Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
CCEVS-VR-VID-10455-2011
KOMSCO JK31 V1.1 on M7892
KECS-ISIS-1113-2021
name Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) KOMSCO JK31 V1.1 on M7892
category Network and Network-Related Devices and Systems ICs, Smart Cards and Smart Card-Related Devices and Systems
scheme US KR
status archived active
not_valid_after 14.05.2015 29.07.2026
not_valid_before 01.08.2011 29.07.2021
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/KECS-ISIS-1113-2021%20CR(KOMSCO%20JK31%20V1.1%20on%20M7892)(eng).pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/[JK31-R2-TR-0001]%20Security%20Target-Lite-e-v1.0.pdf
manufacturer Belkin International, Inc. KOMSCO
manufacturer_web https://www.belkin.com https://www.komsco.com
security_level EAL2+, ALC_FLR.3 ALC_DVS.2, EAL5+, AVA_VAN.5
dgst 29a987839a62165e 553b186b07c82912
heuristics/cert_id CCEVS-VR-VID-10455-2011 KECS-ISIS-1113-2021
heuristics/cert_lab US []
heuristics/extracted_sars ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ASE_SPD.1, ALC_CMS.5, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, ADV_FSP.5, AGD_OPE.1, ADV_INT.2, AGD_PRE.1, ATE_FUN.1, ATE_DPT.3, ADV_ARC.1, ASE_OBJ.2, ALC_TAT.2, ADV_TDS.4, ASE_REQ.2, ATE_IND.2, ASE_CCL.1
heuristics/extracted_versions - 1.1
heuristics/report_references/directly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/report_references/indirectly_referencing {} BSI-DSZ-CC-0782-2012, BSI-DSZ-CC-0782-V3-2017, BSI-DSZ-CC-0782-V4-2018, BSI-DSZ-CC-0782-V5-2020, BSI-DSZ-CC-0782-V2-2015
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2011
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 14.05.2015
  • id: CCEVS-VR-VID10455
  • product: Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10455
  • vendor: Belkin International, Inc.
heuristics/st_references/directly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/st_references/indirectly_referencing {} BSI-DSZ-CC-0782-V5-2020
heuristics/protection_profiles fd5d86dc01df0437 17c3a7837f653cc7
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/[KECS-PP-0097a-2008] (CC V3.1R3) Smart Card Open Platform PP V2.2.pdf
pdf_data/report_filename st_vid10455-vr.pdf KECS-ISIS-1113-2021 CR(KOMSCO JK31 V1.1 on M7892)(eng).pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10455-2011
    • cert_item: Belkin® Secure DVI-I KVM Switch
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10455-2011: 1
  • DE:
    • BSI-DSZ-CC-0782-V5-2020: 3
  • KR:
    • KECS-ISIS-1113-2021: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 8
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL 6+: 1
    • EAL5: 2
    • EAL5 augmented: 2
    • EAL5+: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
  • ADV:
    • ADV_ARC: 3
    • ADV_ARC.1: 2
    • ADV_FSP.5: 3
    • ADV_IMP.1: 2
    • ADV_INT.2: 3
    • ADV_TDS.4: 3
  • AGD:
    • AGD_OPE.1: 2
