Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7

This certificate has disappeared from the Common Criteria portal listing*. However, there is a certificate that matches this one in the current listing:
Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 CCEVS-VR-VID-11254-2022 Compare
You can also examine other similar certificates below.

CSV information

Status active
Valid from 31.01.2022
Valid until 31.01.2027
Scheme 🇺🇸 US
Manufacturer Vertiv IT Systems
Category Other Devices and Systems
Security level
Protection profiles

Heuristics summary

Certificate ID: CCEVS-VR-VID-11254-2022

Certificate

Extracted keywords

Certificates
CCEVS-VR-VID11254-2022
Evaluation facilities
Acumen Security

File metadata

Creation date D:20220201154340-05'00'
Modification date D:20220201154340-05'00'
Pages 1
Producer iText 2.1.0 (by lowagie.com)

Certification report

Extracted keywords

Vendor
STMicroelectronics

Security level
EAL 1
Claims
T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS
Certificates
CCEVS-VR-VID11254-2022
Evaluation facilities
Acumen Security

File metadata

Author ppatin
Creation date D:20220131200223-05'00'
Modification date D:20220131200223-05'00'
Pages 25
Creator Microsoft® Word for Microsoft 365
Producer Microsoft® Word for Microsoft 365

Frontpage

Certificate ID CCEVS-VR-VID11254-2022
Certified item for the Vertiv CYBEX™ SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX™ SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0
Certification lab US NIAP

Security target

Extracted keywords

Device models
STM32F070C6T6

Claims
O.COMPUTER, O.USER_DATA, O.NO_USER, O.NO_OTHER, O.LEAK, O.AUTHORIZED, O.PERIPHERAL, O.REJECT, O.NO_TOE_ACCESS, O.TAMPER, O.ANTI_TAMPERING, O.SELF_TEST, O.EMULATED_INPUT, O.UNIDIRECTIONAL, O.PERIPHERAL_PORTS, O.LEAK_PREVENTION, O.NO_USER_DATA, O.TAMPER_EVIDENT, O.SELF_TEST_FAIL, T.DATA_LEAK, T.SIGNAL_LEAK, T.RESIDUAL_LEAK, T.UNINTENDED_USE, T.UNAUTHORIZED_DEVICES, T.LOGICAL_TAMPER, T.PHYSICAL_TAMPER, T.REPLACEMENT, T.FAILED, T.RESIDUAL, T.UNINTENDED, T.UNAUTHORIZED, T.LOGICAL, T.PHYSICAL, A.NO_TEMPEST, A.PHYSICAL, A.NO_WIRELESS_DEVICES, A.TRUSTED_ADMIN, A.TRUSTED_CONFIG, A.USER_ALLOWED_ACCESS, A.NO_PHYSICAL, A.NO_WIRELESS, A.TRUSTED, A.USER_ALLOWED, OE.NO_TEMPEST, OE.PHYSICAL, OE.NO_WIRELESS_DEVICES, OE.TRUSTED_ADMIN, OE.TRUSTED_CONFIG, OE.NO_WIRELESS, OE.TRUSTED
Security Assurance Requirements (SAR)
ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ATE_IND.1, AVA_VAN.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1
Security Functional Requirements (SFR)
FAU_GEN.1, FDP_APC_EXT, FDP_FIL_EXT, FDP_PDC_EXT, FDP_RDR_EXT, FDP_RIP_EXT, FDP_SWI_EXT, FDP_UDF_EXT, FDP_PDC_EXT.1, FDP_RDR_EXT.1, FDP_SWI_EXT.3, FDP_RIP_EXT.1, FDP_RIP, FDP_SWI_EXT.1, FDP_SWI_EXT.2, FDP_APC_EXT.1, FDP_APC_EXT.1.1, FDP_APC_EXT.1.2, FDP_APC_EXT.1.3, FDP_APC_EXT.1.4, FDP_FIL_EXT.1, FDP_FIL_EXT.1.1, FDP_FIL_EXT.1.2, FDP_FIL_EXT.1.3, FDP_PDC_EXT.2, FDP_PDC_EXT.3, FDP_PDC_EXT.1.1, FDP_PDC_EXT.1.2, FDP_PDC_EXT.1.3, FDP_PDC_EXT.1.4, FDP_PDC_EXT.1.5, FDP_PDC_EXT.2.1, FDP_PDC_EXT.2.2, FDP_PDC_EXT.3.1, FDP_PDC_EXT.3.2, FDP_RDR_EXT.1.1, FDP_RIP_EXT.1.1, FDP_SWI_EXT.1.1, FDP_SWI_EXT.2.1, FDP_SWI_EXT.2.2, FDP_SWI_EXT.3.1, FDP_UDF_EXT.1, FDP_UDF_EXT.1.1, FDP_FLS_EXT, FDP_RIP.1, FPT_FLS_EXT, FPT_NTA_EXT, FPT_TST_EXT, FPT_NTA_EXT.1, FPT_PHP.1, FPT_PHP.3, FPT_TST.1, FPT_FLS_EXT.1, FPT_TST_EXT.1, FPT_FLS_EXT.1.1, FPT_NTA_EXT.1.1, FPT_TST_EXT.1.1, FPT_PHP.1.1, FPT_PHP.1.2, FPT_PHP.3.1, FPT_TST.1.1, FPT_TST.1.2, FPT_TST.1.3, FTA_CIN_EXT, FTA_CIN_EXT.1, FTA_CIN_EXT.1.1, FTA_CIN_EXT.1.2, FTA_CIN_EXT.1.3
Evaluation facilities
EWA-Canada, Intertek

