Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Tivoli Security Policy Manager Version 7.1
BSI-DSZ-CC-0839-2013
IPCOM EX Series Firmware Security Component V1.0.00
JISEC-CC-CRP-C0088
name Tivoli Security Policy Manager Version 7.1 IPCOM EX Series Firmware Security Component V1.0.00
category Access Control Devices and Systems Boundary Protection Devices and Systems
scheme DE JP
not_valid_after 01.09.2019 07.01.2013
not_valid_before 16.12.2013 22.03.2007
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0839a_pdf.pdf https://www.commoncriteriaportal.org/files/epfiles/c0088_ecvr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/0839b_pdf.pdf https://www.commoncriteriaportal.org/files/epfiles/
manufacturer IBM Corporation Fujitsu Limited
manufacturer_web https://www.ibm.com
security_level EAL2+, ALC_FLR.3 EAL1
dgst c6cba72b25bf4a49 a9d6e88aae2b318f
heuristics/cert_id BSI-DSZ-CC-0839-2013 JISEC-CC-CRP-C0088
heuristics/cert_lab BSI []
heuristics/extracted_sars ALC_LCD.2, ASE_INT.1, ALC_DVS.2, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, APE_ECD.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, ALC_TAT.3, ALC_FLR.3, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, APE_REQ.2, ADV_ARC.1, ASE_OBJ.2, APE_CCL.1, ADV_IMP.2, ASE_REQ.2, ATE_DPT.4, ADV_INT.3, APE_INT.1, APE_SPD.1, ALC_CMC.2, ATE_IND.2, APE_OBJ.2, ASE_CCL.1, ADV_SPM.1 {}
heuristics/extracted_versions 7.1 1.0.00
heuristics/scheme_data
  • cert_id: JISEC-CC-CRP-C0088
  • certification_date: 01.03.2007
  • claim: EAL1
  • enhanced:
    • assurance_level: EAL1
    • cc_version: 2.3
    • description: PRODUCT DESCRIPTION This product is the embedded firmware of firewall appliance that provides the following functions. - IP packet filtering - Operational assistance - Configuration These functions shield the traffic resources on internal network from threats of illegal access and keep the advantage that resources on external network can be used. This product is previously installed as a firmware of following appliances of Fujitsu Limited. - IPCOM EX1000 SC - IPCOM EX1200 SC - IPCOM EX2000 SC - IPCOM EX1000 LB - IPCOM EX1200 LB - IPCOM EX2000 LB
    • evaluation_facility: Japan Electronics and Information Technology Industries Association, Information Technology Security Center(JEITA ITSC)
    • product: IPCOM EX Series Firmware Security Component
    • product_type: IT Product (Firewall)
    • toe_version: V1.0.00
    • vendor: Fujitsu Limited
  • expiration_date: 01.03.2013
  • revalidations: [frozendict({'date': '2007-07', 'link': 'https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105_01.html'})]
  • supplier: Fujitsu Limited
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0088_it6105.html
  • toe_japan_name: IPCOM EX Series Firmware Security Component V1.0.00
  • toe_overseas_link: None
  • toe_overseas_name: IPCOM EX Series Firmware Security Component V1.1.00
protection_profile_links {} {}
pdf_data/report_filename 0839a_pdf.pdf c0088_ecvr.pdf
pdf_data/report_frontpage
  • DE:
    • cert_id: BSI-DSZ-CC-0839-2013
    • cert_item: Tivoli Security Policy Manager, Version 7.1
    • cert_lab: BSI
    • developer: IBM Corporation
    • match_rules: ['(BSI-DSZ-CC-.+?) (?:for|For) (.+?) from (.*)']
  • DE:
pdf_data/report_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0839-2013: 19
  • JP:
    • Certification No. C0088: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 2: 4
