Comparing certificates Experimental feature

You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.

Showing only differing attributes.
Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
CCEVS-VR-VID-10455-2011
McAfee Endpoint Encryption for Devices version 5.0
CRP227
name Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F) McAfee Endpoint Encryption for Devices version 5.0
category Network and Network-Related Devices and Systems Data Protection
scheme US UK
not_valid_after 14.05.2015 05.03.2013
not_valid_before 01.08.2011 23.05.2006
report_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-vr.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CRP227.pdf
st_link https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/st_vid10455-st.pdf https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/SafeBoot5.pdf
manufacturer Belkin International, Inc. McAfee, Inc.
manufacturer_web https://www.belkin.com https://www.mcafee.com/
security_level EAL2+, ALC_FLR.3 EAL4
dgst 29a987839a62165e 72feecf18621c759
heuristics/cert_id CCEVS-VR-VID-10455-2011 CRP227
heuristics/cert_lab US []
heuristics/extracted_sars ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ALC_CMC.2, ALC_DEL.1, ATE_IND.2, ATE_COV.1, AVA_VAN.2, ALC_FLR.3, ADV_ARC.1, AGD_OPE.1, ADV_FSP.2, AGD_PRE.1 ALC_DVS.1, ATE_COV.2, ADV_RCR.1, ALC_TAT.1, AVA_VLA.2, AVA_MSU.2, ADV_HLD.2, ATE_FUN.1, AGD_USR.1, AVA_SOF.1, ATE_IND.2, AGD_ADM.1, ADV_LLD.1, ALC_LCD.1, ATE_DPT.1, ADV_FSP.2, ADV_SPM.1, ADV_IMP.1
heuristics/extracted_versions - 5.0
heuristics/scheme_data
  • category: Peripheral Switch
  • certification_date: 01.08.2011
  • evaluation_facility: UL Verification Services Inc. (Formerly InfoGard)
  • expiration_date: 14.05.2015
  • id: CCEVS-VR-VID10455
  • product: Belkin Secure KVM Switch (Models F1DN102B, F1DN104B, F1DN102C, F1DN104C, F1DN104E, F1DN104F)
  • scheme: US
  • url: https://www.niap-ccevs.org/product/10455
  • vendor: Belkin International, Inc.
heuristics/protection_profiles fd5d86dc01df0437 {}
protection_profile_links https://www.commoncriteriaportal.org/nfs/ccpfiles/files/ppfiles/pp_psshid_v2.1-vr.pdf {}
pdf_data/report_filename st_vid10455-vr.pdf CRP227.pdf
pdf_data/report_frontpage
  • US:
    • cert_id: CCEVS-VR-VID10455-2011
    • cert_item: Belkin® Secure DVI-I KVM Switch
    • cert_lab: US NIAP
  • US:
pdf_data/report_keywords/cc_cert_id
  • US:
    • CCEVS-VR-VID10455-2011: 1
  • UK:
    • CERTIFICATION REPORT No. P227: 1
pdf_data/report_keywords/cc_security_level
  • EAL:
    • EAL 1: 1
    • EAL 2: 8
    • EAL 2 augmented: 2
    • EAL 4: 1
    • EAL2: 5
    • EAL2 augmented: 4
  • EAL:
    • EAL4: 2
pdf_data/report_keywords/cc_sar
  • ALC:
    • ALC_FLR.3: 7
  • ATE:
    • ATE_IND: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.3: 1
pdf_data/report_keywords/cc_claims
  • A:
    • A.ACCESS: 1
    • A.MANAGE: 1
    • A.NOEVIL: 1
    • A.PHYSICAL: 1
  • T:
    • T.INVALIDUSB: 1
    • T.PHYSICAL: 1
    • T.RESIDUAL: 1
    • T.ROM_PROG: 1
    • T.SPOOF: 1
