Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL
CSV information ?
Status | archived |
---|---|
Valid from | 04.01.2011 |
Valid until | 04.01.2016 |
Scheme | 🇬🇧 UK |
Manufacturer | Black Box Corporation |
Category | Other Devices and Systems |
Security level | ALC_FLR.2, EAL4+, ATE_DPT.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ATE_DPT.2Certificates
CRP260Certification process
out of scope, analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation, analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, althoughStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Certification Report |
---|---|
Author | User |
Creation date | D:20110111164749Z |
Modification date | D:20110111164751Z |
Pages | 16 |
Creator | Acrobat PDFMaker 7.0.5 for Word |
Producer | Acrobat Elements 7.0.5 (Windows) |
References
Incoming- CRP269 - archived - Black Box Secure Analogue and Digital KVM Switches, Version 1.0, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2006A-USB-EAL, SW4006A-USB-EAL
Security target ?
Extracted keywords
Security level
EAL4, EAL4 augmentedClaims
O.SWITCH, O.CONF, O.CONNECT, O.INDICATE, O.SELECT, O.INVOKE, O.NOPROG, O.ROM, T.BYPASS, T.INSTALL, T.LOGICAL, T.PHYSICAL, T.RESIDUAL, T.SPOOF, T.STATE, T.TRANSFER, A.SCENARIO, A.ACCESS, A.MANAGE, A.NOEVIL, A.PHYSICAL, A.EMISSION, A.ISOLATE, OE.ACCESS, OE.MANAGE, OE.NOEVIL, OE.PHYSICAL, OE.SCENARIO, OE.EMISSION, OE.ISOLATESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT, ATE_DPT.1, AVA_VAN.3Security Functional Requirements (SFR)
FAU_GEN, FDP_ETC, FDP_IFF, FDP_ITC, FDP_ETC.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_MSA.1, FMT_MSA, FMT_SMF, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1Side-channel analysis
malfunctionStandards
CCMB-2009-07-004File metadata
Title | |
---|---|
Author | Ian Mearns |
Creation date | D:20101206093805 |
Modification date | D:20101206093805 |
Pages | 38 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Similar certificates
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '7c4a67bbabe66ff725f1b75754ba2be37d81f7e7ed9b4d8810f392d675288728', 'txt_hash': '52d3f38a5893964a4eb9fab8ceac7c131112f427979f864bb83209db08dfa667'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8', 'txt_hash': '68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 203099, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': 'D:20110111164749Z', '/_EmailSubject': 'Word -> PDF (3) ', '/Author': 'User', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/_AuthorEmailDisplayName': 'WhittakerAxon, Nigel', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': 'D:20110111164751Z', '/_PreviousAdHocReviewCycleID': '2047206653', '/_AdHocReviewCycleID': '-1320395370', '/Company': 'Certification Body, CESG', '/Title': 'Certification Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 580697, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Title': ' ', '/Author': 'Ian Mearns', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20101206093805', '/ModDate': 'D:20101206093805', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CRP260': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}, 'ATE': {'ATE_DPT.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation': 1, 'analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.4': 3, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.3': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FDP': {'FDP_ETC': 1, 'FDP_IFF': 1, 'FDP_ITC': 1, 'FDP_ETC.1': 5, 'FDP_ACC.1': 3, 'FDP_IFC.1': 10, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 3, 'FDP_IFF.1': 7, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 1, 'FDP_MSA.1': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 10, 'FMT_MSA.1': 5, 'FMT_SMR.1': 4, 'FMT_SMF.1': 7, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'cc_claims': {'O': {'O.SWITCH': 9, 'O.CONF': 5, 'O.CONNECT': 8, 'O.INDICATE': 3, 'O.SELECT': 3, 'O.INVOKE': 1, 'O.NOPROG': 5, 'O.ROM': 5}, 'T': {'T.BYPASS': 2, 'T.INSTALL': 2, 'T.LOGICAL': 3, 'T.PHYSICAL': 2, 'T.RESIDUAL': 2, 'T.SPOOF': 2, 'T.STATE': 2, 'T.TRANSFER': 4}, 'A': {'A.SCENARIO': 4, 'A.ACCESS': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.PHYSICAL': 2, 'A.EMISSION': 1, 'A.ISOLATE': 1}, 'OE': {'OE.ACCESS': 2, 'OE.MANAGE': 5, 'OE.NOEVIL': 5, 'OE.PHYSICAL': 4, 'OE.SCENARIO': 2, 'OE.EMISSION': 1, 'OE.ISOLATE': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