    • EAL 2 augmented: 3
    • EAL 4: 1
    • EAL1: 7
    • EAL2: 3
    • EAL3: 4
    • EAL4: 6
    • EAL5: 6
    • EAL6: 3
    • EAL7: 4
  • ITSEC:
    • ITSEC Evaluation: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 1
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 1
    • ADV_FSP.3: 1
    • ADV_FSP.4: 1
    • ADV_FSP.5: 1
    • ADV_FSP.6: 1
    • ADV_IMP: 1
    • ADV_IMP.1: 1
    • ADV_IMP.2: 1
    • ADV_INT: 1
    • ADV_INT.1: 1
    • ADV_INT.2: 1
    • ADV_INT.3: 1
    • ADV_SPM: 1
    • ADV_SPM.1: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 1
    • ADV_TDS.2: 1
    • ADV_TDS.3: 1
    • ADV_TDS.4: 1
    • ADV_TDS.5: 1
    • ADV_TDS.6: 1
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 1
    • AGD_PRE: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.1: 1
    • ALC_CMC.2: 1
    • ALC_CMC.3: 1
    • ALC_CMC.4: 1
    • ALC_CMC.5: 1
    • ALC_CMS: 1
    • ALC_CMS.1: 1
    • ALC_CMS.2: 1
    • ALC_CMS.3: 1
    • ALC_CMS.4: 1
    • ALC_CMS.5: 1
    • ALC_DEL: 1
    • ALC_DEL.1: 1
    • ALC_DVS: 1
    • ALC_DVS.1: 1
    • ALC_DVS.2: 1
    • ALC_FLR: 1
    • ALC_FLR.1: 1
    • ALC_FLR.2: 1
    • ALC_FLR.3: 5
    • ALC_LCD.1: 1
    • ALC_LCD.2: 1
    • ALC_TAT: 1
    • ALC_TAT.1: 1
    • ALC_TAT.2: 1
    • ALC_TAT.3: 1
  • APE:
    • APE_CCL.1: 1
    • APE_ECD.1: 1
    • APE_INT.1: 1
    • APE_OBJ.1: 1
    • APE_OBJ.2: 1
    • APE_REQ.1: 1
    • APE_REQ.2: 1
    • APE_SPD.1: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.1: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
    • ASE_TSS.2: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 1
    • ATE_COV.2: 1
    • ATE_COV.3: 1
    • ATE_DPT: 1
    • ATE_DPT.1: 1
    • ATE_DPT.2: 1
    • ATE_DPT.3: 1
    • ATE_DPT.4: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 1
    • ATE_FUN.2: 1
    • ATE_IND: 1
    • ATE_IND.1: 1
    • ATE_IND.2: 1
    • ATE_IND.3: 1
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 1
    • AVA_VAN.2: 1
    • AVA_VAN.3: 1
    • AVA_VAN.4: 1
    • AVA_VAN.5: 1
pdf_data/report_keywords/eval_facility
  • atsec:
    • atsec: 3
  • ITSC:
    • Information Technology Security Center: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
pdf_data/report_keywords/technical_report_id
  • BSI:
    • BSI 7125: 2
    • BSI 7148: 1
pdf_data/report_keywords/standard_id
  • BSI:
    • AIS 32: 1
pdf_data/report_keywords/javacard_packages
  • com:
    • com.ibm.tspm.server: 1
pdf_data/report_keywords/certification_process
  • ConfidentialDocument:
    • Report, Version 3, 2013-11-05, Final Evaluation Technical Report, atsec information security GmbH, (confidential document) 13.1 Guidance documentation [8] Security Policy Manager Version 7.1.0.4 Common Criteria Guide: 1
pdf_data/report_metadata
  • /CreationDate: D:20070323205356+09'00'
  • /ModDate: D:20070323205356+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 13167
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/st_filename 0839b_pdf.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL1: 1
    • EAL2: 4
    • EAL2 augmented: 2
    • EAL2+: 1
    • EAL3: 1
    • EAL5: 1
    • EAL7: 1
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC: 1
    • ADV_ARC.1: 4
    • ADV_FSP: 1
    • ADV_FSP.1: 1
    • ADV_FSP.2: 10
    • ADV_IMP: 1
    • ADV_INT: 1
    • ADV_SPM: 1
    • ADV_TDS: 1
    • ADV_TDS.1: 7
  • AGD:
