Secure Analogue and Digital KVM Switches - Adder models AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX, AVSC1102-XX, AVSC1104-XX
CSV information ?
Status | archived |
---|---|
Valid from | 04.01.2011 |
Valid until | 04.01.2016 |
Scheme | 🇬🇧 UK |
Manufacturer | Adder Technology Ltd |
Category | Other Devices and Systems |
Security level | ALC_FLR.2, EAL4+, ATE_DPT.2 |
Heuristics summary ?
Certificate ?
Certification report ?
Extracted keywords
Security level
EAL4, EAL4 augmentedSecurity Assurance Requirements (SAR)
ALC_FLR.2, ATE_DPT.2Certificates
CRP259Certification process
out of scope, only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, althoughStandards
CCMB-2009-07-001, CCMB-2009-07-002, CCMB-2009-07-003, CCMB-2009-07-004File metadata
Title | Certification Report |
---|---|
Author | User |
Creation date | D:20110111164700Z |
Modification date | D:20110111164701Z |
Pages | 16 |
Creator | Acrobat PDFMaker 7.0.5 for Word |
Producer | Acrobat Elements 7.0.5 (Windows) |
References
Incoming- CRP268 - archived - Adder Secure Analogue and Digital KVM Switches, Version 1.0, AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX; where XX is one of the following: UK (United Kingdom), US (United States), EURO (Europe), AUS (Australia)
Security target ?
Extracted keywords
Security level
EAL4, EAL4 augmentedClaims
O.SWITCH, O.CONF, O.CONNECT, O.INDICATE, O.SELECT, O.INVOKE, O.NOPROG, O.ROM, T.BYPASS, T.INSTALL, T.LOGICAL, T.PHYSICAL, T.RESIDUAL, T.SPOOF, T.STATE, T.TRANSFER, A.SCENARIO, A.ACCESS, A.MANAGE, A.NOEVIL, A.PHYSICAL, A.EMISSION, A.ISOLATE, OE.ACCESS, OE.MANAGE, OE.NOEVIL, OE.PHYSICAL, OE.SCENARIO, OE.EMISSION, OE.ISOLATESecurity Assurance Requirements (SAR)
ADV_ARC.1, ADV_TDS.3, ADV_FSP.4, ADV_IMP.1, AGD_OPE.1, AGD_PRE.1, ALC_FLR.2, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_LCD.1, ALC_TAT.1, ATE_DPT.2, ATE_COV.2, ATE_FUN.1, ATE_IND.2, ATE_DPT, ATE_DPT.1, AVA_VAN.3Security Functional Requirements (SFR)
FAU_GEN, FDP_ETC, FDP_IFF, FDP_ITC, FDP_ETC.1, FDP_ACC.1, FDP_IFC.1, FDP_ETC.1.1, FDP_ETC.1.2, FDP_IFF.1, FDP_IFC.1.1, FDP_IFF.1.1, FDP_IFF.1.2, FDP_IFF.1.3, FDP_IFF.1.4, FDP_IFF.1.5, FDP_ITC.1, FDP_ITC.1.1, FDP_ITC.1.2, FDP_ITC.1.3, FDP_MSA.1, FMT_MSA, FMT_SMF, FMT_MSA.3, FMT_MSA.1, FMT_SMR.1, FMT_SMF.1, FMT_MSA.1.1, FMT_MSA.3.1, FMT_MSA.3.2, FMT_SMF.1.1Side-channel analysis
malfunctionStandards
CCMB-2009-07-004File metadata
Title | |
---|---|
Author | Ian Mearns |
Creation date | D:20101206093805 |
Modification date | D:20101206093805 |
Pages | 38 |
Creator | Microsoft® Office Word 2007 |
Producer | Microsoft® Office Word 2007 |
Heuristics ?
