Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Gigamon GigaVUE Version 5.9.00
CCEVS-VR-VID-11129-2021
uCosminexus Application Server 07-00
JISEC-CC-CRP-C0086
name Gigamon GigaVUE Version 5.9.00 uCosminexus Application Server 07-00
category Network and Network-Related Devices and Systems Access Control Devices and Systems
scheme US JP
not_valid_after 25.02.2023 07.10.2013
not_valid_before 25.02.2021 22.03.2007
cert_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11129-ci.pdf
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11129-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/c0086_ecvr.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11129-st.pdf
manufacturer Gigamon, Inc Hitachi, Ltd.
manufacturer_web https://www.gigamon.com https://www.hitachi.com/
security_level {} EAL2+, ALC_FLR.1
dgst e7ac47e224fdfe97 3a2713aa094e7f64
heuristics/cert_id CCEVS-VR-VID-11129-2021 JISEC-CC-CRP-C0086
heuristics/cert_lab US []
heuristics/cpe_matches cpe:2.3:a:gigamon:gigavue:5.9:*:*:*:*:*:*:*, cpe:2.3:a:gigamon:gigavue:5.9.00.04:*:*:*:*:*:*:* {}
heuristics/related_cves CVE-2020-12252, CVE-2020-12251 {}
heuristics/extracted_sars ASE_CCL.1, AGD_PRE.1, ALC_CMC.1, ASE_SPD.1, AGD_OPE.1, ATE_IND.1, ASE_INT.1, ASE_ECD.1, ASE_OBJ.1, ASE_REQ.1, ALC_CMS.1, ASE_TSS.1, AVA_VAN.1, ADV_FSP.1 ALC_FLR.1
heuristics/extracted_versions 5.9.00 00, 07
heuristics/scheme_data
  • api_url: https://www.niap-ccevs.org/api/project/product/pcl_products/11129/
  • categories: ['Network Device']
  • category: Network Device
  • certification_date: 25.02.2021
  • evaluation_facility: Booz Allen Hamilton Common Criteria Testing Laboratory
  • expiration_date: 25.02.2023
  • id: CCEVS-VR-VID11129
  • product: Gigamon GigaVUE Version 5.9.00
  • scheme: US
  • url: https://www.niap-ccevs.org/products/11129
  • vendor: Gigamon Inc
  • cert_id: JISEC-CC-CRP-C0234
  • certification_date: 01.08.2009
  • claim: EAL2+ ALC_FLR.1
  • enhanced:
    • assurance_level: EAL2 Augmented with ALC_FLR.1
    • cc_version: 3.1
    • description: PRODUCT DESCRIPTION Description of TOE TOE is a Web application server software product that is a J2EE(TM) (Java(TM) 2 Platform, Enterprise Edition)-compliant. TOE provides runtime and management environments. The product, that includes TOE, is mainly consist of Web container and EJB(TM) container that is Java 2 Platform, Enterprise Edition 1.4 compatible platform. And it also includes various software to execute and manage J2EE-compliant Java applications. It improves availability and reliability of the business application system, and provides several functions in order to manage business application system efficiently. TOE security functionality Security functions provided by TOE are as follows: - User identification and authentication This function uses user ID and password for user identification and authentication. - Access control This function provides access control for both Web and EJB container objects by using authenticated user information. - Security management This function manages information of user identification and authentication, access control information, and access control permitted to an application.
    • evaluation_facility: Mizuho Information & Research Institute, Inc. Center for Evaluation of Information Security
    • product: uCosminexus Application Server
    • product_type: Application Server
    • toe_version: 08-00
    • vendor: Hitachi, Ltd.
  • expiration_date: 01.08.2014
  • supplier: Hitachi, Ltd.