    • AGD_PRE.1: 3
  • ALC:
    • ALC_CMC.4: 2
    • ALC_CMS.5: 2
    • ALC_DEL.1: 2
    • ALC_DVS.2: 6
    • ALC_LCD.1: 2
    • ALC_TAT.2: 2
  • ASE:
    • ASE_CCL.1: 2
    • ASE_ECD.1: 3
    • ASE_INT.1: 3
    • ASE_OBJ.2: 2
    • ASE_REQ.2: 2
    • ASE_SPD.1: 2
    • ASE_TSS.1: 3
  • ATE:
    • ATE_COV.2: 3
    • ATE_DPT.3: 3
    • ATE_FUN.1: 3
    • ATE_IND.2: 4
  • AVA:
    • AVA_VAN.5: 9
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.PHYSICAL: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.STATE: 1
    • T.TRANSFER: 1
pdf_data/report_keywords/vendor
  • Infineon:
    • Infineon: 6
    • Infineon Technologies AG: 1
pdf_data/report_keywords/eval_facility
  • TTA:
    • TTA: 4
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 3
  • DES:
    • 3DES:
      • TDES: 2
      • Triple-DES: 1
  • miscellaneous:
    • ARIA:
      • ARIA: 1
    • SEED:
      • SEED: 1
pdf_data/report_keywords/asymmetric_crypto
  • RSA:
    • RSA 2048: 1
pdf_data/report_keywords/hash_function
  • SHA:
    • SHA2:
      • SHA-2: 4
pdf_data/report_keywords/crypto_protocol
  • PGP:
    • PGP: 1
pdf_data/report_keywords/crypto_library
  • Infineon:
    • v1.02.013: 16
pdf_data/report_keywords/side_channel_analysis
  • FI:
    • fault injection: 1
  • other:
    • JIL: 5
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-003: 2
    • CCMB-2017-04-004: 1
  • ISO:
    • ISO/IEC 14443: 2
    • ISO/IEC 7816: 2
pdf_data/report_keywords/javacard_version
  • GlobalPlatform:
    • Global Platform 2.1.1: 1
    • GlobalPlatform 2.1.1: 1
pdf_data/report_metadata
  • /Author: 이은경
  • /CreationDate: D:20210729160530+09'00'
  • /Creator: Microsoft® Word 2019
  • /ModDate: D:20210729160530+09'00'
  • /Producer: Microsoft® Word 2019
  • /Title: 평가단위보고서(ADV_ARC.1)
  • pdf_file_size_bytes: 548890
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 24
pdf_data/st_filename st_vid10455-st.pdf [JK31-R2-TR-0001] Security Target-Lite-e-v1.0.pdf
pdf_data/st_keywords/cc_cert_id
  • DE:
    • BSI-DSZ-CC-0782-V5-2020: 3
pdf_data/st_keywords/cc_protection_profile_id
  • BSI:
    • BSI-PP-0035-2007: 2
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 2
  • EAL:
    • EAL 5+: 1
    • EAL4: 2
    • EAL5: 12
    • EAL5+: 7
    • EAL6: 1
    • EAL6 augmented: 1
    • EAL6+: 10
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
    • ALC_FLR.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ADV:
    • ADV_ARC.1: 15
    • ADV_FSP.1: 3
    • ADV_FSP.2: 2
    • ADV_FSP.4: 1
    • ADV_FSP.5: 19
    • ADV_IMP.1: 13
    • ADV_INT.2: 11
    • ADV_TDS.1: 2
    • ADV_TDS.3: 4
    • ADV_TDS.4: 20
  • AGD:
    • AGD_OPE.1: 17
    • AGD_PRE.1: 10
  • ALC:
    • ALC_CMC.4: 17
    • ALC_CMS.1: 1
    • ALC_CMS.5: 10
    • ALC_DEL.1: 7
    • ALC_DVS.1: 1
    • ALC_DVS.2: 17
    • ALC_LCD.1: 9
    • ALC_TAT.1: 2
    • ALC_TAT.2: 13
  • ASE:
    • ASE_CCL.1: 16