    • T.STATE: 1
    • T.TRANSFER: 1
pdf_data/report_keywords/vendor
  • Microsoft:
    • Microsoft: 5
pdf_data/report_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 1
pdf_data/report_keywords/asymmetric_crypto
  • FF:
    • DSA:
      • DSA: 1
pdf_data/report_keywords/hash_function
  • MD:
    • MD5:
      • MD5: 1
  • SHA:
    • SHA1:
      • SHA-1: 1
      • SHA1: 1
    • SHA2:
      • SHA256: 1
pdf_data/report_keywords/standard_id
  • CC:
    • CCMB-2009-07-001: 1
    • CCMB-2009-07-002: 1
    • CCMB-2009-07-003: 1
    • CCMB-2009-07-004: 1
  • CC:
    • CCIMB-2005-08-003: 1
    • CCMB-2005-08-001: 1
    • CCMB-2005-08-002: 1
pdf_data/report_keywords/certification_process
  • OutOfScope:
    • AES, SHA-1 and DSA) used in the TOE are out of scope and were not considered during the evaluation: 1
    • implementation of the cryptographic algorithms used by the TOE to encrypt data on the hard disk are out of scope of this evaluation, although the calls to these algorithms are considered. 11. An overview of the: 1
    • of the EAL4 evaluation. 37. The cryptographic functions (AES, SHA-1 and DSA) used in the TOE are out of scope and were not considered during the evaluation. TOE Configuration 38. The TOE should be configured: 1
    • out of scope: 2
pdf_data/report_metadata
  • /Author: racook
  • /CreationDate: D:20060531102509Z
  • /Creator: T493 Safeboot CR v1.0 - Microsoft Word
  • /ModDate: D:20131204150401Z
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: T493 Safeboot CR v1.0.doc
  • pdf_file_size_bytes: 976093
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 18
pdf_data/st_filename st_vid10455-st.pdf SafeBoot5.pdf
pdf_data/st_keywords/cc_security_level
  • EAL:
    • EAL 2: 3
    • EAL 2 augmented: 1
    • EAL2: 3
    • EAL2 augmented: 2
  • EAL:
    • EAL4: 7
pdf_data/st_keywords/cc_sar
  • ADV:
    • ADV_ARC.1: 1
    • ADV_FSP.2: 1
    • ADV_TDS.1: 1
  • AGD:
    • AGD_OPE.1: 1
    • AGD_PRE.1: 1
  • ALC:
    • ALC_CMC.2: 1
    • ALC_CMS.2: 1
    • ALC_DEL.1: 1
    • ALC_FLR.2: 3
    • ALC_FLR.3: 5
  • ATE:
    • ATE_COV.1: 1
    • ATE_FUN.1: 1
    • ATE_IND.2: 1
  • AVA:
    • AVA_VAN.2: 1
  • ACM:
    • ACM_AUT.1: 2
    • ACM_CAP.4: 2
    • ACM_SCP.2: 2
  • ADO:
    • ADO_DEL.2: 2
    • ADO_IGS.1: 2
  • ADV:
    • ADV_FSP.2: 2
    • ADV_HLD.2: 2
    • ADV_IMP.1: 2
    • ADV_LLD.1: 2
    • ADV_RCR.1: 2
    • ADV_SPM.1: 2
  • AGD:
    • AGD_ADM.1: 10
    • AGD_USR.1: 6
  • ALC:
    • ALC_DVS.1: 2
    • ALC_LCD.1: 2
    • ALC_TAT.1: 2
  • ATE:
    • ATE_COV.2: 2
    • ATE_DPT.1: 2
    • ATE_FUN.1: 2
    • ATE_IND.2: 2
  • AVA:
    • AVA_MSU.2: 2
    • AVA_SOF.1: 3
    • AVA_VLA.2: 2
pdf_data/st_keywords/cc_sfr
  • FDP:
    • FDP_IFC: 2
    • FDP_IFC.1: 7
    • FDP_IFC.1.1: 1
    • FDP_IFF: 3
    • FDP_IFF.1: 6
    • FDP_IFF.1.1: 1
    • FDP_IFF.1.2: 1
    • FDP_IFF.1.3: 1
    • FDP_IFF.1.4: 1
    • FDP_IFF.1.5: 1
    • FDP_IFF.1.6: 1
    • FDP_ITC.1: 1
  • FMT:
    • FMT_MSA: 3
    • FMT_MSA.1: 8
    • FMT_MSA.1.1: 1
    • FMT_MSA.3: 9