Side-channel analysis
physical tampering, Physical Tampering

Standards
CCMB-2017-04-001, CCMB-2017-04-002, CCMB-2017-04-003

File metadata

Title Security Target
Author Teresa MacArthur
Creation date D:20220118120850-05'00'
Modification date D:20220118121225-05'00'
Pages 51
Creator Acrobat PDFMaker 17 for Word
Producer Adobe PDF Library 17.11.238

Heuristics

Automated inference - use with caution

All attributes shown in this section (e.g., links between certificates, products, vendors, and known CVEs) are generated by automated heuristics and have not been reviewed by humans. These methods can produce false positives or false negatives and should not be treated as definitive without independent verification. For details on our data sources and inference methods, see our methodology. If you believe any information here is inaccurate or harmful, please submit feedback.

Certificate ID

CCEVS-VR-VID-11254-2022

Extracted SARs

ADV_FSP.1, AGD_OPE.1, AGD_PRE.1, ALC_CMC.1, ALC_CMS.1, ASE_CCL.1, ASE_ECD.1, ASE_INT.1, ASE_OBJ.2, ASE_REQ.2, ASE_SPD.1, ASE_TSS.1, ATE_IND.1, AVA_VAN.1

References

No references are available for this certificate.

Updates Feed

  • The certificate became unavailable — it disappeared from the upstream listing.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate data changed.
  • The certificate was first processed.