    • ASE_ECD.1: 14
    • ASE_INT.1: 16
    • ASE_OBJ.2: 13
    • ASE_REQ.1: 2
    • ASE_REQ.2: 15
    • ASE_SPD.1: 10
    • ASE_TSS.1: 7
  • ATE:
    • ATE_COV.1: 2
    • ATE_COV.2: 7
    • ATE_DPT.1: 2
    • ATE_DPT.3: 10
    • ATE_FUN.1: 13
    • ATE_IND.2: 9
  • AVA:
    • AVA_VAN.4: 1
    • AVA_VAN.5: 19
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 3
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 1
  • FMT:
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_ARP.1: 6
    • FAU_ARP.1.1: 1
    • FAU_GEN.1: 3
    • FAU_SAA.1: 8
    • FAU_SAA.1.1: 1
    • FAU_SAA.1.2: 1
  • FCS:
    • FCS_CKM.1: 26
    • FCS_CKM.1.1: 3
    • FCS_CKM.2: 10
    • FCS_CKM.2.1: 1
    • FCS_CKM.4: 20
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 38
    • FCS_COP.1.1: 7
    • FCS_RNG: 2
    • FCS_RNG.1: 11
    • FCS_RNG.1.1: 2
    • FCS_RNG.1.2: 2
  • FDP:
    • FDP_ACC.1: 16
    • FDP_ACC.2: 12
    • FDP_ACC.2.1: 2
    • FDP_ACC.2.2: 2
    • FDP_ACF.1: 18
    • FDP_ACF.1.1: 2
    • FDP_ACF.1.2: 2
    • FDP_ACF.1.3: 2
    • FDP_ACF.1.4: 2
    • FDP_IFC.1: 8
    • FDP_ITC.1: 12
    • FDP_ITC.2: 12
    • FDP_RIP.1: 5
    • FDP_RIP.1.1: 1
    • FDP_SDI.1: 1
    • FDP_SDI.2: 5
    • FDP_SDI.2.1: 1
    • FDP_SDI.2.2: 1
    • FDP_UCT.1: 6
    • FDP_UCT.1.1: 1
    • FDP_UIT.1: 5
    • FDP_UIT.1.1: 2
  • FIA:
    • FIA_AFL.1: 6
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 12
    • FIA_ATD.1.1: 2
    • FIA_SOS.1: 6
    • FIA_SOS.1.1: 1
    • FIA_UAU.1: 16
    • FIA_UAU.1.1: 2
    • FIA_UAU.1.2: 2
    • FIA_UAU.4: 6
    • FIA_UAU.4.1: 1
    • FIA_UAU.6: 5
    • FIA_UAU.6.1: 1
    • FIA_UID.1: 12
    • FIA_UID.1.1: 1
    • FIA_UID.1.2: 1
    • FIA_USB.1: 5
    • FIA_USB.1.1: 1
    • FIA_USB.1.2: 1
    • FIA_USB.1.3: 1
  • FMT:
    • FMT_MOF.1: 6
    • FMT_MOF.1.1: 1
    • FMT_MSA.1: 12
    • FMT_MSA.1.1: 3
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 1
    • FMT_MTD.1: 6
    • FMT_MTD.1.1: 1
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_SMF.1: 10
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 17
    • FMT_SMR.1.1: 5
    • FMT_SMR.1.2: 1
  • FPR:
    • FPR_UNO.1: 5
    • FPR_UNO.1.1: 1
  • FPT:
    • FPT_FLS.1: 7
    • FPT_FLS.1.1: 2
    • FPT_ITC.1: 1
    • FPT_PHP.3: 6
    • FPT_RCV.2: 1
    • FPT_RCV.3: 5
    • FPT_RCV.3.1: 1
    • FPT_RCV.3.2: 1
    • FPT_RCV.3.3: 1
    • FPT_RCV.3.4: 1
    • FPT_RCV.4: 4
    • FPT_RCV.4.1: 1
    • FPT_TST.1: 6
    • FPT_TST.1.1: 1
    • FPT_TST.1.2: 1
    • FPT_TST.1.3: 1
  • FTP:
    • FTP_ITC.1: 8
    • FTP_ITC.1.1: 1
    • FTP_ITC.1.2: 1
    • FTP_ITC.1.3: 1
    • FTP_TRP.1: 4
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 5
    • O.SELECT: 4
    • O.SWITCH: 5
    • O.TAMPER: 3
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 2
    • OE.MANAGE: 2
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.INVALIDUSB: 3