Extracted SARs
ADV_ARC.1, ADV_FSP.4, ADV_IMP.1, ADV_TDS.3, AGD_OPE.1, AGD_PRE.1, ALC_CMC.4, ALC_CMS.4, ALC_DEL.1, ALC_DVS.1, ALC_FLR.2, ALC_LCD.1, ALC_TAT.1, ATE_COV.2, ATE_DPT.2, ATE_FUN.1, ATE_IND.2, AVA_VAN.3Similar certificates
References ?
Updates ?
-
21.11.2024 The certificate data changed.
Certificate changed
The computed heuristics were updated.
- The following values were inserted:
{'prev_certificates': [], 'next_certificates': []}
.
- The following values were inserted:
-
22.08.2024 The certificate data changed.
Certificate changed
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '5f4b59e125498d73d8be1ec41775edea2f13f44ab2e61996641e1df22d891c16', 'txt_hash': '8b11e482c88f97ffd5a04198d38e3419225edf8fce1c059c59922497e1d7580b'}
data. - The st property was updated, with the
{'download_ok': True, 'convert_ok': True, 'extract_ok': True, 'pdf_hash': '842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8', 'txt_hash': '68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073'}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
{'pdf_file_size_bytes': 203891, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 16, '/CreationDate': 'D:20110111164700Z', '/_EmailSubject': 'Word -> PDF (3) ', '/Author': 'User', '/Creator': 'Acrobat PDFMaker 7.0.5 for Word', '/_AuthorEmailDisplayName': 'WhittakerAxon, Nigel', '/Producer': 'Acrobat Elements 7.0.5 (Windows)', '/_AuthorEmail': '[email protected]', '/ModDate': 'D:20110111164701Z', '/_PreviousAdHocReviewCycleID': '1885515888', '/_AdHocReviewCycleID': '-1657598661', '/Company': 'Certification Body, CESG', '/Title': 'Certification Report', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The st_metadata property was set to
{'pdf_file_size_bytes': 580697, 'pdf_is_encrypted': False, 'pdf_number_of_pages': 38, '/Title': ' ', '/Author': 'Ian Mearns', '/Creator': 'Microsoft® Office Word 2007', '/CreationDate': 'D:20101206093805', '/ModDate': 'D:20101206093805', '/Producer': 'Microsoft® Office Word 2007', 'pdf_hyperlinks': {'_type': 'Set', 'elements': []}}
. - The report_frontpage property was set to
{}
. - The report_keywords property was set to
{'cc_cert_id': {'UK': {'CRP259': 2}}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 2, 'EAL4 augmented': 2}}, 'cc_sar': {'ALC': {'ALC_FLR.2': 2}, 'ATE': {'ATE_DPT.2': 2}}, 'cc_sfr': {}, 'cc_claims': {}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-001': 1, 'CCMB-2009-07-002': 1, 'CCMB-2009-07-003': 1, 'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {'OutOfScope': {'out of scope': 1, 'only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although': 1}}}
. - The st_keywords property was set to