Raw data

{
  "_type": "sec_certs.sample.cc.CCCertificate",
  "category": "Other Devices and Systems",
  "cert_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11254-ci.pdf",
  "dgst": "8497ccc72815debd",
  "heuristics": {
    "_type": "sec_certs.sample.cc.CCCertificate.Heuristics",
    "annotated_references": null,
    "cert_id": "CCEVS-VR-VID-11254-2022",
    "cert_lab": [
      "US"
    ],
    "cpe_matches": null,
    "direct_transitive_cves": null,
    "eal": "EAL1",
    "extracted_sars": {
      "_type": "Set",
      "elements": [
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_INT",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ADV_FSP",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ATE_IND",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_PRE",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_CCL",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_SPD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_REQ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_ECD",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AVA_VAN",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ALC_CMC",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_TSS",
          "level": 1
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "ASE_OBJ",
          "level": 2
        },
        {
          "_type": "sec_certs.sample.sar.SAR",
          "family": "AGD_OPE",
          "level": 1
        }
      ]
    },
    "extracted_versions": {
      "_type": "Set",
      "elements": [
        "40404"
      ]
    },
    "indirect_transitive_cves": null,
    "next_certificates": null,
    "prev_certificates": null,
    "protection_profiles": {
      "_type": "Set",
      "elements": [
        "76f8f05a35d87f59",
        "814f66c77bc7f33b"
      ]
    },
    "related_cves": null,
    "report_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "scheme_data": null,
    "st_references": {
      "_type": "sec_certs.sample.certificate.References",
      "directly_referenced_by": null,
      "directly_referencing": null,
      "indirectly_referenced_by": null,
      "indirectly_referencing": null
    },
    "verified_cpe_matches": null
  },
  "maintenance_updates": {
    "_type": "Set",
    "elements": []
  },
  "manufacturer": "Vertiv IT Systems",
  "manufacturer_web": "https://www.vertiv.com",
  "name": "Vertiv CYBEX\u2122 SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX\u2122 SCKM140PP4 KM Switch Firmware Version 40404-0E7",
  "not_valid_after": "2027-01-31",
  "not_valid_before": "2022-01-31",
  "pdf_data": {
    "_type": "sec_certs.sample.cc.CCCertificate.PdfData",
    "cert_filename": "st_vid11254-ci.pdf",
    "cert_frontpage": null,
    "cert_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11254-2022": 1
        }
      },
      "cc_claims": {},
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {},
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "cert_metadata": {
      "/CreationDate": "D:20220201154340-05\u002700\u0027",
      "/ModDate": "D:20220201154340-05\u002700\u0027",
      "/Producer": "iText 2.1.0 (by lowagie.com)",
      "pdf_file_size_bytes": 182148,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 1
    },
    "report_filename": "st_vid11254-vr.pdf",
    "report_frontpage": {
      "US": {
        "cert_id": "CCEVS-VR-VID11254-2022",
        "cert_item": "for the Vertiv CYBEX\u2122 SCUSBHIDFILTER Firmware Version 40404-0E7 and Vertiv CYBEX\u2122 SCKM140PP4 KM Switch Firmware Version 40404-0E7 Peripheral Sharing Devices Version 1.0",
        "cert_lab": "US NIAP"
      }
    },
    "report_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {
        "US": {
          "CCEVS-VR-VID11254-2022": 1
        }
      },
      "cc_claims": {
        "A": {
          "A.NO_TEMPEST": 1,
          "A.NO_WIRELESS_DEVICES": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED_ADMIN": 1,
          "A.TRUSTED_CONFIG": 1,
          "A.USER_ALLOWED_ACCESS": 1
        },
        "T": {
          "T.DATA_LEAK": 1,
          "T.FAILED": 1,
          "T.LOGICAL_TAMPER": 1,
          "T.PHYSICAL_TAMPER": 1,
          "T.REPLACEMENT": 1,
          "T.RESIDUAL_LEAK": 1,
          "T.SIGNAL_LEAK": 1,
          "T.UNAUTHORIZED_DEVICES": 1,
          "T.UNINTENDED_USE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {},
      "cc_security_level": {
        "EAL": {
          "EAL 1": 6
        }
      },
      "cc_sfr": {},
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {},