    • T.PHYSICAL: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.STATE: 3
    • T.TRANSFER: 3
  • D:
    • D.APP_CODE: 1
    • D.APP_DATA: 1
    • D.CRYPTO: 1
    • D.PIN: 1
    • D.SEC_DATA: 1
    • D.TS_CODE: 1
    • D.TS_DATA: 1
  • O:
    • O.IC: 5
  • OP:
    • OP.ARRAY_ACCESS: 5
    • OP.CREATE: 3
    • OP.DELETE: 8
    • OP.INSTALL: 8
    • OP.INSTANCE_FIELD: 5
    • OP.INVK_INTERFACE: 7
    • OP.INVK_VIRTUAL: 5
    • OP.JAVA: 3
    • OP.LOAD: 9
    • OP.THROW: 5
    • OP.TYPE_ACCESS: 7
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 3
  • Infineon:
    • Infineon: 7
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 6
  • DES:
    • 3DES:
      • TDES: 8
    • DES:
      • DES: 3
  • miscellaneous:
    • ARIA:
      • ARIA: 7
    • SEED:
      • SEED: 6
pdf_data/st_keywords/asymmetric_crypto
  • ECC:
    • ECC:
      • ECC: 9
    • ECDH:
      • ECDH: 2
    • ECDSA:
      • ECDSA: 3
  • FF:
    • DH:
      • DH: 1
      • Diffie-Hellman: 2
  • RSA:
    • RSA2048: 1
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 1
    • SHA2:
      • SHA-2: 2
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
  • KA:
    • Key Agreement: 2
    • Key agreement: 1
  • MAC:
    • MAC: 5
pdf_data/st_keywords/crypto_protocol
  • PGP:
    • PGP: 1
pdf_data/st_keywords/randomness
  • RNG:
    • RNG: 7
pdf_data/st_keywords/cipher_mode
  • CBC:
    • CBC: 1
pdf_data/st_keywords/crypto_library
  • Infineon:
    • v1.02.013: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 9
  • FI:
    • DFA: 1
    • Physical tampering: 1
  • SCA:
    • DPA: 1
    • SPA: 1
    • physical probing: 1
  • other:
    • JIL: 1
    • reverse engineering: 1
pdf_data/st_keywords/standard_id
  • BSI:
    • AIS31: 2
  • CC:
    • CCMB-2017-04-001: 2
    • CCMB-2017-04-002: 2
    • CCMB-2017-04-003: 2
  • FIPS:
    • FIPS PUB 180-4: 1
    • FIPS PUB 197: 1
    • FIPS PUB 46-3: 1
  • ISO:
    • ISO/IEC 14888-3: 1
  • NIST:
    • NIST SP 800-67: 1
  • PKCS:
    • PKCS #1: 1
    • PKCS#1: 1
    • PKCS#2: 1
  • RFC:
    • RFC 8017: 1
    • RFC8017: 1
  • SCP:
    • SCP 02: 1
    • SCP02: 18
pdf_data/st_keywords/javacard_version
  • GlobalPlatform:
    • GlobalPlatform 2.1.1: 3
pdf_data/st_keywords/javacard_api_const
  • misc:
    • TYPE_ACCESS: 7
pdf_data/st_keywords/certification_process
  • OutOfScope:
    • out of scope: 1
    • the application although it is possible to load the application on the FLASH of IC ChiP. That is out of scope in the ST. The delivery method of TOE related software uses a secure iShare/SecureX portal of: 1
pdf_data/st_metadata
  • /Author: seckgren
  • /CreationDate: D:20110822114124-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110822114124-07'00'
  • /Producer: Acrobat Distiller 9.4.5 (Windows)
  • /Title: Microsoft Word - 01g - Belkin_2098_ST_Clean.doc
  • pdf_file_size_bytes: 197617
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different