{'cc_cert_id': {}, 'cc_protection_profile_id': {}, 'cc_security_level': {'EAL': {'EAL4': 11, 'EAL4 augmented': 5}}, 'cc_sar': {'ADV': {'ADV_ARC.1': 2, 'ADV_TDS.3': 4, 'ADV_FSP.4': 3, 'ADV_IMP.1': 2}, 'AGD': {'AGD_OPE.1': 1, 'AGD_PRE.1': 1}, 'ALC': {'ALC_FLR.2': 5, 'ALC_CMC.4': 1, 'ALC_CMS.4': 1, 'ALC_DEL.1': 1, 'ALC_DVS.1': 1, 'ALC_LCD.1': 1, 'ALC_TAT.1': 1}, 'ATE': {'ATE_DPT.2': 5, 'ATE_COV.2': 1, 'ATE_FUN.1': 1, 'ATE_IND.2': 2, 'ATE_DPT': 1, 'ATE_DPT.1': 1}, 'AVA': {'AVA_VAN.3': 3}}, 'cc_sfr': {'FAU': {'FAU_GEN': 1}, 'FDP': {'FDP_ETC': 1, 'FDP_IFF': 1, 'FDP_ITC': 1, 'FDP_ETC.1': 5, 'FDP_ACC.1': 3, 'FDP_IFC.1': 10, 'FDP_ETC.1.1': 1, 'FDP_ETC.1.2': 3, 'FDP_IFF.1': 7, 'FDP_IFC.1.1': 1, 'FDP_IFF.1.1': 1, 'FDP_IFF.1.2': 1, 'FDP_IFF.1.3': 1, 'FDP_IFF.1.4': 1, 'FDP_IFF.1.5': 1, 'FDP_ITC.1': 5, 'FDP_ITC.1.1': 1, 'FDP_ITC.1.2': 3, 'FDP_ITC.1.3': 1, 'FDP_MSA.1': 1}, 'FMT': {'FMT_MSA': 1, 'FMT_SMF': 1, 'FMT_MSA.3': 10, 'FMT_MSA.1': 5, 'FMT_SMR.1': 4, 'FMT_SMF.1': 7, 'FMT_MSA.1.1': 2, 'FMT_MSA.3.1': 1, 'FMT_MSA.3.2': 2, 'FMT_SMF.1.1': 2}}, 'cc_claims': {'O': {'O.SWITCH': 9, 'O.CONF': 5, 'O.CONNECT': 8, 'O.INDICATE': 3, 'O.SELECT': 3, 'O.INVOKE': 1, 'O.NOPROG': 5, 'O.ROM': 5}, 'T': {'T.BYPASS': 2, 'T.INSTALL': 2, 'T.LOGICAL': 3, 'T.PHYSICAL': 2, 'T.RESIDUAL': 2, 'T.SPOOF': 2, 'T.STATE': 2, 'T.TRANSFER': 4}, 'A': {'A.SCENARIO': 4, 'A.ACCESS': 2, 'A.MANAGE': 2, 'A.NOEVIL': 2, 'A.PHYSICAL': 2, 'A.EMISSION': 1, 'A.ISOLATE': 1}, 'OE': {'OE.ACCESS': 2, 'OE.MANAGE': 5, 'OE.NOEVIL': 5, 'OE.PHYSICAL': 4, 'OE.SCENARIO': 2, 'OE.EMISSION': 1, 'OE.ISOLATE': 1}}, 'vendor': {}, 'eval_facility': {}, 'symmetric_crypto': {}, 'asymmetric_crypto': {}, 'pq_crypto': {}, 'hash_function': {}, 'crypto_scheme': {}, 'crypto_protocol': {}, 'randomness': {}, 'cipher_mode': {}, 'ecc_curve': {}, 'crypto_engine': {}, 'tls_cipher_suite': {}, 'crypto_library': {}, 'vulnerability': {}, 'side_channel_analysis': {'FI': {'malfunction': 2}}, 'technical_report_id': {}, 'device_model': {}, 'tee_name': {}, 'os_name': {}, 'cplc_data': {}, 'ic_data_group': {}, 'standard_id': {'CC': {'CCMB-2009-07-004': 1}}, 'javacard_version': {}, 'javacard_api_const': {}, 'javacard_packages': {}, 'certification_process': {}}
. - The report_filename property was set to
crp259.pdf
. - The st_filename property was set to
t265_st.pdf
.
The computed heuristics were updated.
- The cert_id property was set to
CRP259
. - The report_references property was updated, with the
{'directly_referenced_by': {'_type': 'Set', 'elements': ['CRP268']}, 'indirectly_referenced_by': {'_type': 'Set', 'elements': ['CRP268']}}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values added.
- The report property was updated, with the
-
17.08.2024 The certificate data changed.
Certificate changed
The report_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp259.pdf
.
The st_link was updated.