crp260.pdf
. - The st_filename property was set to
t265_st.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP260
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP269']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP269']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp260.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "4605e0eaf615d2c4",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP260",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"CRP269"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"CRP269"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Black Box Corporation",
"manufacturer_web": "https://www.blackbox.com/",
"name": "Secure Analogue and Digital KVM Switches - Black Box models SW2006A-USB-EAL, SW4006A-USB-EAL, SW2008A-USB-EAL, SW4008A-USB-EAL, SW2009A-USB-EAL, SW4009A-USB-EAL",
"not_valid_after": "2016-01-04",
"not_valid_before": "2011-01-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "crp260.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CRP260": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
},
"ATE": {
"ATE_DPT.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation": 1,
"analogue device only): product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "User",
"/Company": "Certification Body, CESG",
"/CreationDate": "D:20110111164749Z",
"/Creator": "Acrobat PDFMaker 7.0.5 for Word",
"/ModDate": "D:20110111164751Z",
"/Producer": "Acrobat Elements 7.0.5 (Windows)",
"/Title": "Certification Report",
"/_AdHocReviewCycleID": "-1320395370",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "WhittakerAxon, Nigel",
"/_EmailSubject": "Word -\u003e PDF (3) ",
"/_PreviousAdHocReviewCycleID": "2047206653",
"pdf_file_size_bytes": 203099,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "t265_st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 2,
"A.EMISSION": 1,
"A.ISOLATE": 1,
"A.MANAGE": 2,
"A.NOEVIL": 2,
"A.PHYSICAL": 2,
"A.SCENARIO": 4
},
"O": {
"O.CONF": 5,
"O.CONNECT": 8,
"O.INDICATE": 3,
"O.INVOKE": 1,
"O.NOPROG": 5,
"O.ROM": 5,
"O.SELECT": 3,
"O.SWITCH": 9
},
"OE": {
"OE.ACCESS": 2,
"OE.EMISSION": 1,
"OE.ISOLATE": 1,
"OE.MANAGE": 5,
"OE.NOEVIL": 5,
"OE.PHYSICAL": 4,
"OE.SCENARIO": 2
},
"T": {
"T.BYPASS": 2,
"T.INSTALL": 2,
"T.LOGICAL": 3,
"T.PHYSICAL": 2,
"T.RESIDUAL": 2,
"T.SPOOF": 2,
"T.STATE": 2,
"T.TRANSFER": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 3,
"ADV_IMP.1": 2,
"ADV_TDS.3": 4
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 5,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 5,
"ATE_FUN.1": 1,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 11,
"EAL4 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ETC": 1,
"FDP_ETC.1": 5,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 3,
"FDP_IFC.1": 10,
"FDP_IFC.1.1": 1,
"FDP_IFF": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 5,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 3,
"FDP_ITC.1.3": 1,
"FDP_MSA.1": 1
},
"FMT": {
"FMT_MSA": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 2,
"FMT_SMF": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Ian Mearns",
"/CreationDate": "D:20101206093805",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20101206093805",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": " ",
"pdf_file_size_bytes": 580697,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp260.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"ATE_DPT.2",
"ALC_FLR.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "7c4a67bbabe66ff725f1b75754ba2be37d81f7e7ed9b4d8810f392d675288728",
"txt_hash": "52d3f38a5893964a4eb9fab8ceac7c131112f427979f864bb83209db08dfa667"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8",
"txt_hash": "68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073"
}
},
"status": "archived"
}