Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
X0mail
SERTIT-014
Emerson®-Cybex® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM (formerly Avocent®-Cybex®)
383-4-323
name X0mail Emerson®-Cybex® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM (formerly Avocent®-Cybex®)
scheme NO CA
not_valid_after 01.09.2019 19.04.2018
not_valid_before 23.02.2010 16.07.2012
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/20100223_SERTIT-008CR_issue201.0.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/avocent-cert-eng.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/383-4-323%20ST%20v1_14f.pdf
manufacturer Thales Norway AS Vertiv
manufacturer_web https://www.thales.no/ https://www.vertivco.com
security_level EAL4 EAL4+, ALC_FLR.3
dgst f310fe4b0c9c7eb1 fdcf0e0be7695304
heuristics/cert_id SERTIT-014 383-4-323
heuristics/cert_lab [] CANADA
heuristics/extracted_sars ADV_TDS.3, AVA_MSU.2, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ADV_RCR.1, AVA_VAN.5, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, ADV_DVS.1, ADV_LLD.1, AGD_PRE.1, ATE_IND.2, AVA_VLA.2, ATE_DPT.1, AGD_USR.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ADV_HLD.2, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, ADV_FSP.2, AGD_ADM.1, AVA_SOF.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_SPM.1, ADV_ARC.1 ADV_TDS.3, AVA_VAN.3, ALC_FLR.3, ASE_CCL.1, ATE_FUN.1, ASE_OBJ.2, ASE_INT.1, ALC_CMC.4, ASE_REQ.2, AGD_PRE.1, ATE_IND.2, ATE_DPT.1, ASE_ECD.1, ADV_IMP.1, ALC_LCD.1, ASE_SPD.1, ATE_COV.2, ALC_DVS.1, ALC_TAT.1, AGD_OPE.1, ALC_CMS.4, ALC_DEL.1, ASE_TSS.1, ADV_FSP.4, ADV_ARC.1
pdf_data/report_filename 20100223_SERTIT-008CR_issue201.0.pdf avocent-cert-eng.pdf
pdf_data/report_frontpage
  • CA:
  • CA:
    • cert_id: 383-4-323 CR
    • cert_lab: CANADA
pdf_data/report_keywords/cc_cert_id
  • NO:
    • SERTIT-014: 16
  • CA:
    • 383-4-323: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 4: 3
    • EAL 4 augmented: 1
    • EAL 4+: 17
    • EAL1: 1
    • EAL4+: 3
    • EAL7: 1
  • EAL:
    • EAL 4: 4
    • EAL 4 augmented: 2
    • EAL 4+: 2
    • EAL4: 1
pdf_data/report_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.2: 6
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.5: 6
  • ALC:
    • ALC_FLR.3: 2
pdf_data/report_keywords/cc_sfr
  • FDP:
    • FDP_IFC.2: 2
    • FDP_IFF.1: 2
pdf_data/report_keywords/eval_facility
  • BrightSight:
    • Brightsight: 1
  • EWA:
    • EWA-Canada: 4
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • ISO:
    • ISO/IEC 17025:2005: 1
pdf_data/report_metadata
  • /CreationDate: D:20100315130843
  • /ModDate: D:20100315130843
  • pdf_file_size_bytes: 542517
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 16
  • /Author: User
  • /CreationDate: D:20140819103942-04'00'
  • /Creator: Microsoft® Office Word 2007
  • /ModDate: D:20140819134957-04'00'
  • /Producer: Microsoft® Office Word 2007
  • /Title: EAL 4+ Evaluation of Avocent®-Cybex® Secure DVI KVM Switch, Secure KM Switch and Secure Windowing KVM
  • pdf_file_size_bytes: 242645
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 13
pdf_data/st_filename XOmail_Version_14.2_Security_Target_739_20597_aaaa_sc_ed10-public.pdf 383-4-323 ST v1_14f.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL4: 8
  • EAL:
    • EAL 2: 1
    • EAL 2 augmented: 1
    • EAL 4: 5
    • EAL 4 augmented: 2
    • EAL4: 1
pdf_data/st_keywords/cc_sar
  • ACM:
    • ACM_AUT.1: 10