- The new value is
https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf
.
The state of the certificate object was updated.
- The report property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data. - The st property was updated, with the
{'download_ok': False, 'convert_ok': False, 'extract_ok': False, 'pdf_hash': None, 'txt_hash': None}
data.
The PDF extraction data was updated.
- The report_metadata property was set to
None
. - The st_metadata property was set to
None
. - The report_frontpage property was set to
None
. - The report_keywords property was set to
None
. - The st_keywords property was set to
None
. - The report_filename property was set to
None
. - The st_filename property was set to
None
.
The computed heuristics were updated.
- The cert_id property was set to
None
. - The report_references property was updated, with the
{'directly_referenced_by': None, 'indirectly_referenced_by': None}
data. - The extracted_sars property was updated, with the
{'_type': 'Set', 'elements': [{'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_PRE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_ARC', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMS', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_FSP', 'level': 4}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_TAT', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_FUN', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_COV', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DVS', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AGD_OPE', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_IMP', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ADV_TDS', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_DEL', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'AVA_VAN', 'level': 3}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_LCD', 'level': 1}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ATE_IND', 'level': 2}, {'_type': 'sec_certs.sample.sar.SAR', 'family': 'ALC_CMC', 'level': 4}]}
values discarded.
- The new value is
-
23.07.2024 The certificate was first processed.
New certificate
A new Common Criteria certificate with the product name Secure Analogue and Digital KVM Switches - Adder models AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX, AVSC1102-XX, AVSC1104-XX was processed.
Raw data
{
"_type": "sec_certs.sample.cc.CCCertificate",
"category": "Other Devices and Systems",
"cert_link": null,
"dgst": "6e669d948d6b545b",
"heuristics": {
"_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
"annotated_references": null,
"cert_id": "CRP259",
"cert_lab": null,
"cpe_matches": null,
"direct_transitive_cves": null,
"extracted_sars": {
"_type": "Set",
"elements": [
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_TAT",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMC",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_IND",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_FLR",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_CMS",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DEL",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_IMP",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_DPT",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_OPE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_FSP",
"level": 4