      "ecc_curve": {},
      "eval_facility": {
        "Acumen": {
          "Acumen Security": 6
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {},
      "standard_id": {},
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {
        "STMicroelectronics": {
          "STMicroelectronics": 1
        }
      },
      "vulnerability": {}
    },
    "report_metadata": {
      "/Author": "ppatin",
      "/CreationDate": "D:20220131200223-05\u002700\u0027",
      "/Creator": "Microsoft\u00ae Word for Microsoft 365",
      "/ModDate": "D:20220131200223-05\u002700\u0027",
      "/Producer": "Microsoft\u00ae Word for Microsoft 365",
      "pdf_file_size_bytes": 459318,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": []
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 25
    },
    "st_filename": "st_vid11254-st2.pdf",
    "st_frontpage": null,
    "st_keywords": {
      "asymmetric_crypto": {},
      "cc_cert_id": {},
      "cc_claims": {
        "A": {
          "A.NO_PHYSICAL": 1,
          "A.NO_TEMPEST": 2,
          "A.NO_WIRELESS": 1,
          "A.NO_WIRELESS_DEVICES": 1,
          "A.PHYSICAL": 1,
          "A.TRUSTED": 1,
          "A.TRUSTED_ADMIN": 2,
          "A.TRUSTED_CONFIG": 1,
          "A.USER_ALLOWED": 1,
          "A.USER_ALLOWED_ACCESS": 1
        },
        "O": {
          "O.ANTI_TAMPERING": 2,
          "O.AUTHORIZED": 2,
          "O.COMPUTER": 5,
          "O.EMULATED_INPUT": 3,
          "O.LEAK": 1,
          "O.LEAK_PREVENTION": 1,
          "O.NO_OTHER": 3,
          "O.NO_TOE_ACCESS": 2,
          "O.NO_USER": 1,
          "O.NO_USER_DATA": 1,
          "O.PERIPHERAL": 1,
          "O.PERIPHERAL_PORTS": 1,
          "O.REJECT": 4,
          "O.SELF_TEST": 4,
          "O.SELF_TEST_FAIL": 2,
          "O.TAMPER": 1,
          "O.TAMPER_EVIDENT": 2,
          "O.UNIDIRECTIONAL": 3,
          "O.USER_DATA": 2
        },
        "OE": {
          "OE.NO_TEMPEST": 2,
          "OE.NO_WIRELESS": 1,
          "OE.NO_WIRELESS_DEVICES": 1,
          "OE.PHYSICAL": 3,
          "OE.TRUSTED": 2,
          "OE.TRUSTED_ADMIN": 1,
          "OE.TRUSTED_CONFIG": 1
        },
        "T": {
          "T.DATA_LEAK": 2,
          "T.FAILED": 2,
          "T.LOGICAL": 1,
          "T.LOGICAL_TAMPER": 1,
          "T.PHYSICAL": 1,
          "T.PHYSICAL_TAMPER": 1,
          "T.REPLACEMENT": 2,
          "T.RESIDUAL": 1,
          "T.RESIDUAL_LEAK": 1,
          "T.SIGNAL_LEAK": 2,
          "T.UNAUTHORIZED": 1,
          "T.UNAUTHORIZED_DEVICES": 1,
          "T.UNINTENDED": 1,
          "T.UNINTENDED_USE": 1
        }
      },
      "cc_protection_profile_id": {},
      "cc_sar": {
        "ADV": {
          "ADV_FSP.1": 1
        },
        "AGD": {
          "AGD_OPE.1": 1,
          "AGD_PRE.1": 1
        },
        "ALC": {
          "ALC_CMC.1": 1,
          "ALC_CMS.1": 1
        },
        "ASE": {
          "ASE_CCL.1": 1,
          "ASE_ECD.1": 1,
          "ASE_INT.1": 1,
          "ASE_OBJ.2": 1,
          "ASE_REQ.2": 1,
          "ASE_SPD.1": 1,
          "ASE_TSS.1": 1
        },
        "ATE": {
          "ATE_IND.1": 1
        },
        "AVA": {
          "AVA_VAN.1": 1
        }
      },
      "cc_security_level": {},
      "cc_sfr": {
        "FAU": {
          "FAU_GEN.1": 3
        },
        "FDP": {
          "FDP_APC_EXT": 15,
          "FDP_APC_EXT.1": 12,
          "FDP_APC_EXT.1.1": 1,
          "FDP_APC_EXT.1.2": 1,
          "FDP_APC_EXT.1.3": 1,
          "FDP_APC_EXT.1.4": 1,
          "FDP_FIL_EXT": 15,
          "FDP_FIL_EXT.1": 7,
          "FDP_FIL_EXT.1.1": 1,
          "FDP_FIL_EXT.1.2": 1,
          "FDP_FIL_EXT.1.3": 1,
          "FDP_FLS_EXT": 1,
          "FDP_PDC_EXT": 16,
          "FDP_PDC_EXT.1": 25,
          "FDP_PDC_EXT.1.1": 2,
          "FDP_PDC_EXT.1.2": 1,
          "FDP_PDC_EXT.1.3": 1,
          "FDP_PDC_EXT.1.4": 1,
          "FDP_PDC_EXT.1.5": 1,
          "FDP_PDC_EXT.2": 6,
          "FDP_PDC_EXT.2.1": 1,
          "FDP_PDC_EXT.2.2": 1,
          "FDP_PDC_EXT.3": 7,
          "FDP_PDC_EXT.3.1": 1,
          "FDP_PDC_EXT.3.2": 1,
          "FDP_RDR_EXT": 4,
          "FDP_RDR_EXT.1": 14,
          "FDP_RDR_EXT.1.1": 2,
          "FDP_RIP": 5,
          "FDP_RIP.1": 1,
          "FDP_RIP_EXT": 4,
          "FDP_RIP_EXT.1": 9,
          "FDP_RIP_EXT.1.1": 2,
          "FDP_SWI_EXT": 4,
          "FDP_SWI_EXT.1": 12,
          "FDP_SWI_EXT.1.1": 2,
          "FDP_SWI_EXT.2": 10,
          "FDP_SWI_EXT.2.1": 2,