    • FMT_MSA.3.1: 1
    • FMT_MSA.3.2: 1
    • FMT_SMF.1: 1
    • FMT_SMR.1: 3
  • FPT:
    • FPT_PHP: 1
    • FPT_PHP.1: 5
    • FPT_PHP.1.1: 1
    • FPT_PHP.1.2: 1
  • FAU:
    • FAU_GEN.1: 8
    • FAU_GEN.1.1: 1
    • FAU_GEN.1.2: 1
    • FAU_GEN.2: 5
    • FAU_GEN.2.1: 1
    • FAU_SAR.1: 4
    • FAU_SAR.1.1: 1
    • FAU_SAR.1.2: 1
    • FAU_SAR.3: 3
    • FAU_SAR.3.1: 1
    • FAU_STG.1: 5
    • FAU_STG.1.1: 1
    • FAU_STG.1.2: 1
    • FAU_STG.3: 6
    • FAU_STG.3.1: 1
  • FCS:
    • FCS_CKM.1: 15
    • FCS_CKM.1.1: 2
    • FCS_CKM.4: 10
    • FCS_CKM.4.1: 1
    • FCS_COP.1: 23
    • FCS_COP.1.1: 4
  • FDP:
    • FDP_ACC.2: 5
    • FDP_ACC.2.1: 1
    • FDP_ACC.2.2: 1
    • FDP_ACF.1: 6
    • FDP_ACF.1.1: 1
    • FDP_ACF.1.2: 1
    • FDP_ACF.1.3: 1
    • FDP_ACF.1.4: 1
  • FIA:
    • FIA_AFL.1: 5
    • FIA_AFL.1.1: 1
    • FIA_AFL.1.2: 1
    • FIA_ATD.1: 5
    • FIA_ATD.1.1: 1
    • FIA_UAU.2: 6
    • FIA_UAU.2.1: 1
    • FIA_UAU.4: 18
    • FIA_UAU.4.1: 2
    • FIA_UAU.7: 10
    • FIA_UID.2: 6
    • FIA_UID.2.1: 1
  • FMT:
    • FMT_MSA.1: 9
    • FMT_MSA.1.1: 2
    • FMT_MSA.2: 6
    • FMT_MSA.2.1: 2
    • FMT_MSA.3: 6
    • FMT_MSA.3.1: 2
    • FMT_MSA.3.2: 2
    • FMT_MTD.1: 20
    • FMT_MTD.1.1: 4
    • FMT_MTD.2: 6
    • FMT_MTD.2.1: 1
    • FMT_MTD.2.2: 1
    • FMT_REV.1: 8
    • FMT_REV.1.1: 2
    • FMT_REV.1.2: 2
    • FMT_SAE.1: 8
    • FMT_SAE.1.1: 2
    • FMT_SAE.1.2: 2
    • FMT_SMF.1: 6
    • FMT_SMF.1.1: 1
    • FMT_SMR.1: 11
    • FMT_SMR.1.1: 2
    • FMT_SMR.1.2: 2
  • FPT:
    • FPT_AMT.1: 6
    • FPT_AMT.1.1: 1
    • FPT_FLS.1: 6
    • FPT_FLS.1.1: 1
    • FPT_RCV.1: 5
    • FPT_RCV.1.1: 1
    • FPT_RVM.1: 11
    • FPT_RVM.1.1: 1
    • FPT_SEP.1: 3
    • FPT_SEP.1.1: 1
    • FPT_SEP.1.2: 1
    • FPT_STM: 1
    • FPT_STM.1.1: 1
  • FRU:
    • FRU_FLT.1: 5
    • FRU_FLT.1.1: 1
  • FTA:
    • FTA_SSL.2: 5
    • FTA_SSL.2.1: 1
    • FTA_SSL.2.2: 1
    • FTA_TSE.1: 6
    • FTA_TSE.1.1: 1
  • FTP:
    • FTP_TRP.1: 6
    • FTP_TRP.1.1: 1
    • FTP_TRP.1.2: 1
    • FTP_TRP.1.3: 1
pdf_data/st_keywords/cc_claims
  • A:
    • A.ACCESS: 2
    • A.MANAGE: 2
    • A.NOEVIL: 2
    • A.PHYSICAL: 2
  • O:
    • O.CONF: 7
    • O.INDICATE: 3
    • O.ROM: 5
    • O.SELECT: 4
    • O.SWITCH: 5
    • O.TAMPER: 3
    • O.USBDETECT: 6
  • OE:
    • OE.ACCESS: 2
    • OE.MANAGE: 2
    • OE.NOEVIL: 2
    • OE.PHYSICAL: 2
  • T:
    • T.INVALIDUSB: 3
    • T.PHYSICAL: 3
    • T.RESIDUAL: 3
    • T.ROM_PROG: 3
    • T.SPOOF: 3
    • T.STATE: 3
    • T.TRANSFER: 3
  • A:
    • A.ADMINISTRATION_SERVER: 4
    • A.ADMINSTRATIVE_SERVE: 1
    • A.AUTHENTICATION_DATA_PRIVATE: 4
    • A.AVAILABLE_BACKUP: 4
    • A.DOMAIN_SEPARATION: 4
    • A.MANAGEMENT: 4
    • A.NON_TECHNICAL_IDENTITY_VERIFICATION: 4
    • A.NO_MALEVOLENCE: 3
    • A.PROFICIENT_USERS: 6
    • A.SECURE_BACKUP: 4
    • A.TIME_SOURCE: 5
    • A.TRUSTED_SOFTWARE: 4
  • O:
    • O.ACCESS_CONTROL: 7
    • O.AUDIT: 13
    • O.AUTHORISATION: 16
    • O.AUTHORISED: 1
    • O.CRYPOTOGRAPHIC_KEYS: 3