  • toe_japan_link: https://www.ipa.go.jp/en/security/jisec/software/certified-cert/c0234_it9250.html
  • toe_japan_name: uCosminexus Application Server 08-00
  • toe_overseas_link: None
  • toe_overseas_name: -----
heuristics/protection_profiles 89f2a255423f4a20 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/CPP_ND_V2.2E.pdf {}
pdf_data/cert_filename st_vid11129-ci.pdf
pdf_data/cert_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11129-2021: 1
pdf_data/cert_keywords/cc_protection_profile_id
pdf_data/cert_keywords/cc_security_level
pdf_data/cert_keywords/cc_sar
pdf_data/cert_keywords/cc_sfr
pdf_data/cert_keywords/cc_claims
pdf_data/cert_keywords/vendor
pdf_data/cert_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/cert_keywords/symmetric_crypto
pdf_data/cert_keywords/asymmetric_crypto
pdf_data/cert_keywords/pq_crypto
pdf_data/cert_keywords/hash_function
pdf_data/cert_keywords/crypto_scheme
pdf_data/cert_keywords/crypto_protocol
pdf_data/cert_keywords/randomness
pdf_data/cert_keywords/cipher_mode
pdf_data/cert_keywords/ecc_curve
pdf_data/cert_keywords/crypto_engine
pdf_data/cert_keywords/tls_cipher_suite
pdf_data/cert_keywords/crypto_library
pdf_data/cert_keywords/vulnerability
pdf_data/cert_keywords/side_channel_analysis
pdf_data/cert_keywords/technical_report_id
pdf_data/cert_keywords/device_model
pdf_data/cert_keywords/tee_name
pdf_data/cert_keywords/os_name
pdf_data/cert_keywords/cplc_data
pdf_data/cert_keywords/ic_data_group
pdf_data/cert_keywords/standard_id
pdf_data/cert_keywords/javacard_version
pdf_data/cert_keywords/javacard_api_const
pdf_data/cert_keywords/javacard_packages
pdf_data/cert_keywords/certification_process
pdf_data/cert_metadata
  • /CreationDate: D:20210226121301-05'00'
  • /ModDate: D:20210226121301-05'00'
  • /Producer: iText 2.1.0 (by lowagie.com)
  • pdf_file_size_bytes: 180788
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/report_filename st_vid11129-vr.pdf c0086_ecvr.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID11129-2021
    • cert_item: Gigamon GigaVUE Version 5.9.00
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID11129-2021: 1
  • JP:
    • Certification No. C0086: 1
pdf_data/report_keywords/cc_sfr
  • FCS:
    • FCS_CKM.1: 1
    • FCS_CKM.2: 1
    • FCS_COP: 3
    • FCS_RBG_EXT.1: 1
pdf_data/report_keywords/cc_claims
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_COMPROMISE: 1
    • T.SECURITY_FUNCTIONALITY_FAILURE: 1
    • T.UNAUTHORIZED_ADMINISTRATOR_ACCESS: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_CHANNELS: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_ENDPOINTS: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/report_keywords/vendor
  • Cisco:
    • Cisco: 2
  • NXP:
    • NXP: 1
pdf_data/report_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 3
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 2
  • constructions:
    • MAC:
      • HMAC: 2
pdf_data/report_keywords/asymmetric_crypto