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_ARC",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_LCD",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ALC_DVS",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AGD_PRE",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ADV_TDS",
"level": 3
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_FUN",
"level": 1
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "ATE_COV",
"level": 2
},
{
"_type": "sec_certs.sample.sar.SAR",
"family": "AVA_VAN",
"level": 3
}
]
},
"extracted_versions": {
"_type": "Set",
"elements": [
"-"
]
},
"indirect_transitive_cves": null,
"next_certificates": [],
"prev_certificates": [],
"related_cves": null,
"report_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": {
"_type": "Set",
"elements": [
"CRP268"
]
},
"directly_referencing": null,
"indirectly_referenced_by": {
"_type": "Set",
"elements": [
"CRP268"
]
},
"indirectly_referencing": null
},
"scheme_data": null,
"st_references": {
"_type": "sec_certs.sample.certificate.References",
"directly_referenced_by": null,
"directly_referencing": null,
"indirectly_referenced_by": null,
"indirectly_referencing": null
},
"verified_cpe_matches": null
},
"maintenance_updates": {
"_type": "Set",
"elements": []
},
"manufacturer": "Adder Technology Ltd",
"manufacturer_web": "https://www.adder.com/",
"name": "Secure Analogue and Digital KVM Switches - Adder models AVSD1002-XX, AVSD1004-XX, AVSV1002-XX, AVSV1004-XX, AVSC1102-XX, AVSC1104-XX",
"not_valid_after": "2016-01-04",
"not_valid_before": "2011-01-04",
"pdf_data": {
"_type": "sec_certs.sample.cc.CCCertificate.PdfData",
"cert_filename": null,
"cert_frontpage": null,
"cert_keywords": null,
"cert_metadata": null,
"report_filename": "crp259.pdf",
"report_frontpage": {},
"report_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {
"UK": {
"CRP259": 2
}
},
"cc_claims": {},
"cc_protection_profile_id": {},
"cc_sar": {
"ALC": {
"ALC_FLR.2": 2
},
"ATE": {
"ATE_DPT.2": 2
}
},
"cc_security_level": {
"EAL": {
"EAL4": 2,
"EAL4 augmented": 2
}
},
"cc_sfr": {},
"certification_process": {
"OutOfScope": {
"only): this provides product authentication and tamper detection and response. These features are out of scope of the evaluation. TOE Dependencies 38. The TOE has no external dependencies for security, although": 1,
"out of scope": 1
}
},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {},
"standard_id": {
"CC": {
"CCMB-2009-07-001": 1,
"CCMB-2009-07-002": 1,
"CCMB-2009-07-003": 1,
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"report_metadata": {
"/Author": "User",
"/Company": "Certification Body, CESG",
"/CreationDate": "D:20110111164700Z",
"/Creator": "Acrobat PDFMaker 7.0.5 for Word",
"/ModDate": "D:20110111164701Z",
"/Producer": "Acrobat Elements 7.0.5 (Windows)",
"/Title": "Certification Report",
"/_AdHocReviewCycleID": "-1657598661",
"/_AuthorEmail": "[email protected]",
"/_AuthorEmailDisplayName": "WhittakerAxon, Nigel",
"/_EmailSubject": "Word -\u003e PDF (3) ",
"/_PreviousAdHocReviewCycleID": "1885515888",
"pdf_file_size_bytes": 203891,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 16
},
"st_filename": "t265_st.pdf",
"st_frontpage": null,
"st_keywords": {
"asymmetric_crypto": {},
"cc_cert_id": {},
"cc_claims": {
"A": {
"A.ACCESS": 2,
"A.EMISSION": 1,
"A.ISOLATE": 1,
"A.MANAGE": 2,
"A.NOEVIL": 2,
"A.PHYSICAL": 2,
"A.SCENARIO": 4
},
"O": {
"O.CONF": 5,
"O.CONNECT": 8,
"O.INDICATE": 3,
"O.INVOKE": 1,
"O.NOPROG": 5,
"O.ROM": 5,