    • ACM_AUT.1.1: 1
    • ACM_CAP.3: 1
    • ACM_CAP.4: 20
    • ACM_SCP.2: 7
  • ADO:
    • ADO_DEL.1: 1
    • ADO_DEL.2: 11
    • ADO_IGS.1: 13
  • ADV:
    • ADV_DVS.1: 1
    • ADV_FSP.1: 7
    • ADV_FSP.2: 12
    • ADV_HLD.1: 2
    • ADV_HLD.2: 17
    • ADV_IMP.1: 11
    • ADV_LLD.1: 18
    • ADV_RCR.1: 9
    • ADV_SPM.1: 15
  • AGD:
    • AGD_ADM.1: 22
    • AGD_USR.1: 16
  • ALC:
    • ALC_DVS.1: 9
    • ALC_LCD.1: 9
    • ALC_TAT.1: 6
  • ATE:
    • ATE_COV.2: 8
    • ATE_DPT.1: 7
    • ATE_FUN.1: 15
    • ATE_IND.2: 10
  • AVA:
    • AVA_MSU.2: 15
    • AVA_SOF.1: 10
    • AVA_VLA.2: 15
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.4: 1
    • ADV_IMP.1: 1
    • ADV_TDS.3: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.4: 1
    • ALC_CMS.4: 1
    • ALC_DEL.1: 1
    • ALC_DVS.1: 1
    • ALC_FLR.2: 2
    • ALC_FLR.3: 8
    • ALC_LCD.1: 1
    • ALC_TAT.1: 1
  • ASE:
    • ASE_CCL.1: 1
    • ASE_ECD.1: 1
    • ASE_INT.1: 1
    • ASE_OBJ.2: 1
    • ASE_REQ.2: 1
    • ASE_SPD.1: 1
    • ASE_TSS.1: 1
  • ATE:
    • ATE_COV.2: 1
    • ATE_DPT.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/st_keywords/cc_sfr
  • FAU:
    • FAU_ARP.1: 9
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 33
    • FAU_GEN.1.1: 1
    • FAU_GEN.2: 16
    • FAU_GEN.2.1: 1
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
    • FAU_SAR.1: 20
    • FAU_SAR.2: 15
    • FAU_STG.1: 21
    • FAU_STG.3: 15
    • FAU_STG.4: 9
  • FDP:
    • FDP_ACC.1: 11
    • FDP_ACC.1.1: 1
    • FDP_ACF.1: 10
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
    • FDP_ETC.2: 10
    • FDP_ETC.2.1: 1
    • FDP_ETC.2.2: 1
    • FDP_ETC.2.3: 1
    • FDP_ETC.2.4: 1
    • FDP_IFC.1: 4
    • FDP_IFC.2: 9
    • FDP_IFC.2.1: 1
    • FDP_IFC.2.2: 1
    • FDP_IFF.2: 10
    • FDP_IFF.2.1: 1
    • FDP_IFF.2.2: 2
    • FDP_IFF.2.3: 1
    • FDP_IFF.2.4: 1
    • FDP_IFF.2.5: 1
    • FDP_IFF.2.6: 1
    • FDP_IFF.2.7: 1
    • FDP_ITC.2: 10
    • FDP_ITC.2.1: 1
    • FDP_ITC.2.2: 1
    • FDP_ITC.2.3: 1
    • FDP_ITC.2.4: 1
    • FDP_ITC.2.5: 1
    • FDP_ITT.1: 5
    • FDP_ITT.1.1: 1
    • FDP_RIP.2: 9
    • FDP_RIP.2.1: 1
  • FIA:
    • FIA_AFL.1: 9
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 11
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 17
    • FIA_UAU.2.1: 2
    • FIA_UAU.5: 9
    • FIA_UAU.5.1: 1
    • FIA_UAU.5.2: 1
    • FIA_UID.1: 4
    • FIA_UID.2: 24
    • FIA_USB.1: 13
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MSA.1: 10
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 12
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 8
    • FMT_MTD.1.1: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 12
    • FMT_SMR.1.1: 1
    • FMT_SMR.1.2: 1
  • FPT:
    • FPT_AMT.1: 2
    • FPT_FLS.1: 8
    • FPT_FLS.1.1: 1
    • FPT_ITT.1: 5
    • FPT_ITT.1.1: 1
    • FPT_RCV.1: 8
    • FPT_RCV.1.1: 1
    • FPT_RCV.2: 11
    • FPT_RCV.2.1: 1
    • FPT_RCV.2.2: 1
    • FPT_RCV.4: 9
    • FPT_RCV.4.1: 1
    • FPT_RVM.1: 9
    • FPT_RVM.1.1: 1
    • FPT_SEP.3: 10
    • FPT_SEP.3.1: 1
    • FPT_SEP.3.2: 1
    • FPT_SEP.3.3: 1
    • FPT_STM.1: 7
    • FPT_STM.1.1: 1
    • FPT_TDC.1: 14
    • FPT_TDC.1.1: 1
    • FPT_TDC.1.2: 1
    • FPT_TSE.1: 1
    • FPT_TST.1: 11
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTA:
    • FTA_SSL.3: 8
    • FTA_SSL.3.1: 1
    • FTA_TSE.1: 19
  • FTP:
    • FTP_ITC.1: 2
    • FTP_TRP.1: 2
  • FDP:
    • FDP_ACC.1: 4
    • FDP_ETC: 1