          "FDP_SWI_EXT.2.2": 3,
          "FDP_SWI_EXT.3": 14,
          "FDP_SWI_EXT.3.1": 2,
          "FDP_UDF_EXT": 10,
          "FDP_UDF_EXT.1": 5,
          "FDP_UDF_EXT.1.1": 1
        },
        "FPT": {
          "FPT_FLS_EXT": 3,
          "FPT_FLS_EXT.1": 10,
          "FPT_FLS_EXT.1.1": 3,
          "FPT_NTA_EXT": 4,
          "FPT_NTA_EXT.1": 8,
          "FPT_NTA_EXT.1.1": 2,
          "FPT_PHP.1": 6,
          "FPT_PHP.1.1": 1,
          "FPT_PHP.1.2": 1,
          "FPT_PHP.3": 7,
          "FPT_PHP.3.1": 1,
          "FPT_TST.1": 7,
          "FPT_TST.1.1": 1,
          "FPT_TST.1.2": 1,
          "FPT_TST.1.3": 1,
          "FPT_TST_EXT": 4,
          "FPT_TST_EXT.1": 10,
          "FPT_TST_EXT.1.1": 2
        },
        "FTA": {
          "FTA_CIN_EXT": 4,
          "FTA_CIN_EXT.1": 9,
          "FTA_CIN_EXT.1.1": 2,
          "FTA_CIN_EXT.1.2": 2,
          "FTA_CIN_EXT.1.3": 2
        }
      },
      "certification_process": {},
      "cipher_mode": {},
      "cplc_data": {},
      "crypto_engine": {},
      "crypto_library": {},
      "crypto_protocol": {},
      "crypto_scheme": {},
      "device_model": {
        "STM": {
          "STM32": {
            "STM32F070C6T6": 1
          }
        }
      },
      "ecc_curve": {},
      "eval_facility": {
        "EWA": {
          "EWA-Canada": 1
        },
        "Intertek": {
          "Intertek": 1
        }
      },
      "hash_function": {},
      "ic_data_group": {},
      "javacard_api_const": {},
      "javacard_packages": {},
      "javacard_version": {},
      "os_name": {},
      "pq_crypto": {},
      "randomness": {},
      "side_channel_analysis": {
        "FI": {
          "Physical Tampering": 1,
          "physical tampering": 6
        }
      },
      "standard_id": {
        "CC": {
          "CCMB-2017-04-001": 1,
          "CCMB-2017-04-002": 1,
          "CCMB-2017-04-003": 1
        }
      },
      "symmetric_crypto": {},
      "technical_report_id": {},
      "tee_name": {},
      "tls_cipher_suite": {},
      "vendor": {},
      "vulnerability": {}
    },
    "st_metadata": {
      "/Author": "Teresa MacArthur",
      "/Client Full Name": "Vertiv",
      "/Client Short Name": "Vertiv",
      "/Comments": "CC V3.1 Security Target\r\nTemplate Version 1_0",
      "/Company": "EWA-Canada",
      "/CreationDate": "D:20220118120850-05\u002700\u0027",
      "/Creator": "Acrobat PDFMaker 17 for Word",
      "/Document Number": "2149-001-D102C4A",
      "/ModDate": "D:20220118121225-05\u002700\u0027",
      "/Producer": "Adobe PDF Library 17.11.238",
      "/Product_Name": "Vertiv Secure KM Switch",
      "/ST_Date": "13 January 2022",
      "/ST_Version": "1.18",
      "/SourceModified": "D:20220118170620",
      "/Title": "Security Target",
      "pdf_file_size_bytes": 835600,
      "pdf_hyperlinks": {
        "_type": "Set",
        "elements": [
          "http://www.vertiv.com/"
        ]
      },
      "pdf_is_encrypted": false,
      "pdf_number_of_pages": 51
    }
  },
  "protection_profile_links": {
    "_type": "Set",
    "elements": [
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/mod_km_v1.0.pdf",
      "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psd_v4.0.pdf"
    ]
  },
  "report_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11254-vr.pdf",
  "scheme": "US",
  "security_level": {
    "_type": "Set",
    "elements": []
  },
  "st_link": "https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid11254-st2.pdf",
  "state": {
    "_type": "sec_certs.sample.cc.CCCertificate.InternalState",
    "cert": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": true,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "e90dce568290fc132af2eac30f048c016994639cec1f0576ed7f52450b7fea78",
      "txt_hash": "adfac5571cc632cdedf37f7c885a272906310ed11db16b9caf2ef7fd9a8bdaff"
    },
    "report": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "3cd945a7a7f5e776c1848f1365efaf91e023bb0fd94e39f9a3344277b0e320e4",
      "txt_hash": "1f2f33041bf96cd258e2b8f7c3143aeebbe4c8c2a48974b7ae15e5861401657a"
    },
    "st": {
      "_type": "sec_certs.sample.document_state.DocumentState",
      "convert_garbage": false,
      "convert_ok": true,
      "download_ok": true,
      "extract_ok": true,
      "pdf_hash": "7f4110db2c6da9bdbb092dd42867d35a695232bfc542b35e47cceae154ccfed0",
      "txt_hash": "a750163bbdc771fb689d0c913559663d0856ba1c32bc45bd44d0220423ca2594"
    }
  },
  "status": "active"
}