"O.SELECT": 3,
"O.SWITCH": 9
},
"OE": {
"OE.ACCESS": 2,
"OE.EMISSION": 1,
"OE.ISOLATE": 1,
"OE.MANAGE": 5,
"OE.NOEVIL": 5,
"OE.PHYSICAL": 4,
"OE.SCENARIO": 2
},
"T": {
"T.BYPASS": 2,
"T.INSTALL": 2,
"T.LOGICAL": 3,
"T.PHYSICAL": 2,
"T.RESIDUAL": 2,
"T.SPOOF": 2,
"T.STATE": 2,
"T.TRANSFER": 4
}
},
"cc_protection_profile_id": {},
"cc_sar": {
"ADV": {
"ADV_ARC.1": 2,
"ADV_FSP.4": 3,
"ADV_IMP.1": 2,
"ADV_TDS.3": 4
},
"AGD": {
"AGD_OPE.1": 1,
"AGD_PRE.1": 1
},
"ALC": {
"ALC_CMC.4": 1,
"ALC_CMS.4": 1,
"ALC_DEL.1": 1,
"ALC_DVS.1": 1,
"ALC_FLR.2": 5,
"ALC_LCD.1": 1,
"ALC_TAT.1": 1
},
"ATE": {
"ATE_COV.2": 1,
"ATE_DPT": 1,
"ATE_DPT.1": 1,
"ATE_DPT.2": 5,
"ATE_FUN.1": 1,
"ATE_IND.2": 2
},
"AVA": {
"AVA_VAN.3": 3
}
},
"cc_security_level": {
"EAL": {
"EAL4": 11,
"EAL4 augmented": 5
}
},
"cc_sfr": {
"FAU": {
"FAU_GEN": 1
},
"FDP": {
"FDP_ACC.1": 3,
"FDP_ETC": 1,
"FDP_ETC.1": 5,
"FDP_ETC.1.1": 1,
"FDP_ETC.1.2": 3,
"FDP_IFC.1": 10,
"FDP_IFC.1.1": 1,
"FDP_IFF": 1,
"FDP_IFF.1": 7,
"FDP_IFF.1.1": 1,
"FDP_IFF.1.2": 1,
"FDP_IFF.1.3": 1,
"FDP_IFF.1.4": 1,
"FDP_IFF.1.5": 1,
"FDP_ITC": 1,
"FDP_ITC.1": 5,
"FDP_ITC.1.1": 1,
"FDP_ITC.1.2": 3,
"FDP_ITC.1.3": 1,
"FDP_MSA.1": 1
},
"FMT": {
"FMT_MSA": 1,
"FMT_MSA.1": 5,
"FMT_MSA.1.1": 2,
"FMT_MSA.3": 10,
"FMT_MSA.3.1": 1,
"FMT_MSA.3.2": 2,
"FMT_SMF": 1,
"FMT_SMF.1": 7,
"FMT_SMF.1.1": 2,
"FMT_SMR.1": 4
}
},
"certification_process": {},
"cipher_mode": {},
"cplc_data": {},
"crypto_engine": {},
"crypto_library": {},
"crypto_protocol": {},
"crypto_scheme": {},
"device_model": {},
"ecc_curve": {},
"eval_facility": {},
"hash_function": {},
"ic_data_group": {},
"javacard_api_const": {},
"javacard_packages": {},
"javacard_version": {},
"os_name": {},
"pq_crypto": {},
"randomness": {},
"side_channel_analysis": {
"FI": {
"malfunction": 2
}
},
"standard_id": {
"CC": {
"CCMB-2009-07-004": 1
}
},
"symmetric_crypto": {},
"technical_report_id": {},
"tee_name": {},
"tls_cipher_suite": {},
"vendor": {},
"vulnerability": {}
},
"st_metadata": {
"/Author": "Ian Mearns",
"/CreationDate": "D:20101206093805",
"/Creator": "Microsoft\u00ae Office Word 2007",
"/ModDate": "D:20101206093805",
"/Producer": "Microsoft\u00ae Office Word 2007",
"/Title": " ",
"pdf_file_size_bytes": 580697,
"pdf_hyperlinks": {
"_type": "Set",
"elements": []
},
"pdf_is_encrypted": false,
"pdf_number_of_pages": 38
}
},
"protection_profiles": {
"_type": "Set",
"elements": []
},
"report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/crp259.pdf",
"scheme": "UK",
"security_level": {
"_type": "Set",
"elements": [
"ATE_DPT.2",
"ALC_FLR.2",
"EAL4+"
]
},
"st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/t265_st.pdf",
"state": {
"_type": "sec_certs.sample.cc.CCCertificate.InternalState",
"cert": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": false,
"download_ok": false,
"extract_ok": false,
"pdf_hash": null,
"txt_hash": null
},
"report": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "5f4b59e125498d73d8be1ec41775edea2f13f44ab2e61996641e1df22d891c16",
"txt_hash": "8b11e482c88f97ffd5a04198d38e3419225edf8fce1c059c59922497e1d7580b"
},
"st": {
"_type": "sec_certs.sample.cc.CCCertificate.DocumentState",
"convert_garbage": false,
"convert_ok": true,
"download_ok": true,
"extract_ok": true,
"pdf_hash": "842c04aa6cdab4a566c602b2ff6f7f69403ec76d7f770ec4c62c1dfeae7387a8",
"txt_hash": "68ed8a0bffe65cb23ce383a1128dde7d1ba5d2d21d7263bc91a9f35d000aa073"
}
},
"status": "archived"
}