    • FDP_ETC.1: 7
    • FDP_ETC.1.1: 1
    • FDP_ETC.1.2: 1
    • FDP_IFC: 33
    • FDP_IFC.1: 6
    • FDP_IFF: 27
    • FDP_IFF.1: 12
    • FDP_ITC: 1
    • FDP_ITC.1: 9
    • FDP_ITC.1.1: 1
    • FDP_ITC.1.2: 1
    • FDP_ITC.1.3: 1
  • FMT:
    • FMT_MSA: 4
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 15
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 4
    • FMT_SMR.1: 6
  • FPT:
    • FPT_PHP: 2
    • FPT_PHP.1: 7
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
    • FPT_PHP.3: 6
    • FPT_PHP.3.1: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ADM_TRAINING: 4
    • A.AUDIT_REVIEW: 3
    • A.CONFIDENCE: 4
    • A.INVALIDATE: 3
    • A.NETWORK: 4
    • A.NOTIFY: 3
    • A.OS: 5
    • A.PHYSICAL: 4
    • A.PHYSICAL_LOC: 3
    • A.USR_TRAINING: 3
  • O:
    • O.ACCESS_HIST: 13
    • O.AUDIT: 13
    • O.AUTO_LOGOUT: 10
    • O.CMD_ACL: 7
    • O.CMD_LOG: 16
    • O.DAC: 8
    • O.DIG_SIGN: 3
    • O.ID_AUTH: 14
    • O.LABELLING: 8
    • O.LOCK: 8
    • O.MAC: 9
    • O.MAC_INTEGRITY: 10
    • O.MANAGE: 6
    • O.MESSAGING: 8
    • O.RECOVER: 9
    • O.REF_MONITOR: 8
    • O.RESOURCE_SHARE: 7
    • O.REUSE: 9
    • O.ROLES: 10
    • O.ROLE_MNG: 7
    • O.SELF_TEST: 8
  • OE:
    • OE.ACCOUNTABLE: 11
    • OE.AUDIT: 13
    • OE.ID_AUTH: 8
    • OE.NETWORK: 17
    • OE.PHYSICAL: 1
    • OE.TRAF_SEPARATION: 11
  • A:
    • A.ACCESS: 3
    • A.MANAGE: 3
    • A.NOEVIL: 3
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 11
    • O.SELECT: 3
    • O.SWITCH: 7
    • O.TAMPER: 6
    • O.UNIDIR: 11
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 3
    • OE.MANAGE: 2
    • OE.NOEVIL: 3
    • OE.PHYSICAL: 2
  • T:
    • T.INFECTED: 3
    • T.INVALIDUSB: 3
    • T.PERIP: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.TAMPER: 3
    • T.TRANSFER: 3
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 3
  • Gemalto:
    • Gemalto: 1
  • Microsoft:
    • Microsoft: 4
  • Samsung:
    • Samsung: 3
pdf_data/st_keywords/eval_facility
  • EWA:
    • EWA: 1
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 74
  • MAC:
    • MAC: 1
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 10
  • other:
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • CC:
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
    • CCMB-2005-08-003: 1
  • ISO:
    • ISO/IEC 15408: 10
  • RFC:
    • RFC 2156: 1
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • MLS environment The protection of the LANs to which the MMHS servers and clients are connected is out of scope of this Security Target. It is assumed that the confidentiality of information is protected using: 1
    • out of scope: 1
pdf_data/st_metadata
  • /Author: Thales Norway AS
  • /CreationDate: D:20090430154245+02'00'
  • /Creator: PDFCreator Version 0.9.3
  • /Keywords:
  • /ModDate: D:20090430154245
  • /Producer: AFPL Ghostscript 8.13
  • /Subject:
  • /Title: XOmail Version 14.2 Security Target ed 10-public
  • pdf_file_size_bytes: 2346280
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 111
  • /Author: Aviv
  • /CreationDate: D:20141008230548+03'00'
  • /Creator: PScript5.dll Version 5.2
  • /ModDate: D:20141008230548+03'00'
  • /Producer: GPL Ghostscript 8.64
  • /Title: Microsoft Word - Avocent-Cybex Secure DVI KVM ST Rev 1_14f.docx
  • pdf_file_size_bytes: 510100
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 64
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different