
    • FIA_ATD.1.1: 2
    • FIA_UAU.2: 8
    • FIA_UAU.2.1: 1
    • FIA_UAU.5: 8
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 11
    • FIA_UID.2: 12
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 6
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 8
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 7
    • FMT_MTD.1.1: 1
    • FMT_REV.1: 16
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 14
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_STM.1: 1
    • FPT_TRC.1: 6
    • FPT_TRC.1.1: 1
    • FPT_TRC.1.2: 1
  • FTA:
    • FTA_MCS.1: 6
    • FTA_MCS.1.1: 1
    • FTA_MCS.1.2: 1
    • FTA_TAH.1: 8
    • FTA_TAH.1.1: 1
    • FTA_TAH.1.2: 1
    • FTA_TAH.1.3: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FAU:
    • FAU_GEN: 1
    • FAU_SAS: 4
    • FAU_SAS.1: 13
    • FAU_SAS.1.1: 2
  • FCS:
    • FCS_CKM.1: 24
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 1
    • FCS_CKM.4: 19
    • FCS_CKM.4.1: 1
    • FCS_COP: 54
    • FCS_COP.1: 6
    • FCS_RND: 5
    • FCS_RND.1: 16
    • FCS_RND.1.1: 1
  • FDP:
    • FDP_ACC.1: 15
    • FDP_ACC.1.1: 1
    • FDP_ACF: 1
    • FDP_ACF.1: 12
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 2
    • FDP_ITC: 1
    • FDP_ITC.1: 6
    • FDP_ITC.2: 6
    • FDP_MSA.3: 1
    • FDP_UCT.1: 12
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 12
    • FDP_UIT.1.1: 1
    • FDP_UIT.1.2: 1
  • FIA:
    • FIA_AFL.1: 8
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_API: 12
    • FIA_API.1: 7
    • FIA_SOS.2: 1
    • FIA_UAU.1: 10
    • FIA_UAU.1.1: 1
    • FIA_UAU.1.2: 1
    • FIA_UAU.4: 13
    • FIA_UAU.4.1: 1
    • FIA_UAU.5: 11
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UAU.6: 10
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
  • FMT:
    • FMT_LIM: 4
    • FMT_LIM.1: 19
    • FMT_LIM.1.1: 2
    • FMT_LIM.2: 18
    • FMT_LIM.2.1: 2
    • FMT_MSA.3: 1
    • FMT_MTD: 39
    • FMT_MTD.1: 4
    • FMT_SMF.1: 17
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_FLS.1: 10
    • FPT_FLS.1.1: 1
    • FPT_PHP.3: 10
    • FPT_PHP.3.1: 1
    • FPT_TST: 1
    • FPT_TST.1: 8
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 2
  • FTP:
    • FTP_ITC.1: 3
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.NO_EVIL: 3
    • A.NO_GENERAL_PURPOSE: 3
    • A.PHYSICAL: 3
  • O:
    • O.ACCESS_HISTORY: 5
    • O.ADMIN_GUIDANCE: 1
    • O.ADMIN_ROLE: 4
    • O.AUDIT_: 1
    • O.AUDIT_GENERATION: 4
    • O.CONFIGURATION_IDENTIFICATION: 1
    • O.DOCUMENTED_DESIGN: 1
    • O.INTERNAL_TOE_DOMAINS: 1
    • O.MANAGE: 6
    • O.MEDIATE: 5
    • O.PARTIAL_FUNCTIONAL_TEST: 1
    • O.PARTIAL_SELF_PROTECTION: 1
    • O.RESIDUAL_INFORM: 1
    • O.RESIDUAL_INFORMAT: 2
    • O.RESIDUAL_INFORMATION: 3
    • O.TOE_ACCESS: 7
    • O.VULNERABILITY_ANALYSIS: 1
  • OE:
    • OE.NO_EVIL: 4
    • OE.NO_GENERAL_: 2
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.PHYSICAL: 4
  • T:
    • T.ACCIDENTIAL_ADMIN_ERROR: 1
    • T.MASQUERADE: 3
    • T.POOR_DESIGN: 1
    • T.POOR_IMPLEMENTATION: 1
    • T.POOR_TEST: 1
    • T.RESIDUAL_DATA: 3
    • T.TSF_COMPROMISE: 3
    • T.UNAUTHORIZED_ACCESS: 3
    • T.UNIDENTIFIED_ACTIONS: 3
  • OE:
    • OE.BAC-: 2
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 11
    • Microsoft Corporation: 2
  • Infineon:
    • Infineon: 11
    • Infineon AG: 1
    • Infineon Technologies: 1
pdf_data/st_keywords/eval_facility
  • TUBITAK-BILGEM:
    • TÜBİTAK BİLGEM: 88
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • DES:
    • 3DES:
      • TDES: 2
    • DES:
      • DES: 9
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 8
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • Diffie-Hellman: 2
  • RSA:
    • RSA 2048: 2
    • RSA 4096: 2
    • RSA-2048: 1
    • RSA-4096: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
  • SHA:
    • SHA1:
      • SHA-1: 6
      • SHA1: 1
    • SHA2:
      • SHA-2: 10
      • SHA-224: 2
      • SHA-256: 2
      • SHA-384: 2
      • SHA-512: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 7
pdf_data/st_keywords/crypto_protocol
  • PACE:
    • PACE: 3
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 6
  • TRNG:
    • TRNG: 1
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 2
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • DFA: 5
    • Malfunction: 4
    • Physical Tampering: 5
    • Physical tampering: 1
    • fault injection: 1
    • malfunction: 5
    • physical tampering: 2
  • SCA:
    • DPA: 6
    • SPA: 5
    • physical probing: 3
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/technical_report_id
  • BSI:
    • BSI 2006: 1
pdf_data/st_keywords/tee_name
  • IBM:
    • SE: 3
pdf_data/st_keywords/ic_data_group
  • EF:
    • EF.COM: 13
    • EF.DG1: 23
    • EF.DG13: 2
    • EF.DG14: 2
    • EF.DG15: 4
    • EF.DG16: 23
    • EF.DG2: 4
    • EF.DG3: 3
    • EF.DG4: 2
    • EF.DG5: 3
    • EF.SOD: 12
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 3
  • CC:
    • CCMB-2012-09-001: 2
    • CCMB-2012-09-002: 2
    • CCMB-2012-09-003: 2
    • CCMB-2012-09-004: 1
  • FIPS:
    • FIPS 197: 2
    • FIPS 46-3: 2
    • FIPS PUB 180-4: 1
  • ICAO:
    • ICAO: 9
  • ISO:
    • ISO/IEC 15946-1: 1
    • ISO/IEC 15946-2: 1
    • ISO/IEC 9796-2: 1
  • NIST:
    • NIST SP 800-90: 1
  • PKCS:
    • PKCS#1: 1
  • RFC:
    • RFC 3447: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 2
    • target does not distinguish between the BIS, GIS and EIS because the Extended Access Control is out of scope. UNCLASSIFIED TÜBİTAK BİLGEM UEKAE eID Technologies AKIS GEZGIN_I BAC & AA Security Target Lite: 1
    • to the paper or the plastic card is achieved by physical and organizational security measures being out of scope of this ST. The physical scope of the TOE is composed of the IC dedicated software, the IC embedded: 1
pdf_data/st_metadata
  • /CreationDate: D:20200624163701+03'00'
  • /Creator: Microsoft® Word 2016
  • /ModDate: D:20200624163701+03'00'
  • /Producer: Microsoft® Word 2016
  • pdf_file_size_bytes: 1644757
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 88
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different