  • ECC:
    • ECDSA:
      • ECDSA: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-512: 1
pdf_data/report_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/report_keywords/crypto_protocol
  • SSH:
    • SSH: 21
    • SSHv1: 2
    • SSHv2: 2
  • TLS:
    • TLS:
      • TLS: 11
pdf_data/report_keywords/randomness
  • PRNG:
    • DRBG: 2
  • RNG:
    • RBG: 1
    • RNG: 1
pdf_data/report_keywords/crypto_library
  • OpenSSL:
    • OpenSSL: 3
pdf_data/report_keywords/side_channel_analysis
  • SCA:
    • Timing Attack: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2017-004-001: 1
    • CCMB-2017-004-002: 1
    • CCMB-2017-004-003: 1
    • CCMB-2017-004-004: 1
  • X509:
    • X.509: 1
pdf_data/report_metadata
  • /CreationDate: D:20220119151105-05'00'
  • /ModDate: D:20220119151105-05'00'
  • pdf_file_size_bytes: 915939
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 28
  • /CreationDate: D:20070323205213+09'00'
  • /ModDate: D:20070323205213+09'00'
  • /Producer: Acrobat Distiller 6.0 (Windows)
  • /Title: untitled
  • pdf_file_size_bytes: 13111
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 1
pdf_data/st_filename st_vid11129-st.pdf
pdf_data/st_keywords/cc_cert_id
pdf_data/st_keywords/cc_protection_profile_id
pdf_data/st_keywords/cc_security_level
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_FSP.1: 9
  • AGD:
    • AGD_OPE.1: 13
    • AGD_PRE.1: 4
  • ALC:
    • ALC_CMC.1: 6
    • ALC_CMS.1: 7
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 12
    • ASE_INT.1: 14
    • ASE_OBJ.1: 6
    • ASE_REQ.1: 12
    • ASE_SPD: 2
    • ASE_SPD.1: 7
    • ASE_TSS.1: 7
  • ATE:
    • ATE_IND.1: 7
  • AVA:
    • AVA_VAN: 2
    • AVA_VAN.1: 9
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_GEN: 4
    • FAU_GEN.1: 3
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 2
    • FAU_GEN.2: 3
    • FAU_GEN.2.1: 1
    • FAU_STG: 2
    • FAU_STG.1: 4
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG_EXT: 2
    • FAU_STG_EXT.1: 3
    • FAU_STG_EXT.1.1: 1
    • FAU_STG_EXT.1.2: 1
    • FAU_STG_EXT.1.3: 1
  • FCS:
    • FCS_CKM: 6
    • FCS_CKM.1: 4
    • FCS_CKM.1.1: 1
    • FCS_CKM.2: 4
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 3
    • FCS_CKM.4.1: 1
    • FCS_COP: 23
    • FCS_COP.1: 4
    • FCS_NTP_EXT.1.4: 1
    • FCS_RBG_EXT: 2
    • FCS_RBG_EXT.1: 4
    • FCS_RBG_EXT.1.1: 1
    • FCS_RBG_EXT.1.2: 1
    • FCS_SSHC_EXT: 2
    • FCS_SSHC_EXT.1: 5
    • FCS_SSHC_EXT.1.1: 1
    • FCS_SSHC_EXT.1.2: 1
    • FCS_SSHC_EXT.1.3: 1
    • FCS_SSHC_EXT.1.4: 1
    • FCS_SSHC_EXT.1.5: 1
    • FCS_SSHC_EXT.1.6: 1
    • FCS_SSHC_EXT.1.7: 1
    • FCS_SSHC_EXT.1.8: 1
    • FCS_SSHC_EXT.1.9: 1
    • FCS_SSHS_EXT: 2
    • FCS_SSHS_EXT.1: 5
    • FCS_SSHS_EXT.1.1: 1
    • FCS_SSHS_EXT.1.2: 1
    • FCS_SSHS_EXT.1.3: 1
    • FCS_SSHS_EXT.1.4: 1
    • FCS_SSHS_EXT.1.5: 1
    • FCS_SSHS_EXT.1.6: 1
    • FCS_SSHS_EXT.1.7: 1
    • FCS_SSHS_EXT.1.8: 1
    • FCS_TLSC_EXT: 2