    • O.CRYPTOGRAPHIC_KEYS: 8
    • O.CRYPTOGRAPHIC_OPERATIONS: 9
    • O.DATA_TRANSFER: 10
    • O.EASE_OF_USE_USER: 7
    • O.EFFECTIVE_ADMINISTRATION: 7
    • O.ENCRYPTED: 1
    • O.ENCRYPTED_MEDIA: 8
    • O.FAULT_TOLERANCE: 7
    • O.NO_OBJECT_REUSE: 9
    • O.PROTECT: 9
    • O.SECURE: 1
    • O.SECURE_RECOVERY: 6
    • O.TRUSTED_PATH: 8
    • O.UNATHORISED_MODIFICATION: 1
  • OE:
    • OE.ADMINISTRATION: 1
    • OE.ADMINISTRATION_SERVER: 7
    • OE.AUTH: 6
    • OE.AVAILABLE_BACKUP: 6
    • OE.DOMAIN_SEPARATION: 4
    • OE.EASE_OF_USE_ADMIN: 8
    • OE.EASE_OF_USE_USER: 6
    • OE.MANAGED: 10
    • OE.NON_TECHNICAL_IDENTITY_VERIFICATION: 6
    • OE.SECURE_BACKUP: 6
    • OE.TIME_SOURCE: 8
    • OE.TRUSTED_SOFTWARE: 4
  • T:
    • T.ACCESS: 8
    • T.ALTERNATE_BOOT_PROCESS: 4
    • T.AUTHENTICATION_DATA_PRIVATE: 2
    • T.CONFIG: 3
    • T.CONFIG_MODIFICATION: 1
    • T.CORRUPT_AUDIT: 4
    • T.EASE_OF_USE_ADMIN: 4
    • T.EASE_OF_USE_USER: 4
    • T.EAVESDROP_TRANSIT: 4
    • T.OBJECT_REUSE: 5
    • T.PASSWORD_LOSS: 6
    • T.RECORD_ACTIONS: 6
    • T.RECOVERY_MASQUERADE: 4
    • T.RECOVERY_PROCEDURE_INTERCEPT: 3
    • T.REMOVE_DISK: 3
    • T.SPOOF: 3
    • T.SYSTEM_ACCESS: 8
    • T.UNAUTHORISED_MODIFICATION: 9
pdf_data/st_keywords/vendor
  • Microsoft:
    • Microsoft: 1
  • Samsung:
    • Samsung: 3
  • Microsoft:
    • Microsoft: 3
    • Microsoft Corporation: 1
pdf_data/st_keywords/symmetric_crypto
  • AES_competition:
    • AES:
      • AES: 34
pdf_data/st_keywords/asymmetric_crypto
  • FF:
    • DH:
      • Diffie-Hellman: 8
    • DSA:
      • DSA: 17
pdf_data/st_keywords/hash_function
  • SHA:
    • SHA1:
      • SHA-1: 8
pdf_data/st_keywords/crypto_scheme
  • MAC:
    • MAC: 1
pdf_data/st_keywords/randomness
  • PRNG:
    • PRNG: 3
pdf_data/st_keywords/side_channel_analysis
  • FI:
    • physical tampering: 9
pdf_data/st_keywords/standard_id
  • FIPS:
    • FIPS 140: 4
    • FIPS 140-2: 16
    • FIPS 180: 1
    • FIPS 186: 1
    • FIPS 186-2: 3
    • FIPS 197: 7
  • ISO:
    • ISO/IEC 15408-2: 1
    • ISO/IEC 15408-3: 1
    • ISO/IEC 15408:2005: 1
    • ISO/IEC 18405:2005: 1
  • RFC:
    • RFC 2898: 2
pdf_data/st_metadata
  • /Author: seckgren
  • /CreationDate: D:20110822114124-07'00'
  • /Creator: PScript5.dll Version 5.2.2
  • /ModDate: D:20110822114124-07'00'
  • /Producer: Acrobat Distiller 9.4.5 (Windows)
  • /Title: Microsoft Word - 01g - Belkin_2098_ST_Clean.doc
  • pdf_file_size_bytes: 197617
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 33
  • /Author: racook
  • /CreationDate: D:20060531102131
  • /Creator: SafeBoot 5 Security Target v1.0 - Microsoft Word
  • /Producer: Acrobat PDFWriter 5.0 for Windows NT
  • /Title: SafeBoot 5 Security Target v1.0.doc
  • pdf_file_size_bytes: 206656
  • pdf_hyperlinks: {}
  • pdf_is_encrypted: False
  • pdf_number_of_pages: 50
state/report/pdf_hash Different Different
state/report/txt_hash Different Different
state/st/pdf_hash Different Different
state/st/txt_hash Different Different