    • AGD_OPE: 1
    • AGD_OPE.1: 6
    • AGD_PRE: 1
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC: 1
    • ALC_CMC.2: 2
    • ALC_CMS: 1
    • ALC_CMS.2: 2
    • ALC_DEL: 1
    • ALC_DEL.1: 2
    • ALC_DVS: 1
    • ALC_FLR: 1
    • ALC_FLR.3: 7
    • ALC_TAT: 1
  • ASE:
    • ASE_CCL: 1
    • ASE_CCL.1: 1
    • ASE_ECD: 1
    • ASE_ECD.1: 1
    • ASE_INT: 1
    • ASE_INT.1: 1
    • ASE_OBJ: 1
    • ASE_OBJ.2: 1
    • ASE_REQ: 1
    • ASE_REQ.2: 1
    • ASE_SPD: 1
    • ASE_SPD.1: 1
    • ASE_TSS: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV: 1
    • ATE_COV.1: 5
    • ATE_COV.2: 1
    • ATE_DPT: 1
    • ATE_FUN: 1
    • ATE_FUN.1: 4
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN: 1
    • AVA_VAN.2: 2
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 3
    • FAU_GEN.2: 8
    • FAU_GEN.2.1: 1
    • FAU_GEN_SUB: 3
    • FAU_GEN_SUB.1: 17
    • FAU_GEN_SUB.1.1: 2
    • FAU_GEN_SUB.1.2: 2
  • FDP:
    • FDP_ACC.1: 2
    • FDP_ACC_EXT: 1
    • FDP_ACF_EXT: 1
    • FDP_IFC.1: 2
  • FIA:
    • FIA_UAU.1: 1
    • FIA_UAU.1.1: 1
    • FIA_UID.1: 3
  • FMT:
    • FMT_MOF: 4
    • FMT_MOF.1: 1
    • FMT_MOF_EXT: 1
    • FMT_MOF_EXT.1: 16
    • FMT_MOF_EXT.1.1: 2
    • FMT_MSA: 2
    • FMT_MSA.1: 17
    • FMT_MSA.1.1: 2
    • FMT_MSA.3: 19
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD: 2
    • FMT_MTD.1: 13
    • FMT_MTD.1.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 7
    • FMT_SMF.1.1: 2
    • FMT_SMR: 2
    • FMT_SMR.1: 21
    • FMT_SMR.1.1: 3
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_STM.1: 2
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMINISTRATOR: 3
    • A.COMMUNICATION: 3
    • A.INSTALL: 2
    • A.NO_GENERAL_PURPOSE: 2
    • A.PHYSICAL: 3
    • A.RUNTIME: 2
  • O:
    • O.ADMIN_ACCESS: 4
    • O.AUDIT_GENERATION: 5
    • O.MANAGE: 6
    • O.SERVICE_ACCESS: 4
  • OE:
    • OE.ADMINISTRATORS: 3
    • OE.AUTHENTICATION: 3
    • OE.NO_GENERAL_PURPOSE: 3
    • OE.PHYSICAL: 3
    • OE.RUNTIME: 3
    • OE.SECURECOMMS: 5
    • OE.TIMESOURCE: 3
  • OSP:
    • OSP: 3
  • T:
    • T.UNAUTH_ACCESS: 6
    • T.UNAUTH_MODIFICATION: 4
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 2
    • Microsoft Corporation: 1
pdf_data/st_keywords/eval_facility
pdf_data/st_keywords/symmetric_crypto
pdf_data/st_keywords/asymmetric_crypto
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 3
pdf_data/st_keywords/crypto_protocol
  • TLS:
    • TLS:
      • TLS: 2
pdf_data/st_keywords/randomness
pdf_data/st_keywords/cipher_mode
pdf_data/st_keywords/ecc_curve
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
pdf_data/st_metadata
  • /Author: Gordon McIntosh
  • /CreationDate: D:20140128133640+01'00'
  • /Creator: Microsoft® Word 2010
  • /Keywords: Security Policy Management, Access Control
  • /ModDate: D:20140128133640+01'00'
  • /Producer: Microsoft® Word 2010
  • /Subject: Tivoli Security Policy Manager Version 7.1 Security Target
  • /Title: Tivoli Security Policy Manager Version 7.1 Security Target
  • pdf_file_size_bytes: 1212498
  • pdf_hyperlinks: file:///N:/TSPM%207.1/43-154_IBM_TSPM_CO/consulting/ase/TSPM%20Security%20Target%20v1.24.doc%23_Toc378693269
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 56
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok True False
state/st/download_ok True False
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different