    • FCS_TLSC_EXT.1: 6
    • FCS_TLSC_EXT.1.1: 1
    • FCS_TLSC_EXT.1.2: 1
    • FCS_TLSC_EXT.1.3: 1
    • FCS_TLSC_EXT.1.4: 1
    • FCS_TLSC_EXT.2.3: 1
    • FCS_TLSS_EXT.1: 6
    • FCS_TLSS_EXT.1.1: 1
    • FCS_TLSS_EXT.1.2: 1
    • FCS_TLSS_EXT.1.3: 1
    • FCS_TLSS_EXT.1.4: 4
  • FIA:
    • FIA_AFL: 2
    • FIA_AFL.1: 10
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_PMG_EXT: 2
    • FIA_PMG_EXT.1: 5
    • FIA_PMG_EXT.1.1: 1
    • FIA_UAU: 2
    • FIA_UAU.7: 3
    • FIA_UAU.7.1: 1
    • FIA_UAU_EXT: 2
    • FIA_UAU_EXT.2: 4
    • FIA_UAU_EXT.2.1: 1
    • FIA_UIA_EXT: 2
    • FIA_UIA_EXT.1: 3
    • FIA_UIA_EXT.1.1: 1
    • FIA_UIA_EXT.1.2: 1
  • FMT:
    • FMT_MOF: 5
    • FMT_MOF.1: 1
    • FMT_MTD: 11
    • FMT_MTD.1: 2
    • FMT_SMF: 2
    • FMT_SMF.1: 4
    • FMT_SMF.1.1: 1
    • FMT_SMR: 2
    • FMT_SMR.2: 3
    • FMT_SMR.2.1: 1
    • FMT_SMR.2.2: 1
    • FMT_SMR.2.3: 1
  • FPT:
    • FPT_APW_EXT: 2
    • FPT_APW_EXT.1: 3
    • FPT_APW_EXT.1.1: 1
    • FPT_APW_EXT.1.2: 1
    • FPT_SKP_EXT: 2
    • FPT_SKP_EXT.1: 3
    • FPT_SKP_EXT.1.1: 1
    • FPT_STM_EXT: 2
    • FPT_STM_EXT.1: 4
    • FPT_STM_EXT.1.1: 1
    • FPT_STM_EXT.1.2: 1
    • FPT_TST_EXT: 2
    • FPT_TST_EXT.1: 4
    • FPT_TST_EXT.1.1: 1
    • FPT_TUD_EXT: 2
    • FPT_TUD_EXT.1: 3
    • FPT_TUD_EXT.1.1: 1
    • FPT_TUD_EXT.1.2: 1
    • FPT_TUD_EXT.1.3: 1
  • FTA:
    • FTA_SSL: 4
    • FTA_SSL.3: 3
    • FTA_SSL.3.1: 1
    • FTA_SSL.4: 3
    • FTA_SSL.4.1: 1
    • FTA_SSL_EXT: 2
    • FTA_SSL_EXT.1: 3
    • FTA_SSL_EXT.1.1: 1
    • FTA_TAB: 2
    • FTA_TAB.1: 4
    • FTA_TAB.1.1: 1
  • FTP:
    • FTP_ITC: 2
    • FTP_ITC.1: 6
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP: 5
    • FTP_TRP.1: 3
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADMIN_CREDENTIALS_: 1
    • A.LIMITED_FUNCTIONALITY: 1
    • A.NO_THRU_TRAFFIC_: 1
    • A.PHYSICAL_PROTECTION: 1
    • A.REGULAR_UPDATES: 1
    • A.RESIDUAL_INFORMATION: 1
    • A.TRUSTED_ADMINISTRATOR: 1
  • OE:
    • OE.ADMIN_CREDENTIALS_SECURE: 1
    • OE.NO_GENERAL_PURPOSE: 1
    • OE.NO_THRU_TRAFFIC_PROTECTION: 1
    • OE.PHYSICAL: 1
    • OE.RESIDUAL_INFORMATION: 1
    • OE.TRUSTED_ADMIN: 1
    • OE.UPDATES: 1
  • T:
    • T.PASSWORD_CRACKING: 1
    • T.SECURITY_FUNCTIONALITY_: 2
    • T.UNAUTHORIZED_ADMINISTRATOR_: 1
    • T.UNDETECTED_ACTIVITY: 1
    • T.UNTRUSTED_COMMUNICATION_: 1
    • T.UPDATE_COMPROMISE: 1
    • T.WEAK_AUTHENTICATION_: 1
    • T.WEAK_CRYPTOGRAPHY: 1
pdf_data/st_keywords/vendor
  • NXP:
    • NXP: 1
pdf_data/st_keywords/eval_facility
  • BoozAllenHamilton:
    • Booz Allen Hamilton: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 13
    • E2:
      • E2: 1
  • constructions:
    • MAC:
      • HMAC: 6
      • HMAC-SHA-256: 1
      • HMAC-SHA-384: 2
      • HMAC-SHA-512: 2
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 3
    • ECDH:
      • ECDH: 3
      • ECDHE: 2
    • ECDSA:
      • ECDSA: 6
  • FF:
    • DH:
      • Diffie-Hellman: 5
pdf_data/st_keywords/pq_crypto
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 7
    • SHA2:
      • SHA-256: 8
      • SHA-384: 5
      • SHA-512: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 13
pdf_data/st_keywords/crypto_protocol
  • SSH:
    • SSH: 65
    • SSHv2: 14
  • TLS:
    • DTLS:
      • DTLS: 1
    • SSL:
      • SSL: 2
      • SSL 2.0: 1
      • SSL 3.0: 1
    • TLS:
      • TLS: 45
      • TLS 1.0: 1
      • TLS 1.1: 1
      • TLS 1.2: 3
      • TLS v1.2: 3
  • VPN:
    • VPN: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • DRBG: 6
  • RNG:
    • RBG: 2
    • RNG: 3
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 4
  • GCM:
    • GCM: 6
pdf_data/st_keywords/ecc_curve
  • NIST:
    • NIST P-256: 1
    • P-256: 6
    • P-384: 8
    • P-521: 8
    • curve P-256: 1
    • secp256r1: 4
    • secp384r1: 4
    • secp521r1: 4
pdf_data/st_keywords/crypto_engine
pdf_data/st_keywords/tls_cipher_suite
  • TLS:
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384: 3
    • TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384: 3
pdf_data/st_keywords/crypto_library
pdf_data/st_keywords/vulnerability
pdf_data/st_keywords/side_channel_analysis
pdf_data/st_keywords/technical_report_id
pdf_data/st_keywords/device_model
pdf_data/st_keywords/tee_name
pdf_data/st_keywords/os_name
pdf_data/st_keywords/cplc_data
pdf_data/st_keywords/ic_data_group
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2017-004-001: 1
    • CCMB-2017-004-002: 1
    • CCMB-2017-004-003: 1
    • CCMB-2017-004-004: 1
  • FIPS:
    • FIPS 186-4: 1
    • FIPS PUB 186-4: 5
  • ISO:
    • ISO/IEC 10116:2017: 1
    • ISO/IEC 14888-3: 2
    • ISO/IEC 18031:2011: 5
    • ISO/IEC 19772:2009: 1
  • NIST:
    • NIST SP 800-56A: 5
  • RFC:
    • RFC 2818: 2
    • RFC 2986: 2
    • RFC 3526: 4
    • RFC 4251: 2
    • RFC 4252: 1
    • RFC 4253: 3
    • RFC 4492: 6
    • RFC 5077: 1
    • RFC 5246: 2
    • RFC 5280: 4
    • RFC 5289: 12
    • RFC 6125: 2
    • RFC 7919: 1
  • X509:
    • X.509: 7
pdf_data/st_keywords/javacard_version
pdf_data/st_keywords/javacard_api_const
pdf_data/st_keywords/javacard_packages
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • Console 12 1G/10G Ports (QSFP) 4 10/100/1000M Ports Configurable Ports (provided functionality out of scope as stated in Section 2.3.3) Provided by Port Modules Provided by TAP modules, Bypass Combo modules: 1
    • QSFP) 4 10/100/1000M Ports Configurable Ports (provided functionality out of scope as stated in Section 2.3.3: 1
    • out of scope: 1
pdf_data/st_metadata
state/cert/convert_ok True False
state/cert/download_ok True False
state/cert/extract_ok True False
state/cert/pdf_hash Different Different
state/cert/txt_hash Different Different
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/convert_ok True False
state/st/download_ok True False
state/st/extract_ok True False
state/st/pdf_hash Different Different
state/st/txt_